solve the following equations and check your result 1) 3x=2x+18​

Answers

Answer 1

Answer:

x = 18

Explanation:

3x = 2x+18

3x-2x = 18

x=18

Answer 2

Answer:

Explanation:

3X-2X=2X-2X+18

X=18


Related Questions

To see the non-printing characters in Writer press ________ + ________keys, together.

Answers

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

Answer:

Ctrl+F10, is the keys to see the non printing characters in Open Office Writer

Explanation:

One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______.​ a. ​ check list technique b. ​ domain analysis technique c. ​ noun technique d. ​ brainstorming technique

Answers

Answer:

Coding is a skill where you take instructions (the steps in a task) and translate it into a languaage.

Explanation:

Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and

What is the port representing buy above symbol?

Answers

Answer:The port representing buy above symbol used in thousands used symbols by computer represent a today.

Explanation:The computer symbol is used to representing a today function,company, warning,specification.Symbol is used to the computer and electronics with each description.

Most symbols are shown below not may match your hardware device and software program.There are many types of symbol :

(1)Keyboard symbol (2)Display symbol (3)Power symbols (4)Sound symbols

(5)E-mail symbol (6)General symbol (7) Drive symbol (8) Network symbol

Symbol is the most commonly full circle and vertical at the top the power.

Which of the given features are the features of ATX?
(choose all that apply)

a. have CPU sockets for the CPU

b. have mostly integrated CPUs

c. can be 60mm by 60mm in size

d. can be 244mm by 244mm in size.

e. used in home theater systems and gaming gadgets

Answers

Answer:

e,d and a not sure though

These commands are established by combatant commanders when authorized by the Secretary of Defense through the Chairman of the Joint Chiefs of Staff to conduct operations on a continuing basis in accordance with the criteria set forth for unified commands. They may be established on a geographic area basis such as U.S. Forces Japan or on a functional basis such as Special Operations Command, Pacific.
a. Subordinate Unified Commands
b. Combatant Command
c. Unified Command Plan
d. None of above

Answers

Answer:

b. Combatant Command

Explanation:

The Combatant commands are commands which are primarily authorized by the Secretary of Defense with approval from the President. They are then executed by the Combatant Commanders (CCDR's), who receive information from the higher authorities through the Chairman of the Joint Chiefs of Staff. The combatant commanders head the combatant commands and are usually four-star Generals. The combatant commands have a broad and continuing purpose.

They ensure synergy for the command and control of the United States military forces. They are formed on the basis of geography or function. The United States Defense Department has eleven (11) combatant commands which serve either a geographic or functional purpose.

After the unforeseen failure of her Bigfoot picture sharing service, bgfootr, which got hacked when she failed to stay on top of her security updates Janelle has a great new idea for a new service to report Loch Ness monster sightings. What service would help her keep from having to play system administrator

Answers

Answer:

C) Platform as a Service

Explanation:

The service which helps her by having to play administrative is a platform.

The platform as a service refers to the platform in which the it allowed to create, run, manage the applications over the cloud computing. Also it could be done without having difficulties with respect to maintaining the infrastructure as it is done online so no physical appearance needed

By focusing into it, she centralize her mind in creating the service

Hence, the correct option is C.

The variable dp is to refer to an array of double. Assuming the integer variable n has been assigned a value, declare dp appropriately, allocate an array of n doubles and assign the resulting pointer to dp.

Answers

Answer:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Explanation:

According to the given question, the relevant data provided is as follows

Variable dp = Array of double

Based on the above information,

The allocation of an array for doubling n and assigned it to dp is here below:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Hence, the above is the answer

A flat-panel detector is exposed with nothing between the x-ray tube and detector. 5 images were acquired on 5 different days using the same exposure. The pixel readings within a region of interest (ROI) are compared. What quality control test was performed?
a. Detectability
b. Linearity
c. Repeatability
d. Uniformity

Answers

Answer:

c. Repeatability

Explanation:

Since in the question it is mentioned that the falt panel detects the relation between the x-ray tube and detector. Also five images were purchased on five different days but used the similar exposure

So for the quality control test, the repeatability should be performed as the reading of the pixel is done within a region of interest also it examines the consistency of the pixel reading over time

Hence, the correct option is c.  

