Assessment 3
Assessment Type: Computer assignment – analysis and 1,500 + 10% word report – individual
assessment.
Purpose: To allow students to demonstrate an understanding of statistical analysis and the ability to
summarise and manipulate sample data, make basic statistical inferences and interpret the results in a
business context. This assessment contributes to learning outcome a, b, c and d.
Value: 25% (Preparation quizzes 5% and Word file, Excel file 20%)
Submission: Preparatory Quizzes — access and submit via Moodle links. An excel file with a unique
dataset and summaries of the dataset. A word file with answers to questions about the summaries of the
dataset and questions about some videos that discuss why statistics is useful.
Task details: Each individual student will be provided with their own unique dataset and they will have to
summarize the dataset using PivotTable and Scatterplot commands using Microsoft Excel
Students will have to use the summaries as the basis of a report that using descriptive and inferential
statistics.
Students will also have to use the dynamic array functions in Microsoft excel to create datasets with
summaries that are like their own unique dataset and describe the relationship between the variables in
simple terms that could be understood by someone that has not done a business statistics course.
Preparatory Quizzes: Before you start summarizing your dataset, you need to do the Preparatory Quizzes
to ensure you are familiar with the concepts and techniques involved. You may attempt the Quizzes as
many times as you like — each new attempt will overwrite the previous attempt. Only the last attempts will
be marked.
Marking Guide: Preparatory Quizzes: worth a total 5% of the final grade – individual marks will be identified
with each quiz in Moodle. Discussion of a sample repot worth 20% of the final grade. The marking rubric is
given on the next page

Answers

Answer 1

They are expected to summarize the dataset using PivotTable and Scatterplot commands, apply descriptive and inferential statistics, and create datasets with summaries using dynamic array functions. The assessment also includes preparatory quizzes to ensure students' understanding of the concepts and techniques involved. The final deliverables consist of an Excel file with dataset summaries and a Word file with answers to questions about the dataset and related videos.

Each student is provided with a unique dataset that they must summarize using PivotTable and Scatterplot commands. These summaries will form the basis of a report that applies descriptive and inferential statistics.

In addition to analyzing their own dataset, students are required to create datasets with summaries using dynamic array functions in Excel. They should describe the relationship between variables in simple terms, ensuring their explanations are easily understood by individuals without a background in business statistics.

To prepare for the assignment, students are required to complete preparatory quizzes on the relevant concepts and techniques. These quizzes aim to assess their familiarity with the material and can be attempted multiple times.

The assessment is divided into two components: the preparatory quizzes, which account for 5% of the final grade, and the sample report, which accounts for 20% of the final grade. The marking rubric provided will guide the evaluation process.

Learn more about array here:

https://brainly.com/question/13261246

#SPJ11


Related Questions

given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory

Answers

A vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory is given below

The Program

public boolean removeItemType(int index)

 {

   if (index < 0)

   {

     return false;

 }

   else

   itemCount = index;

   index--;

  return true;

 }

 public boolean reStock(int which, int qty)

{

   if (index < 0)

   {

     return false;

 }

   else

     

  return true;

 }

public class ItemType

{

private String name;

 private double price;

 private int quantity;

 public ItemType(String n, int p)

 {

   this.quantity = 0;

   this.name = n;

   if (p <= 0){

     this.price = 5;

   }

   else{

     this.price = p;

   }

 }

 public String getName()

 {

   return this.name;      

 }

 public int getPrice()

 {

   return (int) this.price;      

 }

 public int getQuantity()

 {

   return this.quantity;

 }  

public int addQuantity(int n)

 {

   if (quantity <0) {

   return -9999;  

   }

   else{

     if (quantity + n <= 10)

       quantity += n;

    return quantity;

 }

 }

 public int getItem()

 {

   if (quantity < 1){

     return -9999;

   }

   else

     this.quantity --;

   return quantity;

   

 }

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Complete the following code to display "teen" if a person is a teenager based on their age.
System.out.println("teen");

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Java programming language will be used to display "teen" if a person is a teenager based on their age.

