the object oriented element that allows us to build more complex objects out of simpler objects is.

Answers

Answer 1

In object-oriented programming, the composition approach divides a big class into smaller classes or objects. It is a technique for combining smaller classes or objects to produce more complex ones.

Which object-oriented component does has-a relationship define?

Association is a relationship of the "has-a" variety. Through the use of their objects, associations create the relationship between two classes. One-to-one, one-to-many, many-to-one, and many-to-many associations are all possible.

What two fundamental building blocks of an object do you see in object-oriented programming?

State: Fields, or member variables in classes, are where an object stores its state. Specified behaviours - A method is how an item communicates its behaviour (functions in some programming languages).

To know more about programming visit:-

https://brainly.com/question/11023419

#SPJ1


Related Questions

when you enter text in the criteria row, access places the text in _______ for you. quotation marks parentheses brackets italics

Answers

In Access, text that is entered into a criterion needs to be enclosed in quotation marks.

When you use text that could confuse the query, you can use quotes instead of Access' automatic addition of quote marks at the end of each condition. For instance, if you include the words "and" or "or" in a statement. Access reads them as directives. As an illustration, the criterion "Chicago" displays all objects that contain the text Chicago. This article includes a number of examples of query criteria that you may apply to the Text data type to help you find the desired information more quickly and with more precision.

Learn more about criterion access here:

https://brainly.com/question/28232188

#SPJ4

what is the serach engine who integrated to artificial intelligence software from openai, the maker of the popular chatbot chatgpt from microsoft,

Answers

The search engine that has been integrated with OpenAI's Artificial Intelligence software is Microsoft Bing.

What is OpenAI?

OpenAI is a nonprofit artificial intelligence research company that works to develop and promote friendly AI in order to benefit humanity as a whole. OpenAI is focused on creating an AI-powered future that is safe, prosperous, and inclusive.

Microsoft Bing is a web search engine developed by Microsoft, and it is the second largest search engine in the world. It has been integrated with OpenAI's Artificial Intelligence software to deliver more accurate and personalized results. Microsoft has also integrated its own chatbot, ChatGPT, into Microsoft Bing's AI-powered search engine. This integration has allowed Bing to return more detailed and relevant search results to users, while also providing a more natural conversation experience.

To learn more about OpenAI
https://brainly.com/question/26101173
#SPJ1

Can an HTML file be edited by people?
a. No, HTML is a special format that is unreadable to people.
b. No, the Internet's governing body does not allow people to view HTML files.
c. Yes, but humans cannot make sense of HTML due to such files being mostly 0's and 1's.
d. Yes, because HTML is just normal text, with tags throughout (though some HTML is hard to read).

Answers

The correct answer is d. Yes, because HTML is just normal text, with tags throughout (though some HTML is hard to read).

HTML (Hypertext Markup Language) is a markup language used for creating web pages. It is a plain text file that contains markup tags to specify the structure, content, and formatting of a web page. Since HTML is a plain text file, it can be opened and edited with any text editor.

Although HTML files may contain tags that make them appear cluttered and difficult to read for some people, they can be edited and modified by anyone with knowledge of HTML tags and syntax. There are also various HTML editors and Integrated Development Environments (IDEs) that make editing and creating HTML files easier and more user-friendly for web developers and designers.

Learn more about html here:

https://brainly.com/question/17959015

#SPJ4

what is the function of the linux man command? (choose three.)

Answers

On Linux, we can execute the man command to view the user manual for every command we can enter into the terminal.

What does the Linux man command's entire name mean?

Man command in Linux. A user can ask for a man page to be displayed by simply typing man, a space, and then argument.

What purpose do man pages serve in Linux?

Man pages are merely manual pages designed to assist users in comprehending how Linux commands are used. By default, these pages are installed alongside the commands. A man page that was produced by a software developer will always be available to explain how to use a particular command.

To know more about command visit:-

https://brainly.com/question/3632568

#SPJ4

Can I use Turnitin plagiarism checker for free?

Answers

Plagiarism detection software for students. Check for plagiarism before submitting your work. Before you turn it in, double-check for originality. Download Grammarly for free. Improve your word choice.

Could you please explain detection?

The act of noticing or discovering something is known as detection. You might see German Shepherds trained to detect drug smuggling or explosives in luggage at the airport. Detection, detect, detective, detector — all of these terms refer to noticing and discovering. The term "Programming" refers to the act of programming something. There is no such thing as the best type of threat detection. Depending on the business requirement, each category can support a variety of requirements and approaches.

