What is a data structure containing a hash, previous hash, and data?

Answers

Answer 1

A data structure that contains a hash, previous hash, and data is known as a blockchain or blocks.

What is the data structure of blockchain?

The data structure of the blockchain may be described as an ordered, back-linked list of blocks of transactions. The blockchain can be stored as a flat file, or in a simple database. The Bitcoin Core client stores the blockchain metadata using the LevelDB database.

There are numerous types of data structures generally found in computers. It may include Array Data Structure, String Data Structure, Linked List Data Structure, Stack Data Structure, Queue Data Structure, Binary Tree Data Structure, Heap Data Structure, and Hashing Data Structure.

Therefore, a data structure that contains a hash, previous hash, and data is known as a blockchain or blocks.

To learn more about Data structures, refer to the link:

https://brainly.com/question/13147796

#SPJ1


Related Questions

what are the popular avenues for publishing a web site once it has been built?
a. online services, software tools, and plain text editors
b. ASP.NET, Dreamweaver, and JavaServer Pages
c. ISPs, free sites, and Web hosting services
d. Nvu, Adobe, ColdFusioin, and RapidWeaver

Answers

The popular avenues for publishing a website once it has been built are ISPs, free sites, and web hosting services. Therefore, the correct option is C.

What are web hosting services?

Web hosting services are services that allow individuals and organizations to make their website accessible via the World Wide Web. A web hosting service provider typically provides the server space, internet connectivity, and other services required to host and maintain websites.

These services are essential for making websites accessible on the internet, and they provide businesses and individuals with the tools and resources they need to establish and maintain an online presence. Therefore, the correct option is C.

Learn more about web hosting services, here:

https://brainly.com/question/28432385

#SPJ1

Our opportunities to belong to and access social networks have skyrocketed in recent years due to the Internet. Place the following in order from lowest to highest percentage17 percent in 2018, 98 percent of American adults in households earning $75,000 or more a year were using the Internet

47 percent in 2000, 81 percent of American adults in households earning $75,000 or more a year were using the Internet

52 percent of American adults used the Internet in 2000

57 percent of American teens have made new friends online

81 percent of adults used internet in 2000

In 2018, 89 percent of American adults were using the Internet

Answers

In 2000, 52% of adults in America utilised the Internet. In 2000, 81 percent of adults utilised the internet. 47 percent of American adults in homes making $75,000 or more in 2000.

What advantages do social networks now provide for society?

The ability of social networks to help people connect and stay in touch with family, friends, and new contacts; the chance they provide businesses to market their brands; and their capacity to instantly spread helpful, even crucial information to people and institutions are just a few of the advantages they offer.

A social network's definition What makes social networks vital in contemporary society, in your opinion?

Social networking sites and applications enable connections, communication, information sharing, and the development of relationships between individuals and groups.

To know more about Internet visit:-

https://brainly.com/question/21565588

#SPJ1

how to convert bits to bytes

Answers

To convert bits to bytes, you need to divide the number of bits by 8. This is because there are 8 bits in a byte. For example, if you have 16 bits, you would divide 16 by 8 to get 2 bytes. Here is the formula:

Number of bytes = Number of bits / 8

So, if you want to convert 32 bits to bytes, you would do the following calculation:

32 bits / 8 = 4 bytes

Therefore, 32 bits is equal to 4 bytes.

Difference between bit and byte

We can say that 1 byte is 8 bits, therefore, 1 byte can represent 28 (256) different states.

For more information about bit and byte, visit:

https://brainly.com/question/28261277

#SPJ11

when a program uses the setw manipulator, the iosetwidth header file must be included in a preprocessor directive. (True or False)

Answers

In order for the application to use cin, the header file must be included. The cin object instructs a program to wait until the enter key has been depressed after data has been entered on the keyboard.

What manipulator is used to determine the field size for the value that comes after it?

A newline character will cause the cin >> statement to stop reading input. The value immediately after this manipulator is given a field width by this manipulator.

What is the purpose of the SETW manipulator?

