Imagine!! You want to build a food-ordering services application that incorporates an Intelligent AI-based
recommendation system. This application recommends its users a personalized menu of food options,
which the user will most likely order. What would be the data features in this scenario and why?
AI project

Answers

Answer 1
How to create a food ordering app
Customer name.
Delivery address.
Customer phone.
Food selection fields.
Food customization/add-on fields.
Field for additional customer notes.
Verification of whether the customer is enrolled in a customer loyalty program.
Payment information fields.

Related Questions

how to chicago in text citation

Answers

In-text citations in Chicago are formatted differently depending on whether you are using notes or author-date style. Notes-Bibliography Style: Use superscript numbers in the text to designate sources.

and then include matching numbered footnotes or endnotes with bibliographic information in the notes-bibliography style. Here's an example of an in-text reference formatted in this manner: "The quote goes here," says the author. 1. The notion being expressed (Author's last name, year) 1. Author-Date Format: Include the author's last name and the year of publication in parenthesis in the text when using the author-date format. Here's an example of an in-text reference formatted in this manner: "The quote goes here," says the author (last name, year, page number). The formalized paraphrase  idea being conveyed (Author's last name year, page number) Remember that in both styles, the full citation information must be included in the reference list or bibliography at the end of the paper. It's important to check with your instructor or publisher for specific guidelines, as there are variations within the Chicago citation style.

learn more about Chicago  here:

https://brainly.com/question/9349051

#SPJ4

what is the purpose of the snmp setrequest message

Answers

Network administrators can examine all SNMP values of a device using this request to learn all names and values that an operant device supports. A set request changes the value of a named object.

What messages are utilised by SNMP?

The five main SNMP message types used for communication between the SNMP agent and the SNMP manager are TRAP, GET, GET-NEXT, GET-RESPONSE, and SET.

Which messages may an SNMP agent produce?

Get The most frequent SNMP message used to request data is GetRequest, and it is sent by SNMP managers. A Respond message from the receiving device will serve as the response.

To know more about SNMP visit:-

https://brainly.com/question/14553493

#SPJ4

what is online java complier?

Answers

You can edit, run, and share your Java code online using the Online Java Compiler (OpenJDK 11.0.17). You can use version 11.0.17 of OpenJDK with this development environment.

How does the online Java compiler function?

The high-level code is line by line scanned by compilers, and the command line output identifies several types of defects that are present. A Java compiler is a piece of software that can translate developer-written Java source code into a Java file that works on any platform.

How does the online compiler operate?

The websites that function as online compilers are places where you may enter programme code and send it to a server that already has a compiler installed. Once further rendered on the client-side, the outcome is received as a response.

To know more about java complier visit :-

https://brainly.com/question/29897053

#SPJ4

the _______ animation animates the object leaving the slide; starts with the object visible and ends with the object not visible. entrance emphasis exit motion paths

Answers

The animation described in the statement is Exit animation.

What are the different types of exit animations available in presentation software?

Different presentation software may have different types of exit animations available, but some common types include Fade, Dissolve, Wipe, Zoom, and Fly Out. Each type of exit animation can be customized to adjust the direction, speed, and other properties of the animation.

What is the purpose of using exit animations in a presentation?

Exit animations can help to add visual interest and engagement to a presentation, by animating objects as they leave the slide. This can help to emphasize the end of a point or transition, and can also help to create a sense of movement and progression within the presentation. However, it is important to use exit animations sparingly and appropriately, as too many or overly complex animations can be distracting and detract from the content of the presentation.

Learn more about animation here:

brainly.com/question/29996953

#SPJ4

which is the unseen information that is located in common text files, such as that which can indicate when the document was created

Answers

In common text files, the term "metadata" refers to information that cannot be seen. Metadata can indicate when a document was created, viewed, or revised, and it can also contain edits, notes, or other private information.

What kinds of text files are there?

These file extensions are just a few examples of plain text file formats: REG, BAT, PLS, M3U, M3U8, SRT, IES, AIR, STP, XSPF, DIZ, SFM, THEME, and TORRENT are all examples of XML.

Which of the four file systems exist?

Comparison of File Systems:  NTFS, FAT32, exFAT, and EXT You can find out which file system format to use on your storage devices by comparing the four most common file system formats on this page: NTFS, FAT32, exFAT, and EXT2/2/4.

