Match terms with their descriptions:
a mechanism that allows the program to have run-time access to the types and their structure and modify their behavior a. virtual method table b. class instance record c. reflection

Answers

Answer 1

c. reflection

A mechanism that allows the program to have run-time access to the types and their structure and modify their behavior reflection

How is the mechanism that provides run-time access to types, structure, and behavior called?

The mechanism that allows a program to have run-time access to the types, structure, and behavior of objects is known as reflection. Reflection is a feature found in many programming languages that enables introspection and dynamic modification of code during runtime. It provides the ability to examine and manipulate the metadata and structure of types, such as classes and objects, at execution time.

When using reflection, a program can retrieve information about the properties, methods, and events of a type, instantiate objects dynamically, invoke methods dynamically, and modify the behavior of objects dynamically. Reflection allows developers to build more flexible and adaptable systems by providing the means to interact with types and objects in a dynamic and programmatic way.

Learn more about reflection

brainly.com/question/15487308

#SPJ11


Related Questions

so can u please follow my new ig acc i just started it yesterday its called stunnerspamz

Answers

Answer:

why are you advertising in brainly?????

Ohhhhhhhh okay uh sure

what raid type below utilizes parity data across all drives instead of using a separate drive to hold parity error checking information?

Answers

RAID level 0 is known as disk mirroring, because it involves connecting multiple drives in the server to the same disk controller card.

What are the levels of RAID?

RAID level options are 0, 1, 3, 5, 1+0, 3+0 (30), or 5+0. (50). The most commonly utilized RAID levels are 1, 3, and 5. The RAID levels are briefly summarized in the table below.

The Level 5 RAID is what?

Blacklist segmentation with redistributed parity makes up RAID 5. Parity information is spread across the disks, unlike in RAID 4. To function, all drives except one must be present. The distributed parity can be used to recalculate consecutive reads in the event of a singular drive failure, ensuring that no data is lost.

To know more about RAID level visit:

https://brainly.com/question/30022989

#SPJ4

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

How many points are used in every edit from the source window to the timeline?

Answers

Typically two points are used in every edit from the source window to the timeline. These points are the In point and Out point

In editing, typically two points are used in every edit from the source window to the timeline. These points are the In point and Out point, which represent the beginning and end of a specific clip or segment that you want to include in your final edit on the timeline. However it also depends on the specific editing software being used and the type of edit being made. Generally, points refer to markers or keyframes that are placed on the timeline to indicate where changes or effects occur in the footage. The number of points used in an edit can vary widely depending on the complexity of the edit and the desired outcome. It is important to carefully consider the placement and number of points in order to create a smooth and seamless final product.

Learn more about keyframes here:

https://brainly.com/question/28270843

#SPJ11

(6pts) using two 74x163 counters, design a counter with counting sequence 0, 128, 129,…, 254, 255, 0, 128, 129, … , 254, 255. logic 0 and 1 are available.

Answers

Design counter using 74x163 with given sequence.

How to design a counter with specific counting sequence?

To design a counter with the given counting sequence using two 74x163 counters, we can follow these steps:

Connect the clocks (CP) of both counters together.Connect the enable (ENP and ENT) pins of both counters to logic 1.Connect the load (LD) pins of both counters to logic 0.Connect the asynchronous clear (CLR) pins of both counters to logic 1.Connect the outputs (Q0-Q7) of the first counter to the inputs (D0-D7) of the second counter.Connect the carry-out (COUT) of the first counter to the enable (ENP) pin of the second counter.Connect the outputs (Q4-Q7) of the second counter to LEDs or other output devices.

With this configuration, the first counter will count from 0 to 255 and then wrap around to 0 again. The carry-out signal from the first counter will enable the second counter to count from 128 to 255 and then wrap around to 128 again. This will repeat indefinitely, resulting in the desired counting sequence of 0, 128, 129,..., 254, 255, 0, 128, 129,..., 254, 255.

Note: This design assumes that the counters are being used in synchronous mode, with the clock input connected to a stable clock signal. The exact pin connections may vary depending on the specific implementation of the 74x163 counter.

Learn more about counting sequence

brainly.com/question/18560230

#SPJ11

This data was entered starting in the top left of a spreadsheet.

