Compare briefly the general structure of the complete language processor of Java and the language processor of C . (b) Explain the major differences.

Answers

Answer 1

Answer:

The difference to this question can be defined as follows:

Explanation:

Java language processor:

In java, it uses both compiler and interpreter.It uses high-level data is translated by java computer to byte-code, and by this, it transfers to an element, through either java interpreter or the Just-in-time, into electronic format Just-in-time compiler optimizations are generally preferred to the interpretation so because the process is slowed down. Its state of development of java bytecode is moderate (this byte code can run on any machine, on any operating system), therefore JAVA is an independent platform language.

C++ language processor:

In C++, it uses the only compiler. The software is preserved with the .cpp extension. so, that it can be converted to allelopathy of the c++ COMPILER, high - level language. The creation of the byte code is no intermediary, and it is not an independent platform.

Related Questions

Imagine that we have a list of names called nameList. There are various algorithms we could run on it. Here's one such algorithm, which compares each name in the list to every other name:

Answers

Answer:

The algorithm has a quadratic time complexity of O(n^2)

Explanation:

The algorithm has two nested for-loop statements. The length of the name list is denoted as "n". Every name searched in the name list has a time complexity of n, therefore the time complexity of finding two names is (n x n) =  n^2, which is denoted as O(n^2) in Big-O notation.

What is the minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP addresses?

Answers

Question Completion with options:

The options are :

a. 1000

b . 10000

c. 100

d. 5000

Answer:

The minimum number of public IP addresses needed to expose a service running on 10,000 IoT devices having private IP addresses is:

a. 1000

Explanation:

This means that one public IP address can expose 10 Internet of Things (IoT) devices with private IP addresses.  This will make the load lighter and avoid conflicts.  In addition, private IP addresses promote access on a network without taking up the limited public IP address space.  All IoT devices must have their unique IP addresses to communicate through a network.  No two computers or devices on the network should have the same IP address.

When looking at a program board at the end of program increment (PI) planning, what does it mean when a feature is placed in a team's swim lane with no strings

Answers

Answer:

It simply means that other teams can independently complete the feature.

Explanation:

PI or program increment is a planning interval during which an agile release train (ART) plans and produces working and tested software and systems. It takes a duration of 8 to 12 weeks

Agile teams can access and independently complete various ARTs found in their swim lanes with no strings.

For a parking payment app, what option would MOST likely connect a user to a third party/external gateway?

a
"Sign In"

b
"Rates"

c
"Pay"

d
"Time remaining"

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Almost all app that is doing online business integrated third party payment gateway and login/services. But some apps, don't integrate the third party login/signin services such as go ogle or face book login/sign in services.

But in the context of this question, for a parking payment app, upon reservation of parking space, the pay option connects a user to a third party/external gateway. This gateway will accept payment from the user and upon confirmation of payment, the parking space will get reserved.

so the correct option to this question is:

Pay

While the other options are incorrect because:

The sign-in option does not connect the user to a third pay/gateway in case if the app has self-registration and sign-in functionality. Rate and Time remaining are features of the app that does not force the user to connect third-party gateway.

Check ALL that apply. Which statement is TRUE about Test Driven Development (TDD)? a) in TDD, when a program failure is observed it is a direct result of the last code written b) In TDD, there are no untested code sections in the delivered code c) In TDD, if all the tests pass, there is no need to refactor the code. d) In TDD, only the new tests are supposed to pass after implementing the new feature. e) In TDD, your tests should cover all the code that has been developed

Answers

The statements TRUE about Test Driven Development (TDD) are

In TDD, there are no untested code sections in the delivered code.In TDD, your tests should cover all the code that has been developed.

The correct options are (b) and (e).

What is Test Driven Development?

The test- driven development is used in the programming language for the designing many type of test cases in the computer system. The main goal of the test driven development is that it uses to make the system bug free and simple.

It is basically used in the organization to avoid duplication in the code and make the function more efficient.

The basic approach of the test driven development is that the test are develop so that it specify the function for the code to perform.

In TDD, there are no untested code sections in the delivered code.In TDD, your tests should cover all the code that has been developed.

Thus, the statements (b) and (e) are TRUE.

Learn more about Test Driven Development.

https://brainly.com/question/13156414

#SPJ2

Which type of hardware on a VM can be easily removed?

Fast
Physical
Real
Virtual

Answers

Virtual

Explanation: Because it is easy to remove from a VM because it is like a viries.