To know more about Metadata visit :-

https://brainly.com/question/14699161

#SPJ4

You assign access permissions so that users can only access the resources required to accomplish their specific work tasks. Which security principle are you complying with?
A. Job rotation
B. Need to know
C. Principle of least privilege
D. Cross-training

Answers

The Security principle are you complying with is the Principle of least privilege.

What is the principle of least privilege in computer security?

The principle of least privilege in computer security is a concept that restricts user access rights to only the resources necessary to perform their job functions. This principle helps reduce the risk of unauthorized access to sensitive data and limits the potential damage that can be caused by a security breach.

How does the principle of least privilege help enhance computer security?

The principle of least privilege helps enhance computer security by limiting user access to only the resources necessary to perform their job functions. This reduces the risk of unauthorized access to sensitive data and limits the potential damage that can be caused by a security breach. By applying the principle of least privilege, organizations can better control access to their systems and data, and reduce the likelihood of a security incident.

Learn more about Security principle here:

brainly.com/question/20709959

#SPJ4

When you add a ____account, you can sign in to the account and then sync your information with all of your Windows devices. a. cross-app b. custom c. Microsoft d. touch

Answers

You can log in to a Microsoft account when you add it, and then all of your Windows devices will be synced with your data.

What kind of information is stored in your user account?

A username, password, and any personal data pertaining to the user make up a user account. User accounts are commonly used in networks that need to be accessible by numerous people.

Whose account has total authority over the operating system?

In the course of installing Windows, the Administrator account is the first to be established. All local device files, directories, services, and other resources are completely under the control of the Administrator account. Other local users may be created, and user rights and permissions may be assigned by the Administrator account.

To know more about Windows devices visit:-

https://brainly.com/question/30507689

#SPJ4

which phase of the rapid application development (rad) model focuese on the dataflow and interfaces between components.

Answers

The Design phase of the RAD model focuses on data and interfaces between components, such as diagrams, prototypes and specifications.

The Design phase of the RAD model is where the application's dataflow and interfaces between components are identified and designed. During this phase, diagrams, prototypes, and specifications are created to ensure that the application will meet the user's needs and the system's requirements. This phase also focuses on user interface design, which involves considering the way users will interact with the application, as well as the types of data that will be exchanged. Once the design is complete, the development team can develop the application with confidence that it will meet the user's needs. The design phase also helps the team identify any potential problems or conflicts that may arise during the development or implementation of the application.

Learn more about data here-

brainly.com/question/11941925

#SPJ4

What do Aba and Preach do?

Answers

Aba and Preach are two companies dedicated to helping people improve their personal image and achieve their goals.

Aba offers professional advisory, coaching and training services in areas such as leadership, interpersonal skills development, time management, effective communication, conflict management and interpersonal relationships. These services are intended to help people improve their personal image, increase their self-confidence, and achieve their professional and personal goals.

On the other hand, Preach offers training and development services to organizations and teams, helping to improve productivity, innovation and communication. Using neuroscience-based tools and techniques, Preach helps companies improve their decision-making processes, optimize their resources, and improve collaboration among their team members. These services help organizations reach optimal performance levels and increase the leadership and management skills of their teams.

Lear More About Professional services

https://brainly.com/question/4884763

#SPJ11

Can you set an alarm for 6 30 am?

Answers

Hold the Home button on your  smartphone  and go to setting option in clock and add alarm.

What time should my alarm go off?

The first or last 10 minutes of your sleep cycle are the optimum times to wake up. On the other hand, one of the main causes of morning fatigue is waking up in the middle of a sleep cycle.

What time is it at six thirty?

On a 12-hour clock, 6:00 AM is the same as 06:00 on a 24-hour clock. This system, which is employed globally (and not just by the military), makes use of a 24-hour time clock as opposed to the 12-hour AM/PM system.

To know more about smartphone visit:-

https://brainly.com/question/30582827

#SPJ4

what role does arp play in the routing process?

Answers

ARP is used to map an IP address to a physical address (MAC address) on a local network and is essential for the routing process.

ARP (Address Resolution Protocol) plays an important role in the routing process. It is used to map an IP address to a physical address (MAC address) on a local network. When a packet is sent from one host to another, the source host needs to know the MAC address of the destination host in order to send the packet out. ARP is used to map the IP address of the destination host to its corresponding MAC address. ARP requests are broadcasted on the local network and the destination host responds with its MAC address. The source host then caches the IP-MAC address mapping so that it can use it in the future without sending an ARP request. ARP is an essential part of the network routing process and is used to ensure that packets are delivered to the right destination.

Learn more about network here:

brainly.com/question/29970297

#SPJ4

How to Check if a File Exists in Python with isFile() and exists()?