   

public class HelloWorld{

    public static void main(String []args){

       

        int age;

        age =13;

       

       

        if (age>12 && age<20)// if age is between 12 and 20 such as 13,14,15,16,17,18,19- then this program will print "Teen"

        {

       System.out.println("Teen");

        }

    }

}                        

the unix operating system started the concept of socket which also came with a set of programming application programming interface (api) for 'socket level' programming. a socket was also uniquely identified as

Answers

TCP sockets.

whether they are distributed across a local system or a TCP/IP-based network environment, are provided by a socket programming interface.

What is a TCP socket?The routines needed for interprocess communication between applications, whether they are distributed across a local system or a TCP/IP-based network environment, are provided by a socket programming interface.Three components make up a socket: protocol, local address, and local port.  The two processes that make up a connection are fully described by the term "association": (protocol,local-address,local-port,foreign-address,foreign-port).TCP offers dependable data stream delivery between hosts on the Internet. Similar to UDP, TCP supports the block transmission of a nonstop stream of datagrams between process ports and makes use of Internet Protocol as the underlying protocol for datagram transport. TCP offers dependable message delivery in contrast to UDP.

To learn more about : TCP socket

Ref : https://brainly.com/question/14280351

#SPJ4

What are the popular avenues for publishing a Web site once it has been built? a. online services, software tools, and plain text editors b. ASP.NET, Dreamweaver, and JavaServer Pages c. ISPs, free sites, and Web hosting services d. Nvu, Adobe ColdFusion, and Rapid Weaver

Answers

The popular avenues for publishing a website once it has been built are ISPs (Internet Service Providers), free sites, and web hosting services.

What is an ISP?

An ISP offers web hosting services in addition to connecting consumers to the internet. As the name implies, free websites let users host their websites on a free subdomain that the website provides. In addition to other services like email accounts and domain name registration, web hosting providers give customers server space on which to host their websites.

Websites can be built using online services, software tools, and plain text editors, but they cannot be published using these methods. Although there are specialised channels for publishing a website, tools and platforms for constructing websites like ASP.NET, Dreamweaver, JavaServer Pages, Nvu, Adobe ColdFusion, and Rapid Weaver do exist.

Learn more about Web here:

https://brainly.com/question/17512897

#SPJ1

__________ (10 letters) is space between lines of program code that makes the code easier to read and that the compiler ignores.

Answers

Answer:

Whitespace. I hope this helps

Using the five words lion, tiger, bear, support, and carry, draw a semantic network whose vertices represent words and whose edges indicate pairs of words with related meanings. The vertex for which word is connected to all four other vertices? remember that a word can have multiple meanings

Answers

In the semantic network, the vertex that is connected to all four other vertices (lion, tiger, bear, support, carry) would be the word "bear." Here's an illustration of the semantic network:

    lion

    /  \

bear -- tiger

 |       |

support -- carry

In this network, each vertex represents a word, and the edges represent pairs of words with related meanings. Here's the reasoning behind the connections:

Lion and tiger: Both are large, carnivorous feline animals, often associated with strength and the wild.Bear and tiger: Both are large mammals and can be found in certain regions of the world, such as forests.Bear and support: "Bear" can also mean to support the weight of something or endure a burden, as in the phrase "bear the weight."Bear and carry: "Bear" can also mean to carry or transport something, like "bear a load" or "bear a responsibility."

It's worth noting that words can have multiple meanings, and the connections in the semantic network can represent different aspects or senses of those words. In this case, "bear" has connections representing the animal, supporting, and carrying meanings.

To know more about semantic network, please click on:

https://brainly.com/question/31840306

#SPJ11

Which feature do we most likely use to quickly change the background, fonts, and layout?

Auto Layout

Themes

Transitions

Smart Art Graphics

Answers

We most likely use the Themes feature to quickly change the background, fonts, and layout.

This feature allows us to easily customize the design of our presentation or document without having to manually adjust each individual element. By selecting a theme, we can instantly change the overall look and feel of our work with just a few clicks.

Themes can also be customized to suit your specific needs. For example, you can change the color scheme, font type, or background style of a theme to match your organization's branding or personal preferences. Additionally, some software applications allow you to create your own custom themes, which can be saved and applied to future documents or presentations.

In summary, themes are a powerful feature that can help you quickly and easily create professional-looking documents and presentations by providing a consistent set of design elements. By using themes, you can save time and effort while ensuring that your content looks polished and visually appealing.