The C++ manipulator known as setw stands for set width. The manipulator determines the minimum amount of character positions a variable will require or sets the ios library field width. To put it simply, the setw C++ function aids in setting the field width.

To know more about header file visit:-

brainly.com/question/29603734

#SPJ4

there is a problem with the data dictionary. the drop-down fields do not have all of the options that are needed. this is a problem with

Answers

There is a problem with the data dictionary. the drop-down fields do not have all of the options that are needed. this is a problem with data quality.

The design or execution of the data dictionary. It sounds as though the drop-down fields' options have not been properly adjusted to accommodate all relevant possibilities. You must check the data dictionary's setup and make sure that all relevant options are present in the drop-down fields in order to resolve the issue. This can need changing the data dictionary's settings or its underlying data sources, or both. In order to reflect changes in the data being analyzed, it is also crucial to make sure that the data dictionary is continuously updated. This can assist in avoiding reoccurring issues of the same nature.

Learn more about data dictionary here:

https://brainly.com/question/8897251

#SPJ4

What is the best protocol for transferring video through a network?
A. UDP
B. UDR
C. TCR/IP
D. TCP/IP

Answers

In general, TCP/IP is typically used for video streaming and other data transmission applications that require reliable, error-free delivery of data.

What is protocol?

In computer networking, a protocol is a set of rules and procedures that govern the communication between devices on a network. It defines how data is transmitted, received, and interpreted by devices on the network. Protocols can cover a wide range of network functions, including the physical connections between devices, the format and content of data transmitted over the network, and the rules for managing and controlling network traffic. They can also define the behavior of specific applications that run on the network, such as email, file transfers, or video streaming. Some examples of commonly used network protocols include TCP/IP, HTTP, FTP, SMTP, and DNS. These protocols are essential for ensuring that data is transmitted correctly and efficiently across the network, and that devices can communicate with each other in a standardized and predictable way.

Here,

TCP/IP (Transmission Control Protocol/Internet Protocol) is a reliable, connection-oriented protocol that provides error detection and correction, flow control, and congestion control. This makes it well-suited for streaming video over a network, as it ensures that the video data is delivered in the correct order and without errors, and can also adjust the data transmission rate based on network conditions to prevent data loss.

To know more about protocol,

https://brainly.com/question/13327017

#SPJ4

How are console apps displayed?
a) In a window form.
b) In the Command Prompt.
c) Console apps have no output to
display.
d) It depends.

Answers

The Command Prompt displays console apps. Some consumers simply favour console-based programmes, while some businesses continue to employ legacy console programmes for critical data processing operations.

A console application is a software application that is intended to be used through a text-only computer interface, such as a text terminal, the command-line interface of some operating systems (Unix, DOS, etc.), or the text-based user interface found in the majority of graphical user interface (GUI) operating systems, such as the Windows Console in Microsoft Windows, the Terminal in macOS, and xterm in Unix.

Modern programming environments, including Visual Studio and the.NET Framework on Microsoft Windows, nevertheless support the creation of console programmes. By eliminating the complexity of a graphical user interface(GUI), it makes learning a new programming language easier.

To learn more about Command Prompt click here:

brainly.com/question/29491045

#SPJ4

What is washing machines at lowe's?

Answers

Shop dishwashers and a selection of special value products for shop appliances

How do machines work?

A mechanical device called as a simple machine changes the direction or strength of a force. Just like Our bodies function like machinery .Our bodies function like machinery. For instance, our arms.

Describe a fluid?

Having particles that move and change relative values easily without mass separation, and can be simply bent to pressure. Fluids are substances that exhibit fluidity. Fluids include, for example, liquid and gas. The ability of a particle to move about in space is due to its fluidity. In general, gases are more fluid than liquids.

To know more about machines visit :

brainly.com/question/2555822

#SPJ4

What is link for login to utsa blackboard ?

Answers

Users can access Blackboard by logging in with their myUTSA ID, abc123. To access Blackboard, users must activate their myUTSA id.

Describe the Blackboard?