Answers

To check if a file exists in Python, you can use the isFile() method of the Path class or the exists() method of the os.path module.

What is the return type of the isFile() and exists() methods in Python?

Both methods return a boolean value: True if the file exists and False if it does not.

Example using is File():

from pathlib import Path

file_path = Path("path/to/file.txt")

if file_path.is_file():

  print("File exists!")

else:

  print("File does not exist.")

Example using exists():

import os

file_path = "path/to/file.txt"

if os.path.exists(file_path):

  print("File exists!")

else:

 print("File does not exist.")

In both cases, replace "path/to/file.txt" with the actual path to the file you want to check.

Learn more about Python here:

brainly.com/question/30427047

#SPJ4

after checking the receipt after leaving the restaurant, you notice the server failed to charge your group for several drinks. everyone else says it is not a big deal, but you worry that the server may have to reimburse the charges out of her own paycheck. which ethics-based question would be most helpful in evaluating this situation?

Answers

You may manage your Windows Server updates by using Microsoft's Windows Deployment Services (WSUS).

What are the steps for server?

To approve, reject, or schedule updates differently for various server groups, you can use WSUS to build customized patch groups for your servers.

Microsoft offers a software upgrade service called Windows Server Update Services (WSUS). It allows administrators to control the delivery of patches and updates for Windows computers to PCs in a business setting and is an essential component of the operating system called Windows Server.

Therefore, You may manage your Windows Server updates by using Microsoft's Windows Deployment Services (WSUS).

Learn more about Windows on:

https://brainly.com/question/13502522

#SPJ1

When derivatively classifying information, where can you find a listing of specific information elements that identify their classification, reason for classification, downgrading, and declassification information?a. Properly marked source document
b. Security Classification Guide (SCG)
c. Executive Order 13526, Classified National Security Information
d. DoD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM)

Answers

b. Security Classification Guide (SCG) is where you can find a listing of specific information elements that identify their classification, reason for classification, downgrading, and declassification information when derivatively classifying information.

A Security Classification Guide (SCG) provides specific guidance and instructions on how to classify, mark, protect, and declassify information. The correct option is b.

It contains detailed information elements that identify the classification level, reason for classification, downgrading procedures, and declassification instructions for specific types of information.

While the other options mentioned (a, c, and d) are relevant to information classification and security, they do not specifically provide a listing of information elements for classifying, downgrading, and declassifying information.

Option a, a properly marked source document, refers to the marking of classified information itself, but it may not provide comprehensive guidance on the specific elements mentioned.

Thus, the correct option is b.

For more details regarding Security Classification Guide, visit:

https://brainly.com/question/28222508

#SPJ6

The optimal solution to a model is one in which known, specific values provide the best output. True or false?

Answers

True , The optimal solution is the mathematically ideal solution in quantitative analysis. One or more constraints must be satisfied for a choice alternative or solution to be considered infeasible.

What advantage does using models when making a decision have?

The usefulness of basing decisions on models depends on how accurately the model captures the actual scenario. The management analyst should be kept apart from the managerial team until the problem has been properly organised, according to the majority of successful quantitative analysis models.

What presumption underlies the computer output's sensitivity analysis data?

The assumption of a single coefficient change underlies the sensitivity analysis data in computer output. Range analysis for objective function coefficients and constraint RHS cannot be done simultaneously when using Solver.

To know more about optimal solution visit :-

https://brainly.com/question/14914110

#SPJ4

what is the best way to change an application?

Answers

App kinds are changeable. Develop a new app of a different kind if your app requires features, products, or rights that are incompatible with the existing type.

An IT application what is?

IT Applications refers to any operating systems, development tools, applications, data, and other i.t hardware and programs that is related to or running on IT Infrastructure. This also includes software interaction and source code for any other i.t hardware and programs that is not part of IT Infrastructure.

Applications are they IT systems?

IT Auditing Components

In many businesses, the phrases "system" and "program" are interchangeable to denote the software and computation power that carry out particular tasks in aid of company processes.

To know more about application visit:

https://brainly.com/question/28963277

#SPJ4

which optical discs stores the least data

Answers

There are three principal sorts of optical media: CD, DVD, and Blu-ray. CDs can shop up to seven-hundred MB (megabytes) of data, and DVDs can store up to 8.4 GB (gigabytes) of data. Blu-ray discs, the most modern type of optical media, can shop up to 50 GB of data.

What storage system stores the least data?