Friends Favorite Food Favorite Book Favorite Place Favorite Sport
Chris Pizza A Separate Peace Beach Football
Filip Ice Cream The Things They Carried Gym Tennis
Ghjuvanni Chocolate Cake Lord of the Flies City Lacrosse
Yosef Lacustrine High Low Medium
What item is in cell B3?


The Things They Carried

Ice Cream

Chips

A Separate Peace

Answers

The item in cell B3 is "The Things They Carried", which is Filip's favorite book.

Why is this so?

Present in the second column and third row of the spreadsheet is cell B3, filled with Filip's cherished book- "The Things They Carried". The first row consists of categories encompassing topics such as "Friends", "Favorite Food", "Favorite Book", "Favorite Place," and "Favorite Sport"; following these headers are each individual friend's respective preferences.  

Alongside his favorite novel choice given above, it has been revealed that Filip prefers ice cream as his desired food, the gym as the enticing locale of choice, and tennis proves to be his preferred athletic activity.

Such a detailed document was likely created for meticulous comparison and in-depth analysis of friends' different interests covering various groups.

Read more about spreadsheets here:

https://brainly.com/question/26919847

#SPJ1

Question #9
Multiple select
These statements describe saving presentations.
A. Select the save option in the file menu to save.
B. It is a good idea to save often.
C. Name your file in a way enables you to find it later.
D. Save by selecting the save option in the tools menu.
E. Save once is enough.
F. Click on the icon to save.

Correct answers a,b,c,f

Question #9Multiple selectThese statements describe saving presentations. A. Select the save option in

Answers

The correct statements regarding saving presentations are:

A. Select the save option in the file menu to save.B. It is a good idea to save often.C. Name your file in a way that enables you to find it later.F. Click on the icon to save.

Why is Statement D incorrect?

Statement D is incorrect as there is no "save" option in the tools menu in most presentation software.

Statement E is also incorrect as it is always a good practice to save your presentation multiple times during the creation process to avoid losing any changes or progress made.

Read more about presentations here:

https://brainly.com/question/24653274

#SPJ1

given a string matrix we in that need to find the
number which is occured two times or more than two times and and
give the sum of those numbers
Sample input::
[1 3 4
3 6 8
8 6 8]
Output:
3+8=11"
Plea

Answers

Given a string matrix, we need to find the number that occurred two times or more than two times and give the sum of those numbers. In order to do this, we can take the following approach:We can convert the string matrix into an integer matrix. We can create an empty dictionary. We will iterate through each element in the matrix.

If the element is not present in the dictionary, we will add it with the value 1. If the element is already present in the dictionary, we will increment its value by 1. After iterating through the matrix, we will iterate through the keys of the dictionary and add the sum of the keys whose values are greater than or equal to 2. The sum of these keys will be the desired output.

Here is the implementation of the above approach in Python: matrix = [[1, 3, 4], [3, 6, 8], [8, 6, 8]]d = {}# Convert string matrix to integer matrix for i in range(len(matrix)):    for j in range(len(matrix[i])):        matrix[i][j] = int(matrix[i][j])# Populate dictionary with occurrences of each number for i in range(len(matrix)):    for j in range(len(matrix[i])):        if matrix[i][j] not in d:            d[matrix[i][j]] = 1        else:            d[matrix[i][j]] += 1# Calculate sum of numbers that occurred 2 or more times sum = 0for key in d:    if d[key] >= 2:        sum += key print(sum) In the given problem, we have a matrix of strings and we need to find the numbers that occurred two or more times and sum them up. To solve this problem, we first need to convert the string matrix into an integer matrix. We then need to iterate through each element in the matrix and populate a dictionary with occurrences of each number in the matrix.

To know more about matrix visit:

https://brainly.com/question/29132693

#SPJ11

GIVING BRAINLIEST!

1. The Monte Carlo method uses ___________ for computer simulations

2. The Monte Carlo method was first developed during World War II to test __________

Answers

In 1993, Gordon et al. published the first use of a Monte Carlo resampling procedure in Bayesian statistical inference in their important work.

What Monte Carlo method uses for computer?

In forecasting and decision-making, the Monte Carlo approach is a computerized mathematical tool that enables humans to statistically account for risk.

A mathematical method called Monte Carlo Simulation creates random variables to model the risk or uncertainty of a particular system.

Therefore, The Monte Carlo method uses mathematics for computer simulations. The Monte Carlo method was first developed during World War II to test decision improve making.