It is very easy to remove a virtual hardware on a Virtual Machine, as there is no use of physical attachments.

What is a hardware?

A hardware is such component of a computer network that is used as equipment for smooth functioning of the system. For example, keyboard and mouse are hardwares.

A virtual hardware, on the other hand, is created on a cloud computing software, and is easily removable or detachable, as it does not require any actual physical hardware.

Hence, option D holds true regarding a hardware.

Learn more about hardware here:

https://brainly.com/question/15232088

#SPJ2

Why I/O modules is needed between system bus
and I/O devices?​

Answers

Answer:

1. Processor communication -- this involves the following tasks:

a. exchange of data between processor and I/O module

b. command decoding - I/O module accepts commands sent from the processor. E.g., the I/O module for a disk drive may accept the following commands from the processor: READ SECTOR, WRITE SECTOR, SEEK track, etc.

c. status reporting – The device must be able to report its status to the processor, e.g., disk drive busy, ready etc. Status reporting may also involve reporting various errors.

d. Address recognition – Each I/O device has a unique address and the I/O module must recognize this address.

2. Device communication – The I/O module must be able to perform device communication such as status reporting.

3. Control & timing – The I/O module must be able to co-ordinate the flow of data between the internal resources (such as processor, memory) and external devices.

4. Data buffering – This is necessary as there is a speed mismatch between speed of data transfer between processor and memory and external devices. Data coming from the main memory are sent to an I/O module in a rapid burst. The data is buffered in the I/O module and then sent to the peripheral device at its rate.

5. Error detection – The I/O module must also be able to detect errors and report them to the processor. These errors may be mechanical errors (such as paper jam in a printer), or changes in the bit pattern of transmitted data. A common way of detecting such errors is by using parity bits.

Which of these AWS resources cannot be monitored using VPC Flow logs?a) V​PCb) A​ subnet in a VPCc) A network interface attached to EC2d) An Internet Gateway attached to VPC

Answers

Answer:

d) An Internet Gateway attached to VPC.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Amazon Web Services (AWS) is an example of a cloud computing platform that offer its users a global cloud-based products and services such as storage, security, computing resources, database, analytics and management tools etc.

Some of the Amazon Web Services (AWS) resources that can be monitored using virtual private cloud (VPC) Flow logs includes;

I. A VPC

II. A subnet in a VPC

III. A network interface attached to EC2

However, an Internet Gateway attached to VPC is an AWS resource that cannot be monitored using virtual private cloud (VPC) Flow logs.

What measures are needed to trace the source of various types of packets used in a DoS attack? Are some types of packets easier to trace back to their source than others?

Answers

Explanation:

Note, a DoS (Denial of Service) attack is different in scope from a DDoS (Distributed Denial of Service) attack. In a DoS attack, the attack on the website's network comes from just a single source (IP address) repeatedly, while in a DDos attack several Ip addresses or sources attack the network of a website.

To trace the source of various types of packets used in a DoS attack (which of less complexity than a DDos attack), a software application like Wireshark could be used to measure trace the packets used in the attack.

Imagine that you are in the market for a digital camera. Would it be better for you to purchase a high-quality digital camera or a mobile camera? Explain your answer by providing three reasons why your choice suits your needs.

Answers

Answer:

I would purchase a high-quality digital camera

Explanation:

As a blogger, I most times take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.

The light sensitivity as seen in the ISO, the shutter speed, megapixels, and view-finder are some features I would look out for in a high-quality digital camera.

Answer: To take pictures that should be of high quality to capture the interest of readers. So, if I am in the market to purchase a camera, I would go for a camera that is of high quality. Even though a mobile camera would be less expensive, a high-quality digital camera has features that can be manipulated to get a quality photo that would also last.

Explanation: copied the previous answer a bit to better suit the exam requirements.

helppp plzzz thanksss enjoy ur day ​

Answers

Answer:

D

Explanation:

I believe...

Answer:

the answer is b

Explanation:

you should check for spelling errors and correct punctuation before you mail the letter and/or submit the document. now I am starting to sound like my language teacher

hope I helped :)

anyone have the Dell xps 13 laptop? if not pls don't answer but if you do, how is it going for you?​

Answers

I do and it’s going alright; would recommend. Here’s what I think in bullet points.

- Good aesthetic design. Weave-like texture is nice and somewhat opulent.

- Good performance; you can overclock the i7 CPU.

- Battery life is at the upper end of the spectrum.

- No USB Type A Ports, big downside.