Know more about  programming Visit:

https://brainly.com/question/11023419

#SPJ4

Pass-by-value is used when optimal program performance is necessary. (T/F)

Answers

When optimal program performance is required, pass-by-value is used. Response Comments: Pass-by-value slows down performance by making duplicates of data that aren't needed.

Why is it often preferred to iterate over recursion?

In contrast to a naive iterative approach, recursion in the divide and conquer method can reduce the size of your problem at each step and take less time. Recursion is frequently regarded as more "elegant" than iterative solutions due to its ease of implementation.

How is the pass by value result achieved?

Pass by value creates two independent variables with the same value for the caller and callee by copying the actual parameter's value in memory. The caller is unaware of any changes made to the parameter value by the callee. Overview: deems an argument to be valid.

To know more about optimal program visit :-

https://brainly.com/question/28443444

#SPJ4

how to solve "expression must have integral or unscoped enum type"?

Answers

This error typically occurs when you try to assign an expression that does not have an integral or unscoped enum type as its type. To solve this problem, you'll need to make sure that the expression you are assigning is of a valid type.

What is Error ?

Error is an event that occurs when a computer program, system, or device does not function as expected. Errors are typically caused by a software bug, incorrect user input, or a hardware issue. Common symptoms of an error include a “crash” of the program or system, a freeze-up, or unexpected output.

For example, if you are trying to assign a double to a variable of type int, you will need to explicitly cast it to an int. You can do this by using the static_cast<int>() function.

To learn more about Error

https://brainly.com/question/29499800

#SPJ4

Final answer:

To solve the 'expression must have integral or unscoped enum type' error, check the type of the expression being used and ensure compatibility with the context. Cast the expression to the appropriate type if necessary.

Explanation:

The error message 'expression must have integral or unscoped enum type' is often encountered in programming languages such as C++ or Java when trying to use an expression that does not have an integral or enum type. A common cause of this error is when an expression of a different type is used where an integer or an enum is expected, such as in conditional statements or arithmetic operations.

To solve this error, check the type of the expression being used and ensure that it is compatible with the context in which it is being used. If necessary, cast the expression to the appropriate type using explicit type casting or conversion functions. For example, if you're trying to perform arithmetic operations with a float and an integer in C++, you would need to cast the float to an integer using the static_cast or int functions.

It's important to understand the underlying data types and their compatibility in order to resolve this error. Reviewing the documentation or seeking guidance from programming resources can also provide further insights on how to solve this issue.

Learn more about Error handling in programming here:

https://brainly.com/question/36416453

the most widely used character encoding standard today is

Answers

Unicode is the most widely used character encoding standard today.

What is Unicode?

Unicode is a computing industry standard for consistent text encoding, representation, and handling in most of the world's writing systems.

It includes a wide range of characters, including letters, numbers, and symbols, from multiple languages and scripts, making it possible for computers and devices to display and exchange text in a consistent and universal way.

Unicode is supported by all major operating systems, programming languages, and web browsers, and it has become the de facto standard for text encoding in modern computing.

To learn more about Unicode, visit: https://brainly.com/question/13151086

#SPJ4

wyd...tmr no school so happy(:

Answers

Answer:

Just writing, there's no school today either, well at least for me

Explanation:

You're welcome.

Answer: Nothing much, probably just homework and softball practice. I was also off today because of the snow.

Explanation: Have a good day!

what security standard was introduced in conjunction with uefi?

Answers

A signature and hash-checking technique called Secure Boot has been added to the UEFI boot process.

UEFI security: what is it?

A feature listed in the UEFI Standard is UEFI Secure Boot. It ensures that the Original Equipment Manufacturer (OEM) firmware environment can only run legitimate third-party firmware code. The system firmware is considered to be a trusted entity by UEFI Secure Boot.

Why does UEFI use Secure Boot?

UEFI Secure Boot is a feature that provides verification of the boot chain's current state. It is intended to make sure that only UEFI binaries that have undergone cryptographic verification are executed after the firmware has been self-initialized.

To know more about Secure Boot visit:-

https://brainly.com/question/30559670

#SPJ4

how does software-defined networking reduce both the risk of human error and overall network support and operations costs?A. It ensures network resources such as printers are used correctly
B. It allows individualized configuration through manual input
C. It increases physical access to all network devices
D. It automates configuration, policy management and other tasks

Answers

Network configuration software By automating configuration, policy management, and other duties, it is possible to lower the risk of human mistake as well as overall network support and operations expenses.