Write a function, sublist, that takes in a list of numbers as the parameter. In the function, use a while loop to return a sublist of the input list. The sublist should contain the same values of the original list up until it reaches the number 5 (it should not contain the number 5).

Answers

Answer:

Following are the code to this question:

def sublist(l):#defining a method list sublist that accepts a list

   val=[]#defining an empty list

   x=0#defining x variable that store value 0

   while(x<len(l)):#defining loop that check x is lessthen list length  

       if(l[x]==5):#defining if block that checks list value equal to 5

           break#using break keyword  

       val.append(l[x])#add value in val list

       x+= 1#increment the value of x variable by 1

   return val#return val

l=[3,4,7,8,5,3,2]#defining list l

print(sublist(l))#using print method to call sublist method

Output:

[3, 4, 7, 8]

Explanation:

In the above python code, a method "sublist" is declared that accepts a list, inside the method an empty list "val" and an integer variable x is defined that stores "0"  value. In the method, a while loop is declared that checks list length and define if block to checklist element value equal to "5". which the condition is true it will return before values. In the last step, a list "l" is declared that holds value and used the print method to call sublist to prints its return value.

what should i do after learning python? how can I make apps or gaming apps? IF YOUR ANSWER WILL BE GOOD I WILL MARK AS BRAINLIEST

Answers

Answer:

Here are some of the things that you can do after learning Python:

Learn a Web Development Framework

Learn Machine Learning

Start Teaching Python to Beginners (and earn some bucks)

These are the top three ways to proceed

Explanation:

Learn a web development framework

Which statement about comments is false? Select one: a. Lengthy comments can cause poor execution-time performance. b. Comments do not cause any machine language object code to be generated. c. Comments may begin and end with /* and */, respectively. d. Programmers insert comments to document programs and improve program readability.

Answers

Answer:

The answer is "Option a".

Explanation:

In programming, the Comment is also known as the description of the source code or the program, which increases the readability of the programmer.  It aims to facilitate understanding of it's code to humans, and when we this code the compilers and interpreters typically avoid it, and correct choices can be defined as follows:

In choice b, There is no use of comments in the compilation.  In choice c, the multiple line comment starts with starts and ends with /* and */.   In choice d, it increases the program readability.

Bharath has made a table of content for his document, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes.

Answers

Answer:

Explanation:

Microsoft Word has an automatic table of contents function that can automatically generate a table of contents for your document, provided you correctly tag the chapter headers and sub-headers that you wish to show in your table of contents.  Setting this up can be a time-consuming process, but if you are writing a lengthy document that will go through several drafts, the automatic Table of Contents can save you a lot of manual revising each time your page numbers or chapter titles change.

Step 1:  In order for Word to identify the headers and subheaders for your Table of Contents, you need to apply the appropriate "Heading" styles to your chapter and sub-chapter headers.

For example, to mark a chapter title as a Level 1 Heading, first select the text that you would like to appear as the chapter heading in the Table of Contents by clicking-and-dragging your cursor over it to highlight it.

A Cisco Catalyst switch has been added to support the use of multiple VLANs as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch in order to incorporate a new network design. What should the technician do to accomplish this task

Answers

Answer:

The technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch.

Explanation:

In this scenario, a Cisco Catalyst switch has been added to support the use of multiple virtual local area networks (VLANs) as part of an enterprise network. The network technician finds it necessary to clear all virtual local area network (VLAN) information from the switch in order to incorporate a new network design. To accomplish this task successfully, the technician should delete the startup configuration and the "vlan.dat" file residing in the flash memory of the newly added switch and lastly, he should reboot the switch. The VLAN informations are stored in a file with the name "vlan.dat" residing in the flash memory of the switch.

However, in order to delete the startup configuration he would be required to login as an administrator, so as to have all privileges.

Also, the essence of deleting the startup configuration and the "vlan.dat" is to avoid any conflict in the network.