Learn more about Themes :https://brainly.com/question/11600913

#SPJ11

The autocorrelation of a real signal x(n) is defined by cxx(n) = ∑ x(k) x(k-n). The MATLAB function ‘xcorr’ is used to compute the autocorrelation. Use MATLAB to calculate the autocorrelation of x(n) = [1 3 -2 4] for 0 ≤ n ≤ 3. Plot the autocorrelation versus lag. Why is cxx(n) = cxx(-n)?

Answers

The autocorrelation of x(n) = [1 3 -2 4] for 0 ≤ n ≤ 3 is [16, 2, 11, 12]. The autocorrelation function is symmetric around n = 0 because it represents the correlation between the signal and its time-reversed version.

The autocorrelation of x(n) = [1 3 -2 4] for 0 ≤ n ≤ 3 is cxx(n) = [16, 2, 11, 12].

1. In MATLAB, first define the signal x(n):
```matlab
x = [1 3 -2 4];
```

2. Use the 'xcorr' function to calculate the autocorrelation of x(n):
```matlab
cxx = xcorr(x);
```

3. By default, 'xcorr' calculates the autocorrelation for the full range of possible lags. To get the values for 0 ≤ n ≤ 3, you need to extract the last 4 values of the result:
```matlab
cxx = cxx(end-3:end);
```

4. To plot the autocorrelation versus lag, use the 'stem' function:
```matlab
lags = 0:3;
stem(lags, cxx);
xlabel('Lag');
ylabel('Autocorrelation');
title('Autocorrelation of x(n)');
```

Now, for the second part of your question: cxx(n) = cxx(-n) because the autocorrelation function is symmetric around n = 0. In other words, cxx(n) represents the correlation between the signal and its time-reversed version, so it has the same value when n is positive or negative.

The autocorrelation of x(n) = [1 3 -2 4] for 0 ≤ n ≤ 3 is [16, 2, 11, 12]. The autocorrelation function is symmetric around n = 0 because it represents the correlation between the signal and its time-reversed version.

To know more about function visit:

https://brainly.com/question/31255858

#SPJ11

How do you make the text bold?
Select one:
a. font-weight:bold;
b. font:bold;
c. style:bold;

Answers

Answer:

The correct answer is A. font-weight:bold;

Select the correct answer from each drop down menu

Ben has to write a note on color concepts. Help him complete the folloeingt sentences

When lights hits a surface the surface absorbs some of the light and reflects the rest. The color that you see depends on which log waves the surface _____ the most. You perceive objects as having a specific color because of these consistent _____ of light.


Blank 1 options reflects absorbs or emits
Blank 2 options
Rays colors or intensities

Answers

Answer:

Blank 1: reflects

Blank 2: rays

sorry if i get this wrong those are the only two that makes sense.

Explanation:

Answer: Blank 1: reflects

Blank 2: colors

ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do

Answers

Answer:

Enable the Erase data optionDisable the simple passcode option

Explanation:

Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.

Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.

Your dashboard shows total cars sold by city. how will the data be impacted if you set a condition filter for sum of cars sold greater than 100?

Answers

The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.

What is filter pf pages or picture?

Image or page filtering is known to be the act of altering or changing the form of an image and also reducing a page to the items that one wants.

Note that in filtering, it tends to bring about those areas that one has interest in and as such, in the case above, The data be impacted if you set a condition filter for sum of cars sold greater than 100 as the dashboard will only depict the cities that has more than 100 cars are sold.

Learn more about filter from

https://brainly.com/question/3198358

#SPJ1

b)what information is kept in the process table? how many areas of the operating system are using the process table to store data?

Answers

System monitoring utilities and tools also use the process table to show users data about active processes.

What details are stored in an operating system's process table?

Each item in the table, which is frequently referred to as a context block, provides details about a process, including its name, state (described below), priority (discussed below), registers, and any pending semaphores (discussed later). Depending on the operating system, a context block's precise contents will vary.

Which information is kept in the process tables?

The Linux kernel has a data structure called the process table that contains details about every process that is currently active. Process IDs, memory use statistics, and file descriptor usage are all listed in the process table process IDs, memory use, file descriptor usage, and other information are all contained in the process table.

To know more about data visit:-

https://brainly.com/question/29555990

#SPJ4

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

how do you solve 3.2.8 Repeating Message in Code HS

how do you solve 3.2.8 Repeating Message in Code HS

Answers

The program is an illustration of loops.