- Graphics are about 1000 points above industry average (3D Mark Fire Spark)

- Uses an SSD rather than a HDD; much quicker load time.

- I’d go for the $1,899 personally; it’s worth the extra money.

Thanks.

Yes and I really love it

What is the value of grade after the segment of code executes int result = 95?
if (result >= 90) grade = "A";
if (result >= 80) grade = "B";
if (result >= 70) grade = "C";
if (result >= 60) grade = "D";
else grade = "E";
Asnwer Choices
1.A
2.B
3.C
4.D
5.E

Answers

Answer:

the answer is A

because 80 to 90 is B

so 90 to 100 is A

What skills, knowledge, and strengths do you feel you bring to the FlexPath program?

Answers

Answer:

The answer is below

Explanation:

Skills: Problem-solving skills, Great attention to details skills

Knowledge: Computer Literacy, Mathematical and Statistical skills

Strength: highly disciplined and well determined.

Hence, I understand that I possess all the aforelisted skills, knowledge, and strength, that would assist me during the Flexpath program.

This will make me excel and complete the required courses with good grades.

list pros and cons of HCI technology​

Answers

A pro of HCI technology is that its user friendly and a con about it is that you have to teach the user what to do or guide them!

Answer:

Advantages:

• very flexible with the use of "switches"

• Good for "expert" users - can quickly access commands

• uses the fewest system resources

Disadvantages:

• requires the user to learn "complex" commands or languages

• "Hidden" features i.e. if you don't know the commands you won't know the features are there!

• not very good for novice users Command Line Interface Applications

• system administration

• engineering applications

• scientific applications

Explanation:

not much need of explanation

Modern CPUs need only a few ___________ to execute an instruction when all operands are in its registers.

Answers

Answer:

Nanoseconds.

Explanation:

A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

Modern CPUs need only a few nanoseconds to execute an instruction when all operands are in its registers.

In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.

Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).

If you wanted to divide an integer variable by 2, which of the following lines of code would you use? total = int + 2 total = int * N total int / 2 total = int. 2

Answers

Answer:

Yes

Explanation:

Because all answers are intotal (2)

Your secondary servers have not been able to contact your primary server to synchronize information. How long will the secondary servers attempt to contact the primary server before it considers that zone is dead and stops responding to queries

Answers

Answer:

The answer is "One week".

Explanation:

Following are the number represents of the given values:  

Serial number (se)  [tex]= 200302028[/tex]

Refresh (ref) [tex]= 3600 \ second = 1 \ hour[/tex]

Updated -retry (ret)[tex]= 3600 \ second = 1 \ hour[/tex]

Expiry [tex]= 3600 \times 24 \times 7 = 604800 \ second \ = 1 \ week[/tex]

Minimum [tex]TTL = 3600 \ min = 1 \ h[/tex]

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

Answers

It’s called a firewall! :)

Examine the following function header, then write a statement that calls the function, passing 12 as an argument. def show_value(quantity):

Answers

Based on the name of the function, it seems that we're supposed to only print the value of quantity to the console.

def show_value(quantity):

   print(quantity)

show_value(12)

The first line of code creates the function, the second line of code prints the value of quantity to the console, and the last line of code calls our show_value function with 12 as our argument. I wrote my code in python 3.8. I hope this helps.

The top and bottom margins of each page are called the header and footer, respectively. The program is as follows:

def show_value(quantity):

print(quantity)

show_value(12)

What is meant by function header?

The function's name is included in the header, which also provides information about the parameters and the type of data the function will return to the caller function or application. The instructions that must be followed are contained in the function's body.

The top and bottom margins of each page are called the header and footer, respectively. Headers and footers are useful for information that you want to appear on every page of a document, such as your name, the document's title, or page numbers.

It appears that we should only print the quantity's value to the console based on the function's name.

def show_value(quantity):

print(quantity)

show_value(12)

To learn more about function header refer to:

https://brainly.com/question/20358520

#SPJ2

Click this link to view O*NET’s Work Styles section for Petroleum Engineers. Note that common work styles are listed toward the top, and less common work styles are listed toward the bottom. According to O*NET, what are some common work styles Petroleum Engineers need? Select four options.

reaction time
cooperation
integrity
sales
analytical thinking
dependability

Answers

Answer:

2 (cooperation )

3 (integrity)

5 (analytical thinking)

6 (dependability)

Explanation:

Good luck! Hope this helps.