Learn more about Monte Carlo here:

https://brainly.com/question/15350591

#SPJ1

Write a program to display "HELLO WORLD" ​

Answers

Explanation:

Here's a simple "Hello, World!" program written in Python:

```python

print("HELLO WORLD")

```

To execute this program, you need to have Python installed on your computer. Save the code above to a file named `hello_world.py` and then run it using the command `python hello_world.py` in the terminal or command prompt.

what is the standard unit used to measure mass?​

Answers

Answer:

the standard unit used to measure mass is gram.

Does anybody have the code to 2.19.5: Circle Pyramid 2.0 in CodeHS?

Answers

Answer:

Not rlly im only missing one of the check marks so here if yall find out what to do pls tell me in the comments

Explanation:

#WHat the actual frik

speed(0)

radius = 25

penup()

setposition(-150,-60)

   

   

def move_to_row(num_circ):

   x_value = -((num_circ*5)/2)

   y_value = -200+(5*radius)

   penup()

   setposition(x_value,y_value)

   pendown()

def row_value(num_circ):

   for i in range(num_circ):

       for i in range(4):

           pendown()

           circle(radius)

           penup()

       forward(70)

num_circ=int(input("How many circles on the bottom row? (8 or less): "))

for i in range(num_circ):

   move_to_row(num_circ)

   radius=radius+1

   row_value(num_circ)

   num_circ=num_circ-1

What are some good apps to download to screenshot your screen?

Answers

Answer:

AZ Screen Recorder.

Firefox ScreenshotGo Beta.

Screenshot Touch.

Screen Master.

Most personal assistant apps

what type of relationship exists between two objects when one object is a specialized version of another object?

Answers

When one object is a specialized version of another object, it is said to have an is-a relationship with the other object. This is also known as inheritance in object-oriented programming.

In this type of relationship, the specialized object is a subtype or a derived class of the other object, which is the supertype or base class. The specialized object inherits all the properties and behaviors of the supertype, but it may also have additional properties or behaviors that are specific to its subtype. For example, a sports car is a specialized version of a car, and it has additional properties and behaviors that are specific to sports cars, such as a high-performance engine, aerodynamic design, and faster speed. Therefore, we can say that a sports car "is a" car, but a car is not necessarily a sports car.

Learn more about specialized version here:

https://brainly.com/question/31854659

#SPJ11

A teacher is writing a code segment that will use variables to represent a studentâs name and whether or not the student is currently absent. Which of the following variables are most appropriate for the code segment?answer choicesA. A string variable named s and a Boolean variable named aB. A string variable named s and a numeric variable named nC. A string variable named studentName and a Boolean variable named isAbsentD. A string variable named studentName and a numeric variable named numAbsences

Answers

A string variable named studentName and a Boolean variable named is Absent are most appropriate for representing a student's name and whether or not they are currently absent in the code segment.

This is because a string variable can hold the student's name, while a Boolean variable can store a true/false value indicating whether the student is currently absent or not. Using a numeric variable for absences would be unnecessary and potentially confusing. Additionally, using descriptive variable names like "studentName" and "isAbsent" makes the code more readable and understandable.

Learn more about  studentName  here;

https://brainly.com/question/14166674

#SPJ11

MULTIPLE CHOICE
im confused can someone answer + maybe explain
java

MULTIPLE CHOICEim confused can someone answer + maybe explainjava

Answers

1) Note that the correct statement that correctly determines the sum of ALL the numbers in the list is:

int sum = 0; for(int index = 0; index<10; index++){sum +=numbersList[index];} (Option C)

2) The correct statement that shows the subtotal for chocolate bars is :

double subTotal = numChocs*priceList[3]; (Option A)

What is the rationale for the above response?

Note that the value of subTotal is calculated by multiplying the number of chocolate bars (numChocs) by the price of chocolate bars (priceList[3]).

It is critical to use double rather than int because the priceList is of type double; if you use int, the decimal component will be truncated.

Learn more about statements in programming:
https://brainly.com/question/13735734
#SPJ1

A computer equipped with fingerprint recognition software, which denies access to a computer to anyone whose fingerprint is not on file, identifies a person's fingerprint by analyzing not only the detailed structure of the fingerprint, but also such characteristics as the level of pressure upon which the finger placed on the scanner and the finger's skin tone. Even the most adept computer hackers cannot duplicate all the characteristics the software analyzes.