You have an on-premises network that contains several servers. You plan to migrate all the servers to Azure. You need to recommend a solution to ensure that some of the servers are available if a single Azure data center goes offline for an extended period.
What should you include in the recommendation?
A. fault tolerance
B. elasticity
C. scalability
D. low latency

Answers

Answer:

A). Fault tolerance

Explanation:

The Microsoft Azure is described as the cloud computing service that is known for its flexibility, cost-effectiveness, and quick and easy compliance to fulfill the company's requirements.

As per the question, in order to ensure that 'some servers are available in case of a single Azure data center going offline for an increased time period', the recommendation must include the 'fault tolerance' ability of Azure services. Azure infrastructure has the ability to immediately react in case of a failure to restore the servers and its services. In case of hardware failure, crashing of hard-disks, or short-term availability problems with servers, Azure predicts and manages such failures effectively. Thus, option A is the correct answer.

Jason's cellphone company allows him to use his smartphone as a wireless hotspot with his laptop when traveling. Jason notices that if he runs a speed test from his smartphone, the cellular connection is 8761 kbps. If he runs the same speed test connection from his laptop which is connected to his cellphone over its wireless hotspot,the speed drops to 243 kbps. Which of the following is the MOST likely cause for the drop in the speed test results?
Explanation
a) The smartphone's RFID signal is low
​b) The wireless hotspot feature is throttling the cellular connection speed
​c) The SSID for the wireless hotspot is not being broadcast
d) The laptop is out of range of the smartphone's hotspot

Answers

Answer:

b) The wireless hotspot feature is throttling the cellular connection speed.

Explanation:

The wireless hotspot feature allows phone to share cellular data with other network creating a Wi-Fi network. Cellular data is connected with other devices or laptops. Jason's cellphone company is allowing him to use his smart phone as a wireless hotspot with his laptop. He notices that cellular connection speed differs when he uses wireless hotspot with laptop. This is because hotspot is throttling cellular connection speed.

BP measuring machine is an example of __________

A)Computing device
B)Medical device
C)Embedded machine
D)None of these​

Answers

Answer:

I think it is a Medical device.

BP = blood pressure

Explanation:

You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?

Answers

Answer:

Internetwork

Explanation:

Internetwork refers to the interconnection between the multiple networks of the computer through which the message could be exchanged with one another and in this,  no hardware network is required. The other word of the internetwork is internet

Therefore in the question it is mentioned that you want to double the workstations i.e 50 to 100. Also, new peoples would be work in a distinct unit of business

So this situation represents the internetwork

Interactive sites where users write about personal topics and comment to a threaded discussion are called?
A. chat rooms.
B. networking sites.
C. forums
D. messaging sites.

Answers

Answer:

C. forums

Explanation:

Forums are internet sites where users can meet to discuss different topics through the use of messages thereby forming chat rooms. An internet forum can be in form of a question and answer site. Most websites have internet forums where users can meet and discuss or ask questions. Sometimes there may be moderators that ensure that the posted messages are acceptable based on guidelines.

You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first

Answers

Answer:

The answer is: Saving the workbook to another available drive or a flash drive to protect data, then contact with the system administrator to get access to the J folder.

Explanation:

One excellent diagnostic tool is a digital agent, a software routine that performs an action when a specified event occurs. It can interact with customers to provide solutions, take customers on a tour of a company’s web site, or escalate customers from self-services to assisted service channels. Group of answer choices

Answers

Answer:

The given statement is true.

Explanation:

Diagnostic Tool seems to be a convenient and effective tool that allows management strategies continues to drive designed to access fix any technical errors that only the drive might well display.They arrive from several of the trusted companies and also have important advantages. Those other scanners would then encourage you to make a diagnosis a multitude of functionality, and that in deployment they are indeed very consistent, precise as well as accurate.

So that the above is the right answer.

Linked lists are collections of data items "lined up in a row"-- insertions and deletions can be made anywhere in:________
a. linked list.
b. Insertions and deletions are made only at one end of a stack, its top.
c. Insertions and deletions are made only at one end of a queue, its tail.
d. Binary trees facilitate high-speed searching and sorting of data.