According to O*NET, some common work styles which Petroleum Engineers need are:

2 (cooperation )3 (integrity)5 (analytical thinking)6 (dependability)

What is Integrity?

This is a positive quality of a person where he is considered to be dependable and trustworthy.

With this in mind, we can see that among the requirements from O'NET for the common work styles which Petroleum Engineers need, some things such as integrity, dependability, etc were mentioned.

Read more about integrity here:
https://brainly.com/question/1188458

Select the three business advantages of globalization.
There is increased collaboration in problem solving.
It is easier for small businesses to compete.
There is an overall decrease in competition for business.
There are increased business opportunities.
It facilitates ease in communication.

Answers

Answer:

There is increased collaboration in problem solving.

There are increased business opportunities.

It facilitates ease in communication

REST Basics REST is a protocol and a set of operations that many web services conform to in order to exchange information and interact with each other. Which of the following are true?
a) REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.
b) REST is a server-server interaction meaning that both sides can make requests and send responses to requests.
c) In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.
d) REST responses are not capable of specifying any caching related information regarding the accessed resource. Caching must be resolved with other mechanisms.

Answers

Answer:

The answer is "Option A and Option C".

Explanation:

In choice a, it is true since a client-server design can be used for REST-application. A user is somebody who needs space and it doesn't deal with storing data on a central computer. A client is someone with the money, and the interface does not. Its server doesn't want to worry regarding core functionality on the ends of the server. The server does not have to know anything at all about the layer of UI used at the end of the server.

In choice c, it is true As just a Web app, services like corporate/employee resources must be organized, and HTTP verbs like the GET, Place, POST, DELETE must be used to modify these. It must be obvious, as a programmer, that what is required is clearly to look only at the interface or HTTP method used.

The options that are true about REST include:

A. REST is strictly a client-server interaction type meaning that the client performs requests and the server sends responses to these requests.C. In REST protocol, properly designed access endpoints should not specify actions as a part of the resource URI. Instead, actions should be specified by the appropriate HTTP methods like GET, POST, PUT and DELETE.

It should be noted that REST applications should possess a client-server architecture. Also, it's important for web applications to be organized into resources band then use HTTP verbs such as GET, POST, DELETE, etc.

Learn more about REST on:

https://brainly.com/question/24160573

Here is the header for a function named computeValue:
void computeValue(int value)
Which of the following is a valid call to the function?
A) computeValue(10)
B) computeValue(10);
C) void computeValue(10);
D) void computeValue(int x);

Answers

Answer:

B) computeValue(10);

Explanation:

Given

Header: void computeValue(int value)

Required

Determine the valid call

To call a function from another function or from the main, the following syntax has to be used.

function-name(parameter-1, parameter-2, parameter-3,.....,parameter-n);

In the function header given:, the following can be observed:

The function name is computeValueIt has only one parameter and it is of type integer

So, to call the function; we make use of computeValue(10);

Where 10 represents the value of the parameter (i.e. argument)

________ implies the maximum allowed size of each individual element in the data structure to be encoded to ziplist short structure.

Answers

Answer:

counting semaphore

Explanation:

Counting Semaphore is a technical term that is used to describe a form of Semaphore in computer operation that utilizes a count that enables assignments to be obtained or published on several occasions. The counting semaphore is established in such a way that it equals its count.

Hence, COUNTING SEMAPHORE implies the maximum allowed size of each individual element in the data structure to be encoded to ziplist short structure.

let Xi; i=1,2....,n from distribution with p.d.f , f(x) = ϑx^ϑ-1, 0

Answers

Answer:

User is very angry...................

..

Mohammed’s parents learn that his classmates have begun sending him text messages making fun of his heritage. Mohammed says he’s fine because they are just teasing him. Which challenge is making it difficult to stop the cyberbullying of Mohammed? The classmates are using secure computers. The classmates are using technology positively. Mohammed doesn’t have any evidence of the cyberbullying. Mohammed doesn’t believe the cyberbullying exists

Answers

Answer:

Mohammed doesn't believe the cyberbullying exists.

Explanation:

If he knew he wouldn't say they are teasing him. I mean, how would their parents know he is being cyberbullied without evidence? Text messages(such as imessages) are most likely on phones, and not on computers.(Unless its an mac I believe.) And they are bullying him; its not using technology positively.