Which of the following can be logically concluded from the passage above?
A. Use of the recognition software is largely impractical due to the time it takes to record and analyze a fingerprint.
B. Computers equipped with the recognition software will soon be installed in most financial firms that deal with sensitive electronic information.
C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints.
D. Fingerprint recognition software has taken many years and tremendous investment to develop and perfect.
E. The fingerprint recognition software is so sensitive that many authorized users are often denied legitimate access.

Answers

Answer: C. It is not possible for any top computer hacker to gain access to a computer equipped with the recognition software solely by virtue of skill in replicating the structure of fingerprints

Explanation:

Option A is incorrect. There's no information on the speed and analysis of the fingerprint.

Option B is incorrect. No information regarding computer installation was given in the passage.

Option C is correct. With the information, it can be concluded that it is impossible for a top hacker to have access to the protected computer.

Option D is Incorrect. Information regarding time and investment costs that were incurred during the software development wasn't given in the passage

Option E is Incorrect. The passage didn't give information on the errors that the software produced.

you are the administrator for a large single-domain network. you have several windows server domain controllers and member servers. your 3,500 client computers are windows workstations. today, one of your users has called for help. it seems that his computer is reporting that a trust cannot be established between his windows computer and the domain controller. he is unable to log on to the domain. you examine the computer's account using active directory users and computers, and there is nothing obviously wrong. you need to allow this user to log on to the domain. what should you do? answer reset the computer account. rejoin the domain. reset the computer account and rejoin the domain. re-enable the computer account. re-enable the computer account and rejoin the domain.

Answers

In this scenario, the user is unable to log on to the domain due to the error message stating that a trust cannot be established between his computer and the domain controller.

1)As an administrator, the first step would be to examine the computer's account using Active Directory Users and Computers. If there is nothing obviously wrong with the account, the next step would be to reset the computer account.

2)Resetting the computer account will remove the trust relationship between the workstation and the domain controller, and will also disjoin the workstation from the domain. After resetting the computer account, the user can then rejoin the domain by logging in with an account that has administrative rights on the computer.

3)If resetting the computer account does not solve the issue, the next step would be to re-enable the computer account. This will allow the computer to communication with the domain controller and establish the trust relationship again. Once the computer account is enabled, the user can attempt to log in to the domain again.

4)In summary, to allow the user to log on to the domain, the administrator should reset the computer account and rejoin the domain. If this does not work, re-enabling the computer account should be the next step.

For more such question on communication

https://brainly.com/question/26152499

#SPJ11

Give an example where traditional laws and modern media have created "grey areas".

Answers

mainly through firewalls, in order to protect a certain website from hackers or criminals getting into a website, modern media has made grey areas in order to sustain a continuous watch to see if any criminals broke through a firewall

__________for about 10 minutes in between each repetition session helps you to remember the information better. a. Reading c. Sleeping b. Resting d. None of these

Answers

the answer is a.) reading

Answer:

Hey make sure you REST before school ( Its b. resting)

Explanation:

I hope everyone that sees this has a wonderful day and if your not hopefully this cat and dog will make you feel better, BYE LOVIES!!

__________for about 10 minutes in between each repetition session helps you to remember the information

similarities between human and computer​

Answers

Answer: Both have a center for knowledge; motherboard and brain. Both have a way of translating messages to an action. Both have a way of creating and sending messages to different parts of the system.

What is the missing line of code?

>>> info = {3:10, 4:23, 7:10, 11:31}
>>>_____
>>> info
{3: 10, 4: 23, 7: 10, 11: 31, 15: 23}

info.append({15:23})

info.update({15:23})

info.add{15:23})

info.insert({15:23})

Answers

Answer:

info. insert({15:23})

Answer:

info. insert({15:23})

Explanation:

=(A2+A3)*12% is an example of a function in excel true or false

Answers

False but I’m not to sure

Which of the following statements is true?

A.
Freelancers often charge high hourly rates to make up for the fact that their employers don't provide health care and other benefits.

B.
Freelancers automatically receive free health insurance.

C.
Freelancers are not reliable because there is no way to rate their work ethic or job performance.

D.
Freelancers must hire an accountant to handle their billing and payments.

Answers

Answer:

A.

Explanation:

The correct statement is: A. Freelancers often charge high hourly rates to make up for the fact that their employers don't provide health care and other benefits.

Freelancers often charge high hourly rates to make up for the fact that their employers don't provide health care and other benefits.