Black or dark gray slate rock was originally used to make smooth, thin sheets for blackboards. According to Concordia University, students in the late 18th century utilised their own miniature chalkboards made of painted wood or slate before wall-sized chalkboards were invented. In reality, those earliest boards were black, and they provided a foundation for the bigger ones.

A slate is what?

Quartz as well as other minerals make up slate, a form of grey metamorphic rock. Thin layers of the rock can be separated, and the slate can then be used for items like roofing tiles. Because paper was more expensive in the past, students utilised.

To know more about Blackboard visit :

https://brainly.com/question/30640047

#SPJ4

what is chase cashier's check

Answers

A Chase cashier's check is a type of check that is issued by Chase bank and guaranteed by the bank.

It is similar to a regular check, but the funds are taken directly from the bank's account rather than the individual's account. This means that the recipient of the check can be sure that the funds will be available when they try to cash it.

Chase cashier's checks are typically used for large purchases or transactions where the recipient wants to ensure that the funds will be available.

What is a check?

A check is an accounting document that is made and delivered by one person to another so that the latter can withdraw a certain amount of money.

For more information about Chase cashier's check, visit:

https://brainly.com/question/30399515

#SPJ11

which windows server 2012/r2 edition allows installing unlimited virtual instances?

Answers

Standard edition allows up to 2 virtual instances while the Datacenter edition allows unlimited number of virtual instances.

A data centre is, at its most basic level, a physical location that businesses employ to store their important applications and data. A network of computing and storage resources that enables the delivery of shared applications and data forms the foundation of a data center's design. Servers, storage systems, switches, firewalls, routers, and application-delivery controllers are the main elements of a data centre design. In comparison to recent years, modern data centres have undergone significant changes. Traditional on-premises physical servers have given way to virtual networks that enable applications and workloads across pools of physical infrastructure, as well as a multicloud environment.Data exists now and is interconnected across several data centres.

learn more about  Datacenter here:

https://brainly.com/question/29354877

#SPJ4

which is correct concerning technology control plans (tcps)

Answers

A Technology Control Plan (TCP) helps to ensure that controlled materials are not accessed by unauthorised individuals.

What exactly is unauthorised use at work?

Unauthorised access occurs when an employee or member of the public enters areas of a business that are not accessible to them, regardless of the means of entry. Physical security breaches are most commonly caused by stolen or lost keys, security passes, or fobs. Unauthorized activities include, but are not limited to, the following: Obtaining, employing, or attempting to employ another person's password. Viewing, copying, transferring, modifying, or making public another user's files, printouts, or computer processes without their oral or written permission.

Know more about  Technology Visit:

https://brainly.com/question/15059972

#SPJ4

What does return true mean Java?

Answers

If the Boolean objects have the same value, the function returns true. If the Boolean objects indicate a different value, the function returns false.

What does a function mean exactly?

The term "function" refers to the relationship between a set of inputs and one output per input. In layman's terms, a function is an association of inputs where each input is linked to exactly one output. With each function, there is a domain, codomain, or range. An expression, rule, or law in mathematics that describes the connection between an independent variable and a dependent variable (the dependent variable). The construction of physical relationships in mathematics and the sciences depends on functions.

Know more about  Boolean Visit:

https://brainly.com/question/29846003

#SPJ4

what is national software reference library

Answers

The National Software Reference Library (NSRL) was created with the purpose of gathering software from diverse sources and incorporating computed file characteristics.

What is NSRL's purpose?

The National Software Reference Library (NSRL), which offers a set of hash values for well-known software in its Reference Data Set (RDS), is a crucial data source for forensic investigators. Unfortunately, the NSRL RDS hasn't been evaluated against a wide range of real-world data before.

Who oversees the NSRL?

The NSRL, which is maintained by computer scientists at the National Institute of Standards and Technology (NIST), enables cybersecurity and forensics specialists to keep track of the enormous and continuously expanding volume of software on computers, mobile phones, and other digital devices around the globe.