Loops are used to perform iterative and repetitive operations.

The correct program where comments are used to explain each line is as follows:

public class MyProgram extends ConsoleProgram {

public void run()     {

//This prompts the user for the number of times to repeat the message

     echo(" ", readInt("Times to repeat: "));

  }

private void echo(String lineOne, String lineTwo, int numTimes)     {

//The following iteration is repeated numTimes times

for (int i = 0; i < numTimes; i++){

//This prints lineOne

System.out.println(lineOne);

//This prints lineTwo

System.out.println(lineTwo);

}

 

  }

}

Read more about similar programs at:

brainly.com/question/17972093

Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.

Answers

Answer:

2nd statement is True dear!!!

Answer:

Deques can contain lists.

A deque is a type of collection.

Deques can be created empty.

Explanation:

Answers can be found in Edge instructions

"You can make a deque whose members are lists."

"You can create an empty deque or create a deque with a list or a string."

"You have used lists and deques, which are two types of collections used by Python. "

What is wrong with line 3 ?

What is wrong with line 3 ?

Answers

Answer:

i think you have to put "" or semicolon at the end

True or false. The PIC is an inter grated circuit in which the microprocessor architecture, along with read only memory (ROM) and random access memory (RAM), are all placed into one integrated circuit that may be reprogrammed; the microprocessor cannot.

Answers

Answer:

your partner in crime can not ROM around without a RAM.

Explanation:

so it would be false.

describe one advantage of using QR codes rather than traditional barcodes. Explain how barcodes bring the advantage you have describes

Answers

The advantage of using QR codes rather than traditional barcodes is that QR codes are known to be quiet  smaller.

Bar coding offers a lot of advantages such as the Reduction in errors.

Why are QR codes smaller?

QR codes are known to be quiet smaller  when compared to  traditional barcodes.

Note that the QR code can be about 10 times smaller when compared to a bar code and are known to be still readable.

Therefore, based on the above, one can say that the The advantage of using QR codes rather than traditional barcodes is that QR codes are known to be quiet  smaller. Bar coding offers a lot of advantages such as the Reduction in errors.

Learn more about barcodes from

https://brainly.com/question/13117502

#SPJ1

Which free web server was originally created for the unix/linux platforms, but now runs on multiple operating systems (including windows)?

Answers

The free web server that was originally created for the Unix/Linux platforms but now runs on multiple operating systems, including Windows, is Apache HTTP Server (commonly referred to as Apache).
Here's a step-by-step explanation:

Apache HTTP Server: Apache is the most widely used web server software in the world. It was developed by the Apache Software Foundation and first released in 1995.

Unix/Linux platforms: Initially, Apache was designed to run on Unix and Linux operating systems. These platforms are known for their stability, security, and reliability.

Multiple operating systems: Over time, Apache has evolved to support multiple operating systems, including Windows, macOS, and others. This has allowed users to deploy Apache on a wide range of machines and environments.

Benefits of Apache: Apache offers several advantages, such as:
  - Open-source: Apache is open-source software, meaning it can be freely used, modified, and distributed by anyone. This has contributed to its widespread adoption and development by a large community of contributors.
  - High-performance: Apache is known for its efficiency and scalability, enabling it to handle large volumes of web traffic and serve content quickly.
  - Flexibility: Apache supports a wide range of modules and extensions, allowing users to customize its functionality according to their specific needs.
   - Security: Apache offers various security features, such as SSL/TLS encryption and access control, to protect websites and data from unauthorized access.

In conclusion, the free web server originally created for Unix/Linux platforms but now running on multiple operating systems, including Windows, is Apache HTTP Server. Apache's versatility, performance, and security features have made it the web server of choice for many organizations and individuals worldwide.

To know more about Linux visit:

https://brainly.com/question/33210963

#SPJ11

A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is most likely an example of a ........................ blockchain. Group of answer choices Permissionless Permissioned

Answers

Answer:

Permissioned

Explanation:

In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.

NEED HELP ASAP!!!!!!!!!!!

What can happen if music is downloaded illegally from a P2P network?
Large fines may have to be paid.
O Your computer screen will freeze.
O Your computer will shut down.
You will not receive the correct music.