Floppy disks

Floppy disk is a transportable and it is a tender magnetic disk. Even though it is a much less expensive, it has much less storage capability (can store statistics up to 1.44MB)

Which optical discs stores the most data?

Optical disk storage capacities

A CD can keep up to up seven-hundred megabytes (MB) of data.

A single-layer DVD can keep 4.7 gigabytes (GB) of data, and a double-layer disk can hold 8.5 GB.

A single-layer Blu-ray disk can keep 25 to 33.4 GB of data, and a quad-layer Blu-ray disk can save up to 128 GB of data.

Learn more about optical discs stores here;

https://brainly.com/question/30079240

#SPJ4

An operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it. TRUE OR FALSE.

Answers

Note that it is TRUE to state that an operating system is a program that manages the complete operation of your computer or mobile device and lets you interact with it.

What is the rationale for the above response?

An operating system (OS) is a program that manages the computer or mobile device's hardware, software, and other resources to provide a user-friendly interface for users to interact with the device.

It controls the computer's memory, input and output devices, and other hardware components. It also manages software applications, allowing users to run and interact with them.

The OS is the core software that runs on a computer or mobile device and enables users to perform various tasks. Therefore, it is essential for the complete operation of the computer or mobile device.

Learn more about operating systems:
https://brainly.com/question/6689423
#SPJ1

Why is a 3D printer helpful for a job shop?
It helps grow experimental technology.
It eliminates production costs.
Products can be manufactured that cannot be developed any other way.
It's cost effective.

Answers

Many factors, such as prototyping and experimentation, customization, cost-effectiveness, and manufacturing complexity, can make a 3D printer particularly beneficial for a work shop.

What advantage does 3D printing have over conventional manufacturing?

The industrial sector benefits greatly from 3D printing, which allows for flexible design, the creation of complicated designs, mass customization, and low-cost, low-volume production.

What advantages do you anticipate 3D printing will have in the future?

Bigger, quicker, and less expensive 3D printing is coming. The new generation of printers' capacity to handle a wider variety of innovative materials, notably industrial-grade options, will be crucial. This makes it possible for companies to use additive manufacturing where they previously couldn't.

To know more about prototyping visit:-

https://brainly.com/question/28370530

#SPJ4

which internal device has the largest nonvolatile storage capacity

Answers

Data may be swiftly stored and retrieved using hard disks, which are nonvolatile storage devices. Physical medium that holds data without the need for electricity is known as nonvolatile storage.

Describe hard drives.

Hard disk, commonly known as disk drive simply hard drive, is a computer's magnetic storage media. Hard disks were flat, spherical, glass or metal discs with a magnetic coating. Personal computer hard drives have a storage capacity of terabytes (trillions of bytes).

What functions do hard drives serve?

Your hard drive is just where your computer's irreversible data is kept. Your hard drive stores every file, image, or software program that you save to your system. Storage capacity on hard drives typically ranges from 250GB to 1TB.

To know more about Hard disks visit:

brainly.com/question/9480984

#SPJ4

when citing a website, only the web address needs to be cited. True or false?

Answers

It's true that all that has to be given when referencing a website is the URL.

What two things need to be cited or supported?

Author's first and last names. Page Title Date, Month, Year, and Website Address. Quotes, opinions, and predictions, whether directly quoted or paraphrased, must always be cited, whether the information is found online or in print. by the original author extrapolated statistics. the original's visuals.

Which three citation rules apply?

The fields of science, psychology, and education all use the APA (American Psychological Association). The Humanities use MLA (Modern Language Association) formatting guidelines. Business, history, and the fine arts all frequently employ the Chicago/Turabian referencing style.

To know more about  website visit:-

https://brainly.com/question/19459381

#SPJ4

what total number of compartments are located inside a collective protection system

Answers

Within a collective protection system, there are four compartments.

What exactly is a system of collective protection?

A ship's HVAC system incorporates the Collective Protection System (CPS), a permanent air filtration system. It generates pressure in some places, which will force air outward in the case of a chemical outbreak. Unfortunately, the existing CPS was not created with energy efficiency in mind.

What is an instance of group defense?

The aim of the safety strategy known as collective protection is to simultaneously protect a number of workers who are exposed to a certain risk. The systems used to prevent falls from heights serve as an illustration.

To know more about collective protection system visit:-

https://brainly.com/question/14471213

#SPJ4

what is infinity symbol copy paste ?

Answers

On the num-lock keypad, type 236 while holding down the ALT key. From this page, copy, and then paste it into your website.