Answer:

d

Explanation:

🃒🂧🃖🃯🂶🂤ã¨ã’ã½ã‚…ã­ã£ã–

#include <iostream>
using namespace std;

// function prototypes
float get_Price();
int get_Type();
void tax(float, int);

// start main function
int main() {
float price = 0; // should > 0

int type = 0; // 1 -> Electronic
// 2 -> Sports & Outdoor
// 3 -> Vaccine

price = get_Price;
type = get_type();

cout << "Price before tax = " << price << "\n\n";
tax(price, type);
cout << "Total price after tax = " << price << '\n';

return 0;
}

// start new user-defined functions
void get_Price() {
float p = 0;

while (p < 0) {
cout << "Item price (RM): ";
cin >> p;
}

return p;
}

float get_Type() {
int t == 0;

do {
cout << "\n";
cout << "1 -> Electronic\n";
cout << "2 -> Sports & Outdoor\n";
cout << "3 -> Vaccine\n";
cout << "Item type (1,2,3): ";
cin >> t;
} while (t > 1 || t < 3);

cout << "\n";
return t;
}

// tax is based on item types as follows:
// 1 -> Electronic => 5%
// 2 -> Sports & Outdoor => 3%
// 3 -> Vaccine => 1%
void tax(float p, int t) {
float tax = 0;
switch (t) {
case 1: tax = p * 5 / 100; break;
case 2: tax = p * 3 / 100;
case 3: tax = p * 1 / 100;
}

cout << "Tax cost = " << tax << "\n";
p += tax;
}

What problem?​

Answers

Answer:

10⁶666666666666666666666666

vgggjhhii9

Explanation:

uyyyyyyyy6666y6666666666

Write a program that takes a String containing a text using the method signature

String useProperGrammar(String text)
Your method should replace the word ‘2’ with ‘to’ and return the updated text.

For example,

useProperGrammar("can you go 2 the store?")
should return

"can you go to the store?"
This method should also print out the number of grammatical errors that were fixed.

For example, for useProperGrammar("back 2 back 2 back"), the method would also print:

Fixed 2 grammatical errors:
In the main method, ask the user to input a String, and print the results of useProperGrammar using the user input.

Answers

import java.util.*;

public class MyClass {

   public static String useProperGrammar(String message){

       String newMessage = "";

       int count = 0;

       for (int i = 0; i < message.length(); i++){

           if(message.charAt(i) == '2'){

               newMessage = newMessage + "to";

               count ++;

           

           }

           else{

               newMessage = newMessage + message.charAt(i);

           }

       

       }

       System.out.println("Fixed "+count+" grammatical error(s):");

       return newMessage;

   }

   public static void main(String args[]) {

     Scanner scan = new Scanner(System.in);

     System.out.println("Enter a string: ");

     String text = scan.nextLine();

     System.out.println(useProperGrammar(text));

   }

}

I hope this helps.

When analyzing an image, you should consider composition, color, and

A. plot

B. lighting

C. audio

D. characters

Answers

Answer:

lighting

Explanation:

Other Questions
Expand and simplify (x - 5)(x - 4) Solve for n:6n 2(4n + 7) + 4 = -2A:-6B:-4C:4D:6 please help me, marked as brainest Find the difference.6 - (-3) = I doubt any one knows but worth a shot inverse laplace of L^-1 {5s/s^2 + 3s - 4} What powers could a pope use to make kings obey his orders? (in the middle ages)(pls help) What is the main purpose of this excerpt from a speech?Every year, 15 million Americans are the victims of computer hackers who steal their personal information. And this number is growing every year. Hackers can break into your bank accounts, cell phones, and computers. There are steps that you can take to protect yourself online. For example, some software can prevent you from visiting websites that could steal your information and misuse it.A. to inform people about the number of computer hackersB. to inform people how hackers access their personal informationC. to inform people how to create appropriate passwordsD. to inform people not to use the Internet because its not safeE. to inform people about how to protect their personal information online What are the values of mountaineers and trekkers to protect the natural heritage QUIYING WANTS TO MAKE PANCAKES FROM A RECIPE GIVEN ON THE BOX. THE RECIPE CALLS FOR 2 CUPS OF STRAWBERRIES, 5 CUPS OF PANCAKE MIX AND 4 CUPS OF MILK. QUIYING ONLY HAS 3 CUPS OF PANCAKE MIX LEFT IN THE BOX. HOW MANY CUPS OF STRAWBERRIES SHOULD QUIYING USE SO THAT HER PANCAKES COME OUT EXACLY LIKE THE PANCAKES THAT THE BOX RECIPE RECOMMENDS. Use the diagram below to determine the height of the flagpoleHeight of flagpole =Scale factor from stick to flagpole=Scale factor from flagpole to stick =Please Label!!!! 30. Find the equation of straight line whose slopeis 3 times and y-intercept is double of the line2x - 3y = 4. PLEASE HELP :( WILL GIVE bRAINLIEST CAIRO, Egypt. Imagine traveling across a 4,000-mile-wide (6,437.4-kilometer) desert with little water nearby. Now, imagine running across that same desert, at least 44 miles (70.8 kilometers) at a time, day after day. That's just what three men did recently. They became the first modern runners to cross the Sahara Desert.Describe the men's journey across Africa. What challenges did the men face? Where did their journey take them? Use information from the lesson in your answer.Charlie Engle of the U.S., Ray Zahab of Canada, and Kevin Lin of Taiwan completed the run in 111 days. They traveled through six countries. Starting in Senegal, they ran through Mauritania, Mali, Niger, Libya, and Egypt. After nearly four months, they reached Egypt's Red Sea. There, they put their hands in the water to show that they had crossed the finish line."We touched the water in Senegal at the beginning, and we touched the water in the Red Sea at the end. They were the bookends of our journey," said Engle. He added, "It will take time to sink in . . . but this is an absolutely once-in-a-lifetime thing. . . . [Now] that I know how hard this is, I would never consider crossing the Sahara on foot again."Most people would never have considered such a journey in the first place. The Sahara Desert is one of the harshest places on Earth. During the day, the sun can send temperatures soaring above 100 degrees (over 37 degrees Celsius). Nighttime temperatures can dip below freezing. Strong winds send sand flying in every direction, making it difficult to see and breathe.Engle, Zahab, and Lin are all experienced athletes. They have run in adventure races around the world. Still, nothing would have prepared them for the Sahara. At various times during the run, they suffered from upset stomachs, cramping, and knee injuries. At the same time, they had to endure the unforgiving climate.The runners' days were exhausting, too. After waking up at 4 a.m., the trio would begin running at about five. Around noon, they would take a lunch break, eating pasta, tuna, and vegetablesall foods that provide energy. After a short nap in a tent on thin mattresses, they would start running again. They would run until about 9:30 p.m.The runners brought along supplies and equipment to protect themselves from the dangers of the desert. They had devices that used the global positioning system to track their route. They also teamed up with local experts and sports trainers. These people followed the runners in four-wheel-drive vehicles.Despite the planning and preparation, the runners often questioned whether they were doing the right thing. Sometimes the wind was so harsh that the runners could not keep the sand out of their clothes. The three kept going, however. They ran up to 50 miles (80.5 kilometers) a day. That's twice the length of a city marathon.A film crew also followed the runners. The crew was recording the journey for actor Matt Damon's movie company. Damon will make a movie about the trip called "Running the Sahara."Why did the athletes make the run? They welcomed the challenge. They also wanted to raise awareness about an ongoing problem. Desert communities often struggle to find clean water. Several times, the athletes stopped near wells to talk with villagers about the situation."It started off as a huge motivator, especially as we passed through countries where the water wasn't clean," Engle said. He and the other runners hope that their work will help the efforts of H2O Africa. The group helps countries find or make clean water. The athletes plan to raise money for the group."We have seen firsthand the need for clean water, which we take for granted in North America," Zahab said.The desert run was full of challenges. Now that the runners have finished, the men know that they will never be the same."This has been a life changing event," Engle said.The Associated Press contributed to this story. One way that a memory coukd be distorted is if it includes information that did not actually occur. oh A triangle has side lengths of 6, 8 and 10. Which side lengths could be possible in a similar triangleA) 3,4, and 7B) 13.2, 17.6, and 22C)9,15, and 16D) 1.2, 1.6, and 2.5 A $300 suit is marked down by 20%. Find the sale price rounded to the nearest dollar. Other than verbs, what other kinds of words do adverbs modify? Select ALL that apply. a.)adjectives b.)adverbs c.)articles d.)nouns e.)pronouns Wang Yan drove her truck. The fuel remaining in the truck's tank (in liters) as a function of distance (in kilometers) is graphed. What is the approximate average fuel consumption rate, between the 100^\text{th}100 th 100, start superscript, start text, t, h, end text, end superscript kilometer and the 400^\text{th}400 th 400, start superscript, start text, t, h, end text, end superscript kilometer? Find the Slope given the points: (1,8) and (-2,-1) Steam Workshop Downloader