To know more about national software library visit:

https://brainly.com/question/29099204

#SPJ4

a collection of facts in a raw or unorganized form such as numbers or characters that has been cleaned of errors and further processed in a way that makes it easier to measure, visualize and analyze for a specific purpose is know as what?

Answers

A collection of facts in raw or unorganized form, such as numbers or characters, that has been cleaned of errors & processed in way that makes it easier to measure, visualize, and analyze is known as "data."

Data can be collected from various sources, such as surveys, sensors, transactions, or social media, and can be in different formats, such as text, image, audio, or video.

Data can be processed using various techniques, such as filtering, sorting, aggregating, transforming, or modeling, to extract useful information, patterns, or insights.

Data can be analyze using various tools and methods, such as statistics, machine learning, data mining, or visualization, to gain a deeper understanding of the underlying phenomena, predict future outcomes, or make informed decisions.

Data can be classified into different types, such as numerical, categorical, text, time-series, or spatial, depending on their characteristics and the analysis methods used.

Data can also pose various challenges, such as missing values, outliers, biases, privacy concerns, or ethical implications, that need to be addressed in the data collection, processing, and analysis stages.

Lear more about data here:

https://brainly.com/question/10980404

#SPJ4

How many bits of a Class A IP address are used for host information? 8 bits 32 bits 24 bits 16 bits. 24.

Answers

In a Class A IP address, the first octet is used to identify the network, and the remaining three octets are used to identify hosts on that network. Therefore, the answer is 24 bits.

How to calculate no. of bits of a Class A IP address?

Since each octet is 8 bits, the number of bits used for host information in a Class A IP address is:

32 bits (total number of bits in an IPv4 address) - 8 bits (used for network identification in Class A) = 24 bits.

Therefore, the answer is 24 bits.

To learn more about IP address, visit: https://brainly.com/question/29556849

#SPJ4

Term used to describe the number of bits that a CPU can access at one time.a. Bitrateb. Wordc. Pulse widthd. Character

Answers

Answer:

E. Word size

Explanation:

how to fix the procedure entry point setprocessmitigationpolicy could not be located?

Answers

A process's policy may limit the loading of pictures to those that are either signed by Microsoft, the Windows Store, or by Microsoft, the Windows Store, and the Windows Hardware Quality Labs (WHQL).

What is setprocessmitigationpolicy?

The issue could also be caused by a corrupted file, a missing dll file, a dll file not being in the specified location, damaged configuration files or drivers, or simply an erroneous configuration.

It may not always be possible to fix the mistake by uninstalling and reinstalling the application, updating to the most recent version, or performing a system restore.

As the error message suggested, the error is often related to a corrupted or missing kernel32.dll file. To be specific, virus infection, power outage, hard drive errors, corrupted system files, and outdated device drivers can cause the kernel32 dll missing error.

Therefore, A process's policy may limit the loading of pictures to those that are either signed by Microsoft, the Windows Store, or by Microsoft, the Windows Store, and the Windows Hardware Quality Labs (WHQL).

To learn more about policy, refer to the link:

https://brainly.com/question/28024313

#SPJ1

what does you are not allowed to make dialed carrier calls mean

Answers

It's time to upgrade your SIM if you are unable to make called carrier calls. Due to an outdated SIM, your carrier can be preventing you from placing calls.

Why does my phone continually indicating that I can't dial a carrier number?

It indicates that voice conversations via LTE or HD Voice are not supported by your phone. Perhaps you use an outdated SIM card, a dated handset, or a non-compatible unlocked handset.

If it states that my call cannot be completed as dialed, am I blocked?

If you phone someone and get an automated response saying anything to the effect of "the customer is unavailable," their wireless provider might have blocked you. Although the messaging may differ, the end consequence is the same. Your call won't be answered.

To know more about carrier calls visit:-

https://brainly.com/question/30474210

#SPJ1

When a call is placed, caller ID typically shows a name or number. This information will also be recorded in the call history on your phone.

What is the dialed carrier calls mean?

That means that your phone does not allow voice calls over LTE or HD Voice. You might be using an old SIM card, an out-of-date phone, or an unlocked phone that is incompatible.