Freelancers typically have to factor in the costs of healthcare, retirement savings, and other benefits that are not provided by their clients or employers.

This can lead to higher hourly rates to ensure they can cover these expenses on their own.

Hence,

The statement that is true is A.

To learn more about skills of freelancing visit:

https://brainly.com/question/33779682

#SPJ3

For this picnic, you need to feed at least 300 people. If you want to feed everyone, but still have equal numbers of buns and hot dogs, what is the minimum number of packages of buns and hot dogs you need, respectively

Answers

The minimum number of packages of buns and hot dogs you need, respectively, is 150.

How many packages of buns and hot dogs are required to feed everyone with equal numbers?

To feed at least 300 people with equal numbers of buns and hot dogs, you will need a minimum of 150 packages of buns and 150 packages of hot dogs.

Each package of buns and hot dogs will provide enough food for two people. Since you want equal numbers of buns and hot dogs, you can divide the total number of people (300) by 2, which gives you 150. Therefore, you will need 150 packages of buns and 150 packages of hot dogs.

Learn more about hot dogs

brainly.com/question/31525648

#SPJ11

Suppose you have been hired as a Software Engineer by a company XYZ. You have been assigned a task to develop a complex data processing application, involving the parsing and analysis of large XML files that contain structured data. This structured data is organized and formatted consistently. Your specific responsibility revolves around memory allocation for the data processing tasks, with a focus on fast data access and no requirement for memory deallocation. For doing so, either you will carry out the stack memory allocation or heap memory allocation.

Answers

As a software engineer, my responsibility revolves around memory allocation for the data processing tasks with a focus on fast data access and no requirement for memory deallocation.

For this task, either stack memory allocation or heap memory allocation can be used. Before deciding between stack and heap memory allocation, we should understand the basics of both types of memory allocation. Stack Memory Allocation: Stack memory allocation is an automatic memory allocation that occurs in the stack section.

It is a simple and efficient way of memory allocation. However, it is limited in size and can result in stack overflow if the allocated size is more than the limit. It follows a Last In First Out (LIFO) order. It is faster compared to heap memory allocation due to its simple mechanism and fixed size.

To know more about engineer visit:

https://brainly.com/question/31140236

#SPJ11

8.1 edhesive answer please

Answers

Answer:

dont understand what u mean

smartbook recharge mode can be accessed at any time during a smartbook assignment attempt.T/F

Answers

The statement 'smartbook recharge mode can be accessed at any time during a smartbook assignment attempt' is true so that students can save the progress of their assignment.

Smartbook Recharge Mode is an invaluable resource for any student attempting a Smartbook assignment. With Smartbook Recharge Mode, students can take a break from their assignment at any time and the progress will be saved.

This allows students to recharge and come back with a fresh perspective, without having to start their assignment all over again.

So, if you need a break while working on a Smartbook assignment, don't worry – Smartbook Recharge Mode has you covered.

To learn more about recharge, click here:

https://brainly.com/question/1337226

#SPJ4

a linux security administrator wants to use a built in tool to implement an os security mechanism that enforces access rules based on privileges for interactions between processes, files, and users.

Answers

What should he use?

A Linux security administrator can use the built-in security mechanism called access control lists (ACLs) to enforce access rules based on privileges for interactions between processes, files, and users.

ACLs allow administrators to set fine-grained permissions for specific users or groups of users on individual files or directories, allowing for more precise control over who has access to what resources.

What are ACLs?

ACLs, or access control lists, are a security mechanism that is used to enforce access rules based on privileges for interactions between processes, files, and users. ACLs allow administrators to set fine-grained permissions for specific users or groups of users on individual files or directories, allowing for more precise control over who has access to what resources.

This allows administrators to implement more complex and flexible access control policies, beyond the traditional Unix-style permissions of read, write, and execute.

ACLs are commonly used in Linux and other operating systems to provide additional control over access to resources.

To Know More About ACLs, Check Out

https://brainly.com/question/13195646

#SPJ1

Modify the binary search algorithm to take the upper of the two
middle array elements in case the input array has even length. In
other words, in the binary search algorithm, replace
Trace the action

Answers

The binary search algorithm can be modified to handle arrays with even lengths by considering the upper of the two middle elements as the pivot. This modification ensures that the algorithm works correctly and efficiently for arrays of any length.