Infinity symbol copy and paste what is it?

We learn about infinite in math classes and then discover that it is also employed in physics, philosophy, social sciences, and other fields. There are numerous uncountable things or ideas that have no boundaries or restrictions that define infinity.

What does this symbol's name begin with?

A SUMMARY OF INFINITY'S HISTORY The lemniscate, often known as the lazy eight curve, is the most prevalent representation of infinity. This sign was first used in a dissertation on conic sections written in the seventeenth century. It immediately gained popularity and came to be used as a symbol.

To know more about  copy paste visit:-

https://brainly.com/question/29678223

#SPJ4

there are free resources available online to help you assess your skills. true or false?

Answers

True. There are a variety of free resources available online to help individuals assess their skills, both in general and in specific areas.

Online skill assessment tests: There are several websites that offer free skill assessment tests for different areas, such as math, language, computer skills, and more.Career quizzes: Many websites offer career quizzes that can help individuals identify their strengths and weaknesses, and determine which careers may be a good fit for them based on their skills and interests.Job search websites: Some job search websites offer skills assessments as part of their application process, which can help candidates identify their strengths and weaknesses and better prepare for interviews.MOOCs: Massive Open Online Courses (MOOCs) offer free courses in a variety of subjects, including programming, data analysis, and more. These courses often include skill assessments to help learners determine their proficiency in a given area.

learn more about resources here:

https://brainly.com/question/17530913

#SPJ4

what report shows the percent of site traffic that visited previously?

Answers

The returning report can be found under Audience > Behavior. It calculates the percentage of traffic that has previously visited the website.

What is the act of returning exactly?

to revert to an earlier location, position, or state: Returning from overseas; returning to public office; returning to employment. to return to an earlier owner: The money I provided him will be returned to me if he dies. reappearance, as in thinking, conversation, etc.: He continued his narrative. "He came home," we'd say ordinarily. This is the traditional way of stating it, however it may also be "He returned to his house..." or anything like in a fiction.

Know more about  percentage Visit:

https://brainly.com/question/29306119

#SPJ4

you need to view detailed information for the hr directory in the root (/) directory. type ls -l / at the prompt to answer the following questions: what is the directory size?

Answers

The directory size, based on the query, is 4096

How does Linux determine directory size?

With the help of the du command and its parameters, you could examine the size of directories. Moreover, you may use the quot program to determine how much disk space is occupied by user profiles on native UFS file systems. See du(1M) and quot for more info about these commands (1M).

drwxr-xr-x  5 user group  4096 Jan  1 00:00 hr

In this example, the size of the hr directory is 4096 bytes, which is indicated in the 5th column.

To know more about directory size visit:

https://brainly.com/question/28964942

#SPJ4

Which type of computer crime describes actions in which the computer is used only to further a criminal end? In other words, the computer or data contained therein is not the object of the crime.
A. computer as the instrument of a crime
B. computer as a target
C. computer as incidental to crime
D. crimes associated with the prevalence of computers

Answers

Cybercrime, often known as computer crime, is the use of a computer to advance illicit activities like fraud, the trafficking of child  and other intellectual property, identity theft, and privacy violations.

When a computer is used as a tool to aid in committing a crime, what kind of crime takes place?

Cybercrime is any crime that involves the use of computers or networks to disseminate malware, illicit data, or illicit images.

What do we use to describe any criminal activity involving a computer and a network?

Any criminal behaviour involving a computer, a networked device, or a network is considered a cybercrime. While the majority of cybercrimes are committed to make money for the cybercriminals.

To know more about computer crime visit:-

brainly.com/question/28479203

#SPJ4

what is most visited websites

Answers

As of January 2023, according to Similarweb statistics gathered between December 2021 and November 2022, it continues to be the most visited website worldwide.

What search engine doesn't follow you around?

A well-known privacy search engine is DuckDuckGo (DDG). The same search results will always be displayed to all users of DDG because, like Brave, it doesn't create user profiles. Furthermore, it stops searches or clicks from being tracked online.

Which website grew the quickest?

The New York Times was once more the news website with the quickest growth. According to data from digital intelligence firm Similarweb, visits to nytimes.com increased 69% year over year to reach 644 million.

To know more about most visited websites visit:

https://brainly.com/question/11120086

#SPJ4

Why does my new T-Mobile phone say not registered on network?

Answers

If your new T-Mobile phone is saying "not registered on network," it could be due to several reasons.

What are the possible reasons and solutions for this network issue?