It's possible that their cellphone provider has barred you if you call someone and get an automated message that says something to the effect of “the customer is unavailable.” The outcome is the same, regardless of the messaging. You call, but no one answers.

Therefore, If you can't make carrier calls, it's time to upgrade your SIM. Your carrier can be stopping you from making calls because your SIM is out of date.

Learn more about call here:

https://brainly.com/question/30474210

#SPJ1

Which requirements must be met for display adapters in Windows 10? (Choose all that apply.)A. Do not use Windows 10 Starter EditionB. Support for DirectX 9C. Support for WDDMD. Minimum 256 MB of RAM on the video cardE. Computer is certified as "Designed for Windows 10"

Answers

The display adapter, also known as the graphics card or video card, is a crucial component in a computer system that enables the display of images, videos, and animations on a monitor or other display device.

What are the requirements of Window 10 for display driver?

In Windows 10, there are several requirements that a display adapter must meet to ensure optimal performance and compatibility. These requirements include:

Support for DirectX 9: DirectX is a collection of application programming interfaces (APIs) that enable the development of multimedia applications and games. DirectX 9 is the minimum version required for running most modern games and multimedia applications on Windows 10. Therefore, the display adapter must support DirectX 9 or higher to ensure proper functionality.

Support for WDDM: Windows Display Driver Model (WDDM) is a driver architecture introduced in Windows Vista that provides a standard interface between the display adapter and the operating system. All display adapters in Windows 10 must support WDDM to ensure proper installation and functionality.

Minimum 256 MB of RAM on the video card: The video card must have a minimum of 256 MB of RAM to ensure smooth rendering of graphics and videos.

To know more about display adapters, visit: https://brainly.com/question/30394685

#SPJ1

what is initialize array java ?

Answers

Explanation:

In Java, initializing an array means assigning a set of values to an array. This can be done either one element at a time, or by using a special syntax to assign all elements of the array at once. Examples of initializing arrays include using the new keyword to create an array and using the split() method to parse a string into an array.

which of the tqm tools would be best suited for determining why a student's course registration is never correct?

Answers

To determine why a student's course registration is never correct, several Total Quality Management  TQM tools can be used.

Using flowcharts: The steps necessary for course registration can be represented graphically using flowcharts. Any areas where errors are being made or where the procedure might be enhanced can be found using this. Known also as a fishbone diagram, a cause-and-effect diagram can be used to locate the problem's fundamental causes. The flowchart can be used to pinpoint the many contributing elements, such as programming problems, inaccurate data entry, or a lack of staff or student training TQM. The most common reasons for erroneous course registration can be found using a Pareto chart. Resources can be used more wisely to solve the problem by concentrating on the most important concerns.

Learn more about TQM here:

https://brainly.com/question/28474056

#SPJ4

What is Context Switching in Operating System?

Answers

A context switch is a method the central processing unit (CPU) of a computer uses to transition from one task (or process) to another while making sure the tasks don't conflict.

How does OS context switching work with an example?

When the OS switches a process from one state to another so that it can carry out its purpose with the help of the system's CPUs, this is referred to as context switching.

How long does the operating system take to swap contexts?

Moving between two processes requires a context transition (i.e., bringing a waiting process into execution and sending an executing process into a waiting for state). Multitasking results in this.

To know more about context switch visit :-

https://brainly.com/question/16048096

#SPJ4

The process of hand-tracing code is valuable becausea) It is usually faster than just running the code.b) It is the best way to design an algorithm.c) You must already have a working program in order to do it.d) It gives valuable insight that you do not get by running the code

Answers

The correct answer is You can learn to understand incorrectly functioning code by hand-tracing as well. It is an effective method for identifying flaws in your code.

Start by describing code tracing and how programmers might benefit from it: Code tracing is crucial for future technical job interviews as well as paper-and-pencil tests since it enables programmers to determine the result of the code without running it on a computer. When you trace an algorithm, you keep track of the variables' values when you conduct a dry run of the programme. A dry run entails working through the code on paper rather than running it. The ability to trace pseudocode is one that may be required in an exam question, but it is also crucial for debugging your own applications.