Which three benefits are connected to a software defined network?

Enterprise corporate network management is being centralised and made simpler by software defined networking, or SDN. The ability to provide policy-driven network monitoring, be agile, programme traffic, and apply network automation are among SDN's most popular benefits.

Which two advantages come with utilising SDN for SD WAN?

The advantages of SD-WAN include: more bandwidth for less money. branch network management that is centralised.

To know more about configuration visit:-

https://brainly.com/question/14307521

#SPJ1

what contains information about a single entry or observation in a database?A) recordsB) formC) fieldsD) tables

Answers

Answer:

A) Records is the answer

how to lowercase in python

Answers

A built-in Python function called.lower() is mostly used to handle strings. Every capital character in the string is converted to lowercase in python

using the.lower() method,

How does Python lowercase letters?

There is a built-in Python method that can convert an uppercase string to a lowercase string. That also holds true for strings including both capital and lowercase letters. The strings are converted to lowercase using the ". lower()" technique.

How do you use lowercase and capital letters in Python?

The lower() method turns all of the characters in a string to lowercase, while the. upper() method converts all of the characters to uppercase.

To know more about lowercase in python visit :-

https://brainly.com/question/16914556

#SPJ4

the security framework is a more detailed version of the security blueprint. T/F

Answers

According to the question of framework, the answer of the question is false.

What is framework?

A framework is a set of pre-defined rules and standards that are used to develop software applications. It is an abstraction in which software providing generic functionality can be selectively changed by additional user-written code, thus providing application-specific software. A framework is a collection of classes, libraries, and tools that provide a structure for development. It also provides an environment that enables developers to create applications quickly and efficiently. A framework helps in maintaining and managing the code by allowing developers to use already existing code instead of writing it from scratch. It also helps in writing code that is easy to debug, maintain, and extend.

The security framework is a basic outline of the security blueprint.

To learn more about framework

https://brainly.com/question/30579663

#SPJ1

What is the format for the while clause in Python? A. while condition. B. while condition : statement.C. while condition statement. D . while condition

Answers

Answer:

The format for the while clause in Python is B. while condition : statement.

Explanation:

The while statement is used to execute a block of code repeatedly as long as a particular condition is true. The syntax of the while statement in Python consists of the while keyword followed by a condition, a colon, and an indented block of code that will be executed repeatedly while the condition is true.

Here is an example of a while loop in Python:

count = 0

while count < 5:

   print("Count is:", count)

   count += 1

In this example, the while loop will continue to execute as long as the value of count is less than 5. The indented block of code inside the loop will be executed repeatedly, printing the current value of count and incrementing its value by 1 in each iteration, until the condition count < 5 is no longer true.

꧁༒αηѕωєяє∂ ву gσ∂кєу༒꧂

Which three statements best describe actions that you can do with the feature attributes in a GIS?
Choose three.
-Answer questions
-Delete features
-Modify feature geometry
-Symbolize features
-Find patterns

Answers

Respond to queries, the operations you can take with the feature characteristics in a GIS are best described by Simply represent features and Discover patterns.

How would you define an attribute? 

any property, trait, or feature attributed to somebody or something. possesses leadership qualities. : an item that is intimately linked to or belongs to a certain person, item, or institution. The symbol of leadership is a scepter. especially: a piece of art or sculpture that utilizes a similar object for identification.

What does a database attribute mean?

An attribute in a rdbms (DBMS) is a data element that characterizes an entity. For instance, the properties in a client database might include identity, address, and contact information. Name, price, and production date are examples of attributes that could be found in a product details.

To know more about attribute visit:

https://brainly.com/question/14312202

#SPJ4

When the economy is doing badly, which of the following workers is NOT likely to have fewer customers or patients who want their services?

Answers

A nurse is someone who has completed a basic, generic nursing education program and is qualified to either operate patients or assist doctors during operations.

What tasks does a nurse perform?

In addition to providing patient care, nurses also communicate with doctors, manage medications, and analyse vital signs. Nurses play a crucial role in healthcare institutions and have a significant variety of career options, making them the largest healthcare occupation in the United States.

What is the Indian economy's issue?

Poverty Issues Poverty is a problem for the Indian economy as well. This creates a vicious cycle because a sizable segment of the population is unable to engage in the economy.

To know more about program visit:-

https://brainly.com/question/14618533

#SPJ1

describe how android uses a unique virtual machine for running java programs.