Answers

Answer:

a. linked list

Explanation:

a b c are all correct statements..... but

insertions and deletions can happen anywhere in a linked list. Not Stack, Not Queue.

Adam is using the software development life cycle to create a new game. He made an outline of what functionality the game will require, determined how long it will take to create the game, and made a list of people who could help him with the graphics. What should Adam do next

Answers

Answer:

Write pseudocode and create a mock-up of how the game will work and look

Explanation:

Since in the question it is mentioned that Adam wants to develop a new game for this he made an outline with respect to game functions needed, time period, people who help him.

After that, he writes the pseudocode i.e a programming language and then develops a model i.e mock up that reflects the working of the game and its look so that he would get to know how much work is pending.

Suppose you have a tablet with a capacity of gigabytes. For a plain text​ book, one byte typically corresponds to one character and an average page consists of 2000 characters. Assume all gigabytes are used for plain text books. a. How many pages of text can the tablet​ hold? b. How many​ 500-page books can the tablet​ hold?

Answers

Answer:

a. 17,500,000 pages

b. 35,000

Explanation:

The computation is shown below:

As we know that

[tex]1 giga\ bytes = 1 \times 10 ^ {9} bytes[/tex]

So for 35 gigabytes it would be

[tex]= 35 \times 10 ^ {9} bytes[/tex]

And it is given that there is 2,000 characters

a. So the number of text pages would be

Let us assume that

for 2,000 it would be 1 page

So for [tex]35 \times 10 ^ {9} bytes[/tex] it would be x

Now we solve the x which is equal to

[tex]= \frac {35 \times 10 ^ {9} bytes}{2,000}[/tex]

= 17,500,000 pages

b. Now for 500 pages, it would be

[tex]= \frac{17,500,000}{500}[/tex]

= 35,000

What is question tags What is interjection Explain the meaning of consumer goods State the consumer rights What is the meaning of database Explain the meaning of digital divide

Answers

Answer:

The clause that turns a statement into question is called question tag. It consists of the statement, a comma and the question clause

 e.g You are Richa, aren't you?

Here aren't you is a question tag, it turns the statement into a question.

The words that is used to express strong emotion is called interjection. It can express emotion of excitement, joy, sorrow, pain and so on.The goods used by the consumers to fulfill their current demand rather that using it to produce another good. They are the end result of the production and manufacturing. You see these goods in showrooms, shops or stores. The law that is related with the things that a producer of goods must do to protect customers from harm is called consumer rights. These rights and laws came into existence through various legal disputes. Right to choose, right to be informed, right to safety and right to be heard are consumer rights. The organized collection of structured information that is stored electronically on a computer is called database. Most of the databases use structured query language to write and query data, databases are controlled by database management system. The divide between the people who have ready access to the internet and computer and those who do not is called digital divide.

convert binary Fraction to decimal:(11011. 101)​

Answers

Answer:

27.625

Explanation:

every binary digit is a power of 2, after the decimal point they become negative:

1·2⁴ + 1·2³ + 0·2² + 1·2¹ + 1·2⁰ + 1·2⁻¹ + 0·2⁻² + 1·2⁻³ = 27.625

The Duffy Design Group from Minneapolis, Minnesota demonstrated the effectiveness of graphic design using a vernacular design vocabulary in its label design for this product (still sold in grocery stores). The design is credited with dramatically increasing:______.

Answers

Answer:

sales in spite of a small advertising budget.

Explanation:

The Duffy Design Group was able to apply vernacular design in its label design for Classico Spaghetti Sauce. Vernacular design refers to the incorporation of the indigenous attributes of a people, be it their vocabulary, history, or any other aspect of their culture in an artistic form.

The success recorded by this group was that despite the fact that this product was not widely advertised, it still received high patronage because the people were able to relate to the design. This highlights the importance of recognizing and applying local culture in design.