Answers

Your computer will shut down I think

A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over a shared medium. Examples are a bus-technology local area network, such as Ethernet, and a wireless radio network. Discuss the need or lack of need for a network layer (OSI layer 3) in a broadcast network.

Answers

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

Given the following problem specification:
You need to develop a system that reads character values from the user and store them in a 2D array of size [2][3]. Then find how many times the letter ‘a’ occurred.
Print the 2D array as a matrix, in addition to the answer.

Answers

To develop a system that reads character values from the user and store them in a 2D array of size [2][3], and then find how many times the letter ‘a’ occurred and print the 2D array as a matrix, we can use the following code:```#include
#include

int main()
{
   char arr[2][3];
   int i, j, count = 0;

   for(i=0; i<2; i++)
   {
       for(j=0; j<3; j++)
       {
           printf("Enter a character: ");
           scanf(" %c", &arr[i][j]);
           if(arr[i][j] == 'a' || arr[i][j] == 'A')
              count++;
       }
   }

   printf("\nThe 2D array as a matrix is:\n");

   for(i=0; i<2; i++)
   {
       for(j=0; j<3; j++)
       {
           printf("%c ", arr[i][j]);
       }
       printf("\n");
   }

   printf("\nThe letter 'a' occurred %d times in the 2D array.", count);

   return 0;


}```Here, we have declared a 2D array of size [2][3] to store the character values entered by the user. We have used two for loops to iterate over the array and read the character values entered by the user. We have also used a counter variable to count the number of times the letter 'a' occurred in the array.Once we have read all the character values, we print the 2D array as a matrix using another set of for loops. Finally, we print the number of times the letter 'a' occurred in the array.

To know more about character  visit:-

https://brainly.com/question/17812450

#SPJ11

Given the code above, which item identifies the method's return type?
A.public
B.println
C.static
D.

Answers

The method's return type in the given code is identified by the term "void".

The return type of a Java method is specified just before the name of the method. In this case, we have a method called main, and its return type is indicated by the keyword void, which means that the method does not return any value.

So, the correct answer to your question is option d: void. Options a, b, and c do not specify the return type of the method.

Additionally, there is a syntax error in the given code. The correct syntax for defining a class and its main method in Java is as follows:

public class First {

   public static void main(String[] args) {

       System.out.println("First Java application");

   }

}

Note the use of curly braces to define the body of the class and the method, and the use of uppercase S and System for the out object's reference.

Learn more about void here:https://brainly.com/question/25644365

#SPJ11

Your question is incomplete but probably the full question was:

public class First

(

public static void main(String[] args)

(

system.out.println("First Java application");

)

)

given the above code, which item identifies the method's return type?

a. public

b. println

c. static

d. void

Given the code above, which item identifies the method's return type?A.publicB.printlnC.staticD.

why is the pc showing the same display on two monitors

Answers

\(Answer:\)

Your computer is set to that by default. If you want the display to be separated, see what you can find in your settings\(.\)

If that doesn't work, try to find some reliable help on a browser search.

Rules for addressing and sending data across the internet by assigning unique numbers to each connected device is called: ________

Answers

Answer:

the Internet Protocol (IP).

HELP HELP HELP HELP
I spilled acetone nail polish remover on my Chromebook and it left white stains and I tried to scrap most of it off but it won't go away and I REALLY need to fix or cover this up :( Please help me!!!

Answers

use sharpie or nail polish that is the same color as the chromebook then buff it out with sandpaper

what are some of the features of oracle database, up to, and including oracle 19c? (choose three) performance-related features

Answers

Some of the features of the oracle database, up to, and including oracle 19c are performance-related features, security, and availability. Oracle totally automates all common database jobs using machine learning.

With the longest period of support and the productivity, manageability, and security advantages of a converged database, Oracle Database 19c provides the most reliable foundation for your applications.

Performance: It improves developments in SQL query, data optimization, performance, and tuning diagnostics. Also included are Oracle Exadata capabilities like Smart Scans, Columnar Flash Cache, and Storage Indexes.

High Availability: A selection of databases with the best features and best practices are made accessible to solve the common causes of planned and unplanned downtime for both on-premises and in-Cloud companies.