Answers

Android uses a unique virtual machine called the Dalvik Virtual Machine (DVM).

When a Java application is compiled, it is compiled into Java bytecode, which is a platform-independent format that can be executed on any Java Virtual Machine (JVM). However, the DVM is not a standard JVM, and cannot directly execute Java bytecode. Instead, the Java bytecode is converted to a special format called Dalvik Executable (DEX) format, which is optimized for the DVM.

The DEX format is designed to reduce the memory footprint of Java applications, which is particularly important for mobile devices with limited memory. It does this by using a compact representation of bytecode instructions and optimizing the organization of data structures.

When an Android application is installed on a device, the DEX files are packaged into an application package (APK) file. When the application is launched, the DEX files are loaded into memory and executed by the DVM. Each application runs in its own instance of the DVM, which provides a layer of isolation between applications and helps to ensure that one application cannot interfere with another.

In addition to running Java programs, the DVM also provides a number of other features that are specific to Android, such as garbage collection, interprocess communication, and access to Android's core libraries and services.

Overall, the use of a unique virtual machine for running Java programs allows Android to provide a secure, efficient, and scalable platform for mobile application development.

Learn more about DVM here:

https://brainly.com/question/13567761

#SPJ4

which type of operating system runs on a firewall router or switch A. Operating System B. Network Operating System

Answers

Network Operating System is operated on a firewall, router, or switch, so answer option (B) is accurate.

What is a firewall and why is it used?

A firewall is basically the barrier that stands between a private internal network and the open Internet at its most basic level. The primary function of a firewall is to let safe traffic in while blocking dangerous traffic.

Do I need a firewall on my router?

Since a gateway serves as a home network's primary conduit to the Internet, it also serves as a firewall. For privacy protection, a firewall should be installed on every residential network.

To know more about firewall visit :

https://brainly.com/question/24196479

#SPJ4

T/F. a comment in excel can capture an ongoing text conversation.

Answers

It is accurate to say that an excel comment can record a text dialogue in progress.

Can Excel threaded chats incorporate comments?

The way comments function has changed in Excel for Microsoft 365. Now that comments are threaded, you can discuss the data with other readers. Notes function similarly to comments did in older iterations of Excel and are used for creating notes or remarks regarding the data.

What is a comment and how is it used?

Comments are text notes that are included into programs to provide explanations of the source code. In a programming language, they are used to describe the program, remind programmers of the tough things they recently accomplished with the code, and assist the following generation.

To know more about comments visit:-

https://brainly.com/question/30318947

#SPJ1

Constructing a decision tree to visually represent the logic in a multi-outcome IF problem is often recommended before translating it into Excel pseudo code and then the nested IF function. (True/False)

Answers

True. Before translating a multi-outcome IF problem into Excel pseudo code and then the nested IF function, building a decision tree is frequently advised.

What Excel feature is used to make a decision based on comparisons?

The IF function in Excel, which enables you to compare values rationally to expectations, is one of the most popular functions. Hence, an IF statement can result in two different results.

What procedure do you employ to decide based on a condition?

A programme is guided to make decisions based on predetermined criteria using the IF statement, which is a decision-making statement. If a certain condition is met (true) or another piece of code evaluates to a certain value, the IF statement executes one set of code.

To know more about pseudo code visit:-

https://brainly.com/question/12905902

#SPJ1

creating a(n) means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy. a. mirror b. hidden file c. index d. backup

Answers

Creating a(n) means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy backup.

What is files?

Files are collections of digital information stored on a computer or other digital device. They can contain any kind of data, including text, images, audio, video, or other multimedia content. Files are organized into folders and directories, which help keep them organized and easily accessible. Files can be created, modified, and deleted, with various levels of security in place to protect them from unauthorized access. Files are managed by the operating system, which is responsible for organizing, accessing, and manipulating them. Files can be shared between users, applications, and devices, making them a powerful tool for collaboration.

To learn more about files

https://brainly.com/question/29511206

#SPJ1

question 1 how are while loops and for loops different in python?

Answers

In Python, while loops are used when the number of iterations is not known in advance, whereas for loops are used when the number of iterations is predetermined by an iterable object like a list or string.

In Python, while loops and for loops are two types of loops that are used to repeat a block of code multiple times. While loops are used when the number of iterations is not known in advance and the loop will continue until a certain condition is met. The syntax for a while loop is "while condition: statement(s)". For loops, on the other hand, are used when the number of iterations is predetermined by an iterable object like a list or string. The syntax for a for loop is "for variable in iterable: statement(s)". For loops can also use the range() function to generate a sequence of numbers, while while loops typically use a counter variable to control the number of iterations.