Given that Jamie worked 50 hours (Hours = 50) last week and earns $10.00 an hour (Rate = 10), how much did Jamie earn last week, before taxes (TotalPay)? If (Rate >=10) OR (Hours <=40) Then TotalPay = Hours * Rate Else TotalPay = (Hours * Rate)+(Hours–40)*Rate*1.5 End If

Answers

Answer:

Jamie earned (Total pay)  $500.

Explanation:

We are given the following code:

If (Rate >=10) OR (Hours <=40) Then

   TotalPay = Hours * Rate

Else

   TotalPay = (Hours * Rate)+(Hours–40)*Rate*1.5

End If

Let us understand the code line by line:

The first line contains an if statement with 2 conditions:

i.e. 1st condition:

The rate is greater than or equal to 10

2nd condition:

Number of hours are lesser than or equal to 40.

There is OR between the two condition i.e. the statement next to if() statement will get executed if any one of them becomes true and else part will not be executed.

The next statement is:

TotalPay = Hours * Rate

It calculates the pay if any of the two conditions written earlier becomes true.

Next statement is else statement:

It will get executed given that the above if() statement becomes false.

Now, we are given that Jamie worked 50 hours last week and earns $10.00 an hour:

i.e.

Hours = 50

Rate = 10

Now, let get to the code execution.

The first condition is true i.e. Rate >= 10 (because Rate is 10 here)

So, the following statement will be used to calculate the Total pay:

TotalPay = Hours * Rate

and else part will not be executed.

TotalPay = 50 * 10  = $500  

Jamie earned (Total pay)  $500.

Assume the existence of a BankAccount class with a method, getAvailable that returns the amount of available funds in the account (as an integer), and a subclass, OverdraftedAccount, with two integer instance variables:

Answers

Answer: This is hard but I will research ok

Explanation:

Suppose that instead of swapping element A[i] with a random element from the subarray A[i..n], we swapped it with a random element from anywhere in the array: PERMUTE-WITH-ALL (A) 1, n = A.length 2, for i = 1 to n 3, swap A[i] with A[RANDOM(1, n)] Does this code produce a uniform random permutation? Why or why not?

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

Its Permute-with-all method, which doesn't result in a consistent randomized permutation. It takes into account this same permutation, which occurs while n=3. There's many 3 of each other, when the random calls, with each one of three different values returned and so, the value is=  27. Allow-with-all trying to call possible outcomes as of 3! = 6  

Permutations, when a random initial permutation has been made, there will now be any possible combination 1/6 times, that is an integer number m times, where each permutation will have to occur m/27= 1/6. this condition is not fulfilled by the Integer m.

Yes, if you've got the permutation of < 1,2,3 > as well as how to find out design, in which often get the following with permute-with-all  chances, which can be defined as follows:

[tex]\bold{PERMUTATION \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ PROBABILITY}[/tex]

[tex]\bold{<1,2,3> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27= 0.14 }\\\bold{<1,3,2> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\[/tex]

[tex]\bold{<2,1,3> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\\bold{<2,3,1>\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}[/tex]

[tex]\bold{<3,2,1> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27=0.14}[/tex]

Although these ADD to 1 none are equal to 1/6.

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
Which of the following steps can be taken to limit access to the computers?
A. Configure logon time restrictions.
B. Set the BIOS to automatically power off the computers at closing time.
C. Disable Microsoft account resources.
D. Change the user account passwords.

Answers

Answer:

A. Configure log on time restrictions.

Explanation:

Organizational heads can monitor when users can connect to the network using the logon hours function such as controlling user operation restricting unauthorized user and restricts users from network exposure beyond regular working hours.this feature helps to regulate the working hours during which one wish to allow or curtail user access, determine the selected domain, define the users to whom one wishes to extend the permit for this logon hours and make the required changes.  This option allows us to assign or limits logon access to different users in an efficient way.