To learn more about hand-tracing  click on the link below:

brainly.com/question/14576067

#SPJ4

Which character is used in a search before a command?
(A) A pipe (|)
(B) A backtick (`)
(C) A tilde (~)
(D) A quotation mark (")

Answers

Backtick (') characters must surround search literals.

The ideal answer is B.

What character is used in a Splunk search before a command?

The structure of a Splunk search is referred to as the "search pipeline," and it involves chaining together successive instructions with the pipe symbol "|."

What does Splunk's search command accomplish?

Arranges search results according to the chosen fields. offers a simple method for separating fields from XML and JSON, two formats for structured data. provide statistics, optionally grouped by fields. In the Splunk Enterprise Search Reference, look up Stats, Chart, and Timechart Functions.

To know more about Splunk search visit:-

https://brainly.com/question/10041782

#SPJ4

What does W mean on TikTok?

Answers

WIN. When someone writes 'W' on its own in response to a video, it usually stands for 'win' or 'winning. ' In other words, people may use it to mean something like 'winning at life' if they want to congratulate the person in the video for something they have accomplished.

What does 'winning at life' means?

Winning in life means you're living your dream life, succeeding at your set goals and being happy with where you finally wind up.

What is TikTok?

TikTok, also known in China as Douyin is a short-form video hosting service owned by the Chinese company Byte Dance. It hosts user-submitted videos, which can range in duration from 3 seconds to 10 minutes.

learn more about TikTok

https://brainly.com/question/16423854

#SPJ4

Answer: a win

Explanation:when ppl use "w" it meana win or "with"

All of the following are elements the scenic designer might take into consideration when creatingthe visual presentation of the staging EXCEPT1.A) color.B) scale.C) textures.2.3.

Answers

The scenic designer may take into account each of the aspects listed below, with the exception of (D) underscoring, while developing the visual presentation of the staging.

What is underscoring?

A line is put under a section of text to indicate an underscore or underline.

Underlining is a proofreading convention that instructs the printer to "put this text in italic type," and is typically used on manuscripts or typescripts.

It is no longer recommended to use it to emphasize points in modern papers.

In order to type underscores, the underscore character, _, often known as a low line or low dash, first emerged on typewriters.

To create an underlined word, the word was typed, the carriage was repositioned to the start of the word, and the underscore character was overtyped.

Therefore, the scenic designer may take into account each of the aspects listed below, with the exception of (D) underscoring, while developing the visual presentation of the staging.

Know more about underscoring here:

https://brainly.com/question/9490665

#SPJ4

Complete question:

All of the following are elements the scenic designer might take into consideration when creating the visual presentation of the staging EXCEPT

A) color.

B) scale.

C) textures.

D) underscoring.

What is internal padding in tkinter?

Answers

Adding only one side of a tkinter widget padding Import the Tkinter library first. Create a GUI application now with tkinter.

How does padding work?

A shortcut for padding-top is the padding property. padding-right. padding-bottom. Padding adds additional room inside an element. Margin, on the other hand, adds extra space around in an item. There was far too much filler for it to be a fascinating paper. The image below clarifies the distinction between buffer and a border when using CSS. As demonstrated, the border is outside border, while the padding is inside the border. To put it another way, the padding property regulates the interior space of an element, as well as the margin property governs the area around it.

A CSS is what?

Cascading style sheets, or CSS.

To know more about Padding visit :

https://brainly.com/question/13260452

#SPJ4

why do we type turtle.turtle() to get a new turtle object?

Answers

It describes the turtle module, which enables the creation of Turtle objects and their use of them for drawing. turtle-2: Six reasons why we type turtle.

Why do we use the Python keyword turtle ()?

Using software that repeats simple movements, Turtle may create complex shapes. Complex shapes and images can be readily drawn by combining these and related instructions. The same-named module from the Python standard distribution up to version Python 2.5 is extended and reimplemented in the turtle module.