Here are some possible reasons and solutions:

Activation: Your phone might not be activated yet. Contact T-Mobile customer service to make sure your phone is activated.

SIM Card Issue: There could be an issue with your SIM card. Try removing the SIM card and reinserting it. If that doesn't work, contact T-Mobile customer service to order a new SIM card.

Network Issues: Your phone might not be connecting to the network correctly. Try turning off your phone and turning it back on again to reset the network connection. Resetting your network settings can also be done by going to Settings > General Management > Reset > Reset Network Settings.

Software Issues: There might be an issue with the phone's software. Try updating the software on your phone to the most recent version.

If none of these solutions work, contact T-Mobile customer service for further assistance.

To learn more about network, visit: https://brainly.com/question/1326000

#SPJ4

system.out.print is used in a program to denote that a documentation comment follows. TRUE OR FALSE

Answers

It is False that the system.out. print in a program is used to print to indicate that a documentation comment is there. Here, this print() function prints the text on the console.

For instance, the Java print() function is used to show text on the console. This method receives this text as a parameter in the form of a String. With this technique, the text is printed on the console and the cursor is left where it is at the console. The following printing starts just here.

Different print() methods are:

boolean b is printed by the void print(boolean) function. Prints a character using void print(char c).Prints a character array using the void print(char[] s) function. Prints a double-precision floating-point number with the void print(double d) function. void print(float f). The void print(int I function prints an integer. Long l is printed by void print(long l).Prints an object using void print(Object obj). Prints a string in void print(String s).

To learn more about print() function click here:

brainly.com/question/14719179

#SPJ4

Other Questions
Determine the inverse. g(x)=7(x-8) +3for 8 x < when looking into the extended entity relationship model (eerm), which of the following statements is not valid about entity supertypes and subtypes? children's future or children' future What is the molarity of a solution that contains 125 moles nacl in 4. 00 l solution?. A cylindrical rod with a length of 380 mm and a diameter of 10 mm is to be subjected to a tensile load. The rod must not experience plastic deformation or an increase in length of more than 0. 9 mm when a load of 24. 5 kn is applied. Which of the four materials listed in table p1. 13 are possible candidates? justify your answer In Excel, text that begins with a number is still considered text. True or false how does daily table compare to whole foods and the conventional supermarket where you shop on the four principles of conscious marketing? what amount, if any, should paper report as net cash provided by operating activities in its statement of cash flows for the year? You have estimated the value of a planned project by finding the present value (PV) of all the cash inflows from that project. Which of the following would cause the project to look more appealing (have a greater NPV)? A. The discount rate decreases. B. The cash flows are extended over a longer period of time, but the total dollar amount of the cash flows remains the same. C. The discount rate increases. D. Answers a. and b. are both correct. E. Answers b. and c. are both correct. A fruit shop sells dried fruit by the pound. The cost for x pounds of raisins is y=2.5x where y is the total cost for x pounds. The cost for 4 pounds of dried cranberries is $12.include in your answer: The Unit Rate for Raisins The Unit Rate for Cranberries the balance in carlos company's supplies account on december 31 is $3,000. if the supplies used during the year were $750, what is the entry to adjust the supplies account at the end of the year? Most research has come to the conclusion that hypnotically elicited testimony is deficient, especially when leading questions are asked of witness (T/F). how to translate morse code to english Please Help Me!! Will Mark Brainliest!! It's Due Tonight!! 20 Points!! :)Jeff has a sack full of marbles. Each time he picks one out, he puts it back into the sack before drawing another. In his sack there are 5 red marbles, 6 yellow marbles, and 8 blue marbles. Find the following probabilities.c. If two marbles are drawn, what's the chance they are both the same color?d. If two marbles are drawn, what's the chance they are NOT the same color? PLS HURRY! Pre-calculus question in the screenshot. Thank you! explain why it is a common practice to have multiple versions of your resume but only a single linkedin profile. What are molecules vs compounds examples? Two planets are orbiting a star. Planet B can be seen from Planet A with the eye, but as the figure shows, Planet could be located at either of two possible positions. Planet A is 65 million miles from the star and Planet B is 45 million miles from the star, as shown in the figure below. If the viewing angle between the star and Planet B is 19 , find the possible distances from Planet A to Planet B . Round your answers to the nearest tenth. HELP ASAP!!What is the value of x in this triangle?Enter your answer in the box.x = Comprehensive income includes all of the following except _____.a. dividend revenueb. losses on disposal of assetsc. investments by ownersd. unrealized holding gains