Other Questions
The U.S. Congress passed a stimulus bill in February 2009 to help remove the economy from a recessionary gap. This is an example of the use of which explicit formula can be used to find the number of rabbits in the nth generation ? the answer choices are sec y= b/6sec y=6asec y=6bsec y= 6/b Part C: complete the third column Part D: complete the fourth column In an oligarchy, a) the state is run by corporate interests and companies instead of individuals. b) control rests with a single individual, such as a dictator. control rests with a small group, such as military officers or a few wealthy families. c) control rests with a small group of popularly elected individuals. d) the state controls all aspects of individuals' lives, including family relations and the practice of religion. The height of an object dropped from the top of a 144 foot- building is given by h(t)= -16 square +144. How long will it take the object to hit the ground? What is the probability of rolling a 2 and then rolling a 5 on two consecutive rolls of a fair 6-sided die?i kinda need quick answer pls tyy IMAGE BELOW The equations x minus 2 y = 4, 4 x + 5 y = 8, 6 x minus 5 y = 15, and x + 2 y = 0 are shown on the graph below.Which system of equations has a solution of approximately (1.8, 0.9)?6 x minus 5 y = 15 and x + 2 y = 04 x + 5 y = 8 and 6 x minus 5 y = 15x minus 2 y = 4 and 4 x + 5 y = 86 x minus 5 y = 15 and x minus 2 y = 4 Name the hydro carbon. please guys, its really urgent. The function y = sin^?1(3x + 1) is a composition, and so we must use the Chain Rule, given below, to find the derivative. d dx [f(g(x))] = f '(g(x))g'(x) For the given function sin^?1(3x + 1), the "inside" function is 3x + 1 and the "outside" function is f(x) = arcsin(x). Recall that the derivative of y = sin?1(x) is y' =__________? which discribes what a velocity/time graph would look like with no accelaration how do you find the x- and y-intersepts of an equation Yvette likes to increase the distance she runs by 1% each day. If yesterday Yvette ran 10.75km, how much further is she going to run today? If you could travel to outer space, where would you like to go and what wouldyou like to see?For 3rd standard paragraph writing ) Recall what you know about crossing over, independent assortment, and random joining of sex cells during sexual reproduction. In the equation y= 22 - 3.c + 8the y-intercept is - 3TrueO False A general chemistry student found a chunk of metal in the basement of a friend's house. To figure out what it was, she tried the following experiment. First she measured the mass of the metal to be 385.8 grams. Then she dropped the metal into a measuring cup and found that it displaced 17.8 mL of water. Calculate the density of the metal. Density = _______ g/mL Use the table below to decide the identity of the metal. This metal is most likely _________.substances density g/cm3water 1.00aluminium 2.72 chromium 7.25nickel 8.91silver 10.50lead 11.34 Is it possible to draw a triangle whose sides are as follows? 6 cm, 7 cm, 17 cm. Give reasons to support your answer. Use the given information to find the p-value. Also, use a 0.05 significance level and state the conclusion about the null hypothesis (reject the null hypothesis or fail to reject the null hypothesis). With Upper H1: p0.377, the test statistic is z=3.06.a. 0.0022; fail to reject the null hypothesis b. 0.0011; reject the null hypothesis c. 0.0022; reject the null hypothesis d. 0.0011; fail to reject the null hypothesis Part (a) Given that the velocity of blood pumping through the aorta is about 30 cm/s, what is the total current of the blood passing through the aorta (in grams of blood per second)? 94.2 Attempts Remain 33% Part (b) If all the blood that flows through the aorta then branches into the major arteries, what is the velocity of blood in the major arteries? Give your answer in cm/s X Attempts Remain v4.71 A 33% Part (c) The blood flowing in the major arteries then branches into the capillaries. If the velocity of blood in the capillaries is measured to be 0.04 cm/s, what is the cross sectional area of the capillary system in cm2? Grade Summary Deductions Potential cm2 A = 0% 100% cos( tan acos Submissions sin ( 7 8 9 ME Attempts remaining: 10 (4% per attempt) detailed view cotan0 asin acotan A E 4 5 6 atan cosh sinh0 1 2 3 tanh) ODegrees cotanh 0 + END Radians BACKSPACE CLEAR DELThe aorta (the main blood vessel coming out of the heart) has a radius of about 1.0 cm and the total cross section of the major arteries is about 20 cm2. The density of blood is about the same as water, 1 g/cm3.