In the traditional binary search algorithm, the pivot is chosen as the middle element of the array. This works well for arrays with odd lengths, but poses a challenge when the array length is even. In such cases, there is no exact middle element. To address this, we can modify the algorithm to consider the upper of the two middle elements as the pivot.

When dividing the array in half during each iteration, we can calculate the middle index as (low + high) // 2. However, for arrays with even lengths, we can modify this calculation to (low + high + 1) // 2 in order to choose the upper middle element as the pivot. By making this modification, the binary search algorithm can handle arrays of any length correctly. This ensures that the search process efficiently narrows down the search space and accurately finds the target element, regardless of the array's length.

Learn more about array here-

https://brainly.com/question/30757831

#SPJ11

Other Questions
Analyse Acers outbound logistics. Explore the marketing strategies, customer support and supply chain channels. Relate these to business process performance and operational standards. You are required to assess the type of marketing strategy for the outward supply chain business to ensure Acers success. What is an equivalent expression to 9(c+5)= Help again quick please!Best answer gets BrainlyestIf you answer you get 100 points What is the value of this expression?5/6-(1/8 divided by 3/4)Answer as simplest from The U.S. Department of Transportation requires tire manufacturers to provide tire performance on the sidewall of the tire to better inform prospective customers when making a purchase.One very important measure of tire performance is the tread wear index, which indicates the tire's resistance to tread wear compared with a tire graded with a base of 100. This means that a tire with a grade of 200 should last twice as long, on average, as a tired graded with a base of 100. A consumer organization wants to estimate the actual tread wear index of a brand name of tires that claim "graded 200" on the sidewall of the tire. A random sample of n = 18 indicates a sample mean tread wear index of 195.3 and a sample standard deviation of 21.4.A) Assuming that the population of tread wear indexes is normally distributed, construct a 95% confidence interval estimate of the population mean tread index for tires produced by this manufacturer under this brand name.B) Do you think that the consumer organization should accuse the manufacturer of producing tires that do not think meet the performance information provided on the sidewall of the tire? Explain.C) Explain why an observed tread wear index of 210 for a particular tire is not usual, even though it is outside the confidence interval developed in (a). Apply the Woven mat texture fill (first row, fourth column) to th.e Patio and Furniture slice. what is the current through the battery immediately after the switch is closed? express your answer to two significant figures and include the appropriate units. Eric ran 1 1/4 miles. Then he biked 3 1/2 times farther than he ran.How far did Eric bike?Enter your answer as a mixed number in simplest form. A car is travelling at 10m/s. How far Would the car travel in 30 seconds A patient who weighs 170 lb has an order for an IVPB to infuse at the rate of 0.05 mg/kg/min. The medication is to be added to 100 mL NS and infuse over 30 minutes. How many grams of the drug will the patient receive? Carolus Linnaeus developed a two-part naming system to refer to all living organisms. The two-part name, known as binomial nomenclature, identifies a species and genus name. What is the correct binomial nomenclature for humans? Question 2 options: Hom Sapiens Hom sapiens hom Sapien's hom sapiens Exercise 1 Draw one line under the simple subject and two lines under the simple predicate. Circle the direct object. At the end of the sentence, write the word what? or whom? to tell which question the direct object answers. Earths atmosphere supports many forms of life. Time Elapsed 36 minutes Question 11 1 out of 1.5 points Suppose you are an accounting analyst at a brokerage firm and are putting together financial forecasts for two publicly traded companies. Company A operates in a highly competitive industry while Company B is looking to capitalize on a market previously untapped by other players. Discuss how you would model the growth rates for each company and why. Also, discuss the data source you would use (Exhibit:production possibilities curves 1) A movement from F to B. Please help with explanation I know the answer is 15 but i dont know how to show workingWILL MARK BRAINLIEST GIVE CORRECT ANS FOR BRAINLIEST what is the most common enzyme in the world where were the earliest dance figures found in ancient greek culture? how is this significant? A lens placed 13.0 cm in front of an object creates an upright image 2.00 times the height of the object. The lens is then moved along the optical axis until it creates an inverted image 2.00 times the height of the object. How far did the lens move? Who discovered the nucleus by bombarding gold foil with positively charged particles and noting that some particles were widely deflected?. the melting points of most plastics are lower than most metals because:A. lonic bonds are weaker than metallic bondsB. Van der Waals bonds are weaker than metallic bonds lonic andC. Van der Waals bonds are weaker than metallic bondsD. None of the above