Learn more about Python here:

https://brainly.com/question/30427047

#SPJ4

how to change the document so the first page has a different header from the rest of the document

Answers

To change the header on the first page of a document so that it is different from the headers on the rest of the document, we have to follow certain steps.

What are the steps to chage to change the header on the first page?

We can use the following steps:

Open the header area of the first page. You can do this by double-clicking on the header area of the first page, or by going to the "Insert" tab, clicking on "Header" and then selecting "Edit Header".

Create the header for the first page. This can include different text, graphics or other elements than the header on the rest of the document.

Once you have created the header for the first page, go to the "Design" tab in the ribbon.

You should now see that the header on the first page is different from the header on the rest of the document.

If you want to make further changes to the header on the first page or the headers on subsequent pages, simply edit each header separately by double-clicking on the header area of each page.

Once you have finished editing the headers, you can exit the header area by double-clicking on the body of the document or by clicking on the "Close Header and Footer" button in the "Design" tab.

To learn more about header, visit: https://brainly.com/question/12435434

#SPJ4

Where is the reference page in APA?

Answers

The reference page in APA is located at the end of a paper and lists all sources cited in the text. It is titled "References" and follows specific formatting guidelines.

The reference page in APA (American Psychological Association) style is an alphabetical listing of all sources cited in a paper, including books, articles, online sources, and other types of media. It is typically located at the end of the paper and titled "References" in bold and centered at the top of the page. The entries on the reference page are double-spaced with a hanging indent, and follow a specific format based on the type of source. The format includes author names, publication dates, titles, publisher information, and other relevant details. It is important to carefully follow the formatting guidelines for references to ensure accuracy and consistency in citing sources.

Learn more about APA here:

https://brainly.com/question/29929992

#SPJ4

what would happen if the electrical signals radiated out from the av node rather than being routed to the apex of the heart?

Answers

The atria and ventricles would contract at the same time The ventricles would start squeezing from the top to the bottom The AV node and the SA node would be unable to communicate.

The heart works similarly to the rest of your body's muscles in that it is controlled by electrical impulses. Nonetheless, whether you are awake or asleep, your heart must work constantly. It utilizes your autonomic nervous system, a distinct section of your neurological system, to accomplish this. It controls the bodily processes that you don't think about. This is the unconscious portion of your nervous system. This includes your breathing, digestion, heart, and other bodily functions.

It is also crucial to consider when your heart muscle moves. It depends on the conduction system of your heart, not the brain, to fire the electrical impulses.

learn more about atria and ventricles  here:

https://brainly.com/question/11504953

#SPJ4

what does a pc (personal computer) need more of to open more programs simultaneously and work on large files more efficiently

Answers

Opening large applications, software, or files requires a lot of RAM in order to use them efficiently. Upgrading the computer's memory will increase memory space and thus allow larger programs to run without slowdowns.

The term "memory" refers to a system or device used to temporarily store data for use by a computer, other associated digital electronic devices, or both.  When compared to storage, which moves more slowly but is more affordable and has a bigger capacity, computer memory functions at a rapid pace. Computer memory also functions as a disk cache and write buffer to enhance reading and writing performance in addition to holding opened programs. As long as running software doesn't require it, operating systems can use RAM for caching.  If necessary, the contents of the computer memory can be moved to storage; virtual memory is a common method for doing this.

learn more about computer memory here:

https://brainly.com/question/30273393

#SPJ4

what do you call messages that are received almost instantaneously after transmission?

Answers

I nstant messaging (IM) is the term used to describe the real-time or instantaneous d elivery of messages over the internet, a c orporate i ntranet, or a server.

When did D irec TV and D ish Network start offering s atellite t elevision s ervices?

As Hughes D irecTV and D ish Network s atellite t elevision systems debuted in 1994, it lost some of its appeal. In the U nited S tates, D SS-formatted d igital s atellite t ransmissions first appeared in 1994 on DirecTV.

What does s ynchronous t ransmission mean in practice?

There is no gap between data during s ynchronous t ransmission. Transferring a huge amount of data is more effective and dependable than asynchronous transmission. Consider c hat rooms.

To know more about I nstant messaging visit :-

https://brainly.com/question/14403272

#SPJ4

_________ software development methodology is more appropriate when user specifications are unclear or are constantly changing.a. Agileb. Waterfall

Answers

Due to its emphasis on iterative and incremental development, the agile software development process is better suited when user specifications are ambiguous or subject to frequent change.