What does the Python term Bob turtle () mean?

This indicates that bob refers to a Turtle-type object as defined by the module turtle. Since there isn't much the user can do in this situation other than closing the window, the main loop instructs the window to wait for user action. A method can be used after a Turtle has been created to move it around the window.

to know more about turtles.turtle() here:

brainly.com/question/18992776

#SPJ4

which type of career path enables both vertical and horizontal moves?

Answers

Answer:

A career lattice

Explanation:

is a career progression that allows fer vertical, horizontal, and diagonal movement

Other Questions
Deliverables are only product-related, such as a piece of hardware or software.a. Trueb. False a feature of the fiction films of the 1890s was that ______. A bag has 12 red, 6 blue, and 7 yellow marbles, what is the probability of drawing a redmarble then a yellow marble out of the bag 1.Use the Punnett square in the sketch pad below to cross two heterozygous tall plants to determine the possible offspring.2. and tell me where you crossed two heterozygous tall plants, what is the percentage of offspring that are tt?1PointsA 0 percentB 25 percentC 50 percentD 75 percent a good rule of thumb is to maintain a following distance of __________ seconds in good conditions.a. 2b. 3c. 5d. 7 What is the binomial probability formula used for? You have been hanging out with Chris for about a month. Chris lives about 30 minutes away from you. You plan to hang out this Saturday, andChris wants to go to a limited-release movie that you've been wanting to see for months at the mall near where Chris lives. You know the moviewon't be shown in a closer theater. By the time the movie would be over, it would be past your curfew, and by the time you would get home, youwould be about an hour past your curfew. You need to ask your parents' permission to go with Chris, and although they like Chris, you know theyare very strict when it comes to curfew.How are you going to convince them to let you go to this movie and is it using ethos, pathos, or logos? Sketch the parabola, clearly labelling the points corresponding the vertex, x-intercepts and y-intercepts: (leave the vertex values in the form of a fraction). This may also help with 8a, remember that we want to use graphs to solve non-linear inequalities. y=6x^2-17x+12 Organ pipe A, with both ends open, has a fundamental frequency of 300 Hz. The third harmonic of organ pipe B, with one end open, has the same frequency as the second harmonic of pipe A. How long are (a) pipe A and (b) pipe B? Choose the equation that correctly shows the Commutative Property of Multiplication.10 x3/10 = 10 x 3/1010 +3/10 = 3/10x 1010 x 3/10 = 3/10 x 1010 x3/10 = 3/10 10 IL GIVE BRAINLIEST!!! For a large order of brownies. Ms. Perry made 8/8 kg of fudge in her kitchen. She then got 1/6 kg from Mrs. Marshall. If she needs a total of 1 1/8kg for brownies, how much more fudge does she needs to make? The flatter the demand curve passing through a given point, the less elastic the demand curve at that point.a. Trueb. False in one to two sentences, explain how the shorelines can affect weather Calculate the mean, Variance and Standard deviation of the age of 12 student 16, 17, 18, 16/0.5, 17, 18, 19, 17, 17, 13, 17//2 and 16 The patient went back to the doctor to seek treatment for the sequela, which is:A.the recurrence of symptoms.B.a disease that is chronic.C.a condition resulting from the original disease.D.an infection caused by medication. A story that ends with the statement i had never felt embarrassed in my life The Dutch used what kind of labor to construct New Amsterdam? a. Enslaved Africans b. Indian slaves c. Huguenots d. Indentured servants. Why might a farmer raise a wide variety of plants instead of the one variety that would produce the most valuable crop? Construct an explanation that describes how genetic variations increase the probability that individuals will survive. Help meee A distinctive characteristic of women in professional work during the progressive era was thatwomen did not dominate any single profession.women could not attain advanced degrees from American universities.women did not generally create their own professional organizations.women's professions." unlike other professions, did not attempt to exclude anyone.women were concentrated in the "helping professions. Look at the food chain below. Which organism shown will get most of the available energy that is in the seeds?