Security: 19c uses a multi-layer, defense-in-depth strategy to protect data, giving clients access to security capabilities that can monitor users, manage and block illegal access, and control access to data at the user- and application levels. It uses a multi-model strategy that supports both relational and non-relational data. Customers can benefit from the security features of the Oracle database in this way.

To learn more about oracle database click here:

brainly.com/question/29349631

#SPJ4

In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment.

Answers

Answer:

4GL is the answer

hope this is what ur looking for...

Other Questions
Broadcom Inc is expected to have EPS of $2 and ROE of 0.1696 in the coming year. If the firm is expected to continue to retain 70% of earnings for the foreseeable future, what's the intrinsic value of the stock if the required return is 11%? c. given that the 1s, 2s, and 2p electrons are not involved, and that no light emission at longer wavelengths is observed, predict what transition is responsible for this emission. Explain the difference between comparative negligence and contributory negligence.How is actual cause different from proximate cause?What is an example of assumption of risk?How does res ipsa loquitur help a plaintiff establish a case of negligence? What is the difference between Mass Media and Social Media? in 2017 , sharjah unfurled the worlds largest flag measuring 70m in length and 35m in width.the flag broke the guiinness world record for the largest flag hoisted on a fixed flagpole . there are 4 colours that occupy almost the same area in the flag . based on the above information , how much area will the black part occupy Identify the first legal procedural step the navy must take to obtain the desired change to this airspace designation. 2 KCIO; (s) > 2 KCI(s) + 3 0,(g)How many moles of O, form if 3.0 mol of KCIO, are totally consumed? does biden have the political capital to pass his social infrastructure bill The nurse is caring for a client with a history of transient ischemic attacks (TIAs) and moderate carotid stenosis who has undergone a carotid endarterectomy. Which postoperative finding would cause the nurse the most concern Trevor folded a corner of a rectangular piece of paper to form a pentagon, as shown below. What is the area of the shaded pentagon? A. 84.5 square inches B. 75.5 square inches c. 39.5 square inches D. 35 square inches.PLEASE HELP I WILL GIVE BRAINLIEST. 7. Which macroeconomic goal attempts tominimize price level increases?A. A. Marginal UtilityBB. Full Employment inuoms istoj entav C. Price Stability to sidslisvs ymontoosD. D. GDP The probability of a spinner landing on yellow is 1/4. What does 3/4 represent? HELP HELP- Tell me how energy us being transformed when you arerubbing your hands together.You answer must include. Chemical energy, mechanical energy,sound energy, and heat energy. Write 9.55 as a mixed number Fitness goals should only be focused on an event, like a 5K or tennis tournament. A. True B. False Find the missing quantity with the information given. Round rates to the nearest whole percent and dollar amounts to the nearest cent.Original price = $4.50$ Markdown = $1.30% Markdown = ? Ok I have 4 questions for you. I will give 50 points, if you answer correctly PLS hurry.Which statements are supported by the Dynasty Timeline? 1. Choose all answers that are correct.:The Tang ruled China between the seventh and tenth centuries.The Song dynasty ruled China before the Tang Dynasty.The Song dynasty ended in 1279.The Tang dynasty lasted about 100 years.The Song dynasty lasted more than 300 years.2. Why is the Tang Dynasty called a golden age for China:Much gold was imported from the West and traded for silk from the East.It was a time of harmony, stability, and achievement.Scholars and emperors took the teachings of Confucius seriously.The Grand Canal was completed during the Tang reign.3. Which of the following contributed greatly to the fall of the Song Dynasty:the improvement of the civil service systemthe vulnerability to invaders from the norththe invention of gunpowderthe increase in the Chinese population4. Which statements are true of the Silk Road?Choose all answers that are correct: Merchants faced hardships from climate and dangerous terrain on the Silk Road.A lot of ideas and knowledge were exchanged along the Silk Road.Most merchants on the Silk Road used money in the exchange of goods.Merchants from China carried silk and spices to trade with Westerners. Demographics is the statistical study of The three broad areas of demographics are birth, aging and Determine the slope from the given graph below: Masterson Wood Products pays Kim Mitchell a $1380 monthly salary plus a 11 commession on merchandise she reach monthAsume Kwaste $84,500 for last month. Calculate the following amounts: Calculator 1. Amount of Commission 5131 2. Gross Pu