Agile software development methodology is a set of principles and practices that focus on iterative and incremental development. It is a way of managing software development projects in which the requirements and solutions evolve through collaboration between self-organizing, cross-functional teams. It is especially suited for situations in which user specifications are unclear or are constantly changing. Agile emphasizes the use of short development cycles to quickly build, test and deliver software. This approach allows for rapid feedback and adaptation to changing requirements throughout the development process. Agile also promotes collaboration between developers, customers and stakeholders throughout the development process. The result is a product that is more likely to meet the customer's needs, as well as being delivered more quickly and efficiently.

Learn more about software here-

brainly.com/question/29946531

#SPJ4

what are patch cables used for? (select two.)

Answers

Patch cables are commonly used in networking and audio applications.

Patch cables are frequently employed in audio and networking applications. These are two particular applications for patch cables: Networking: In networking, patch cables are frequently used to link network components, such as PCs, switches, and routers, to one another or to a network socket. These cables typically have a short length with two connectors on each end, such as RJ-45 or RJ-11. Patch cables are also used in audio applications to link together various audio equipment, including amplifiers, mixers, and speakers. These cables can be used to carry audio signals over small distances and are typically made with 1/4-inch or RCA connectors on each end.

Learn more about networking here:

https://brainly.com/question/13102717

#SPJ4

Other Questions
a lot measures 248.4 x 378.9. how many acres is that A. 2.12 B. 2.13 C. 2.14. D. 2.15 E. 2.16 which of these describe the area of applied ethics that focuses on real-world situations and the context and environment in which transactions occur? what does rotten tomatoes mean Under her cell phone plan, Piper pays a flat cost of $38.50 per month and $5 per gigabyte, or part of a gigabyte. (For example, if she used 2.3 gigabytes, she would have to pay for 3 whole gigabytes.) She wants to keep her bill under $60 per month. What is the maximum whole number of gigabytes of data she can use while staying within her budget? why is the carboxyl group dissociated at physiologic ph what county is michigan state university located in Write your own subordinating clauses to finish these sentences. a My father, would d The packets, never let me be an astronaut. b The dog, living thing in space. c I saw the movie. was the first into a special bin. e My friend, very intelligent. 1 Animals. experiments. Grammar: sentence Use the drop-down menus to choose the form of the verb that agrees with the subject.Families their older relatives on the first day of the Chinese New Year.Subsequent days of the Chinese New Year celebrated in various ways.Some people special treats to dogs on the second day.Neither my sister nor my parents to miss the Chinese New Year celebration in our town. calculate the hire purchase plan regular price $4 049 Warranty $599 interest rate 54% 36 monthly instalments Why does Frankenstein marry Elizabeth? the italian renaissance was first centered in florence and then ___________. past continuos of work If a customer uses a discount code that offers a 25% discount and free shipping, the hammer will cost $17.25. There is no sales tax if the customer buys the hammer online. What is the original price of the hammer from the online retailer? The speed of sound in air is about 1225 kilometers per hour. The speed of sound in seawater is about 1520 meters per second. Does sound travel faster in air or in seawater? How many times faster? a nurse is working with a limited staff because of a severe storm in the area. the facility incident commander has chromatin consists of . chromatin consists of . membrane wrapped around rna membrane wrapped around dna dna and protein rna and protein The time to complete a construction project is normally distributed with a mean of 60 weeks and a standard deviation of 4 weeks. Solve all following questions both manually (by looking up the Z table) and using Excel.(1) (2 pts for manual calculation; 2 pts for using Excel) What is the probability the project will be finished in 62 weeks or less?(2) (2 pts for manual calculation; 2 pts for using Excel) What is the probability the project will take longer than 65 weeks?(3) (2 pts for manual calculation; 2 pts for using Excel) What is the probability the project will be finished between 62 and 66 weeks? it is important to pre-wet the filter paper before filtering your sample. which statements about this step of the procedure are true? more than one answer may be correct. Re-read chapter 1 of Pride and Prejudice. Then, in a well-organized essay, discuss the authors attitude toward both Mr. and Mrs. Bennet and how she uses language to communicate this attitude to the reader. Refer to the author as Jane Austen the first time, then only as Austen.Create a Thesis Statement. Which of the following is currently an embryonic industry?A. Personal computersB.BiotechnologyC.Internet retailingD.NanotechnologyE.Wireless communications