The Second one I am lost . My teacher didn't clearly explain it to us !

The Second One I Am Lost . My Teacher Didn't Clearly Explain It To Us !

Answers

Answer 1

Answer: The correct answer to the question is option C

FUNCTION CANNOT MAKE CALLS TO OTHER FUNCTIONS WITHIN THE SAME PROGRAM.

Explanation: Function in programming is a block of organized codes.these organized codes are reusable.They are used to perform a single task or related actions.

Methods, functions,procedures, subroutines are different ways function are named based on different programming languages.

Meaning function names has a way of helping people better understand programs.

They are reusable and are programming abstraction that helps to reduce the complexity of writing and as well as maintaining programs well.

Functions also has a way of bringing out logical chucks out of problems by breaking the problem down, moreover, function can actually be called many times from parts of the program that differs.


Related Questions

What factors are most important when planning for disaster and recovery? check all that apply.

Answers

The most vital factors that is often seen as the most important when planning for disaster and recovery are:

Option 4: regular backups.Option 3: physically distant backup location.

What are the measures used in a disaster recovery plan preventative?

The above situation is one that demands regular backups.

Note that is often good to be taking consistent backups of a given systems and critical data can lower the total downtime that is known to occur as a result of a disaster.

Note that disaster and recovery is very important as one can be able to get back file if they are lost. Therefore, The most vital factors that is often seen as the most important when planning for disaster and recovery are:

Option 4: regular backups.Option 3: physically distant backup location.

Learn more about disaster and recovery from

https://brainly.com/question/14086328

#SPJ1

See full question below

What factors are most important when planning for disaster and recovery? CHECK ALL THAT APPLY.

1 Procure sturdy devices

2 Deleting old backups

3 Physically distant backup location

4 Regular backups

At work, Ashley is given the task of connecting a printer to a user's computer. Which two ports would most likely be used to connect the printer
to the computer?
Accelerated Graphics Port
HDMI
DisplayPort
USB-C port
Thunderbolt

Answers

Answer:

USB-C port

Thunderbolt

Explanation:

The other ones are all display related.

Answer: the person above me is correct.......

:)

Explanation:

*
Which of the following variable names are invalid?
123LookAtMe
Look_at_me
LookAtMe123
All of these are valid

Answers

Answer:

I think they're all valid but the validility depends on the website your using the usernames on.

Explanation:

The carbon-14 isotope is important because it allows scientists to determine the ___________ of an organic sample.

Answers

Answer:

radiocarbon dating and radiolabeling, to detect specific bacteria

Explanation:

from google: Carbon-14, which is radioactive, is the isotope used in radiocarbon dating and radiolabeling. … medically important radioactive isotope is carbon-14, which is used in a breath test to detect the ulcer-causing bacteria Heliobacter pylori.

Using the sequences x[n]={−5,8,2} and h[n]={3,−1,0,5}, aUse the circular convolution command 'cconv' in MATLAB to compute the 4-point circular convolution. Turn in a copy of your code and the output which you can copy from the Workspace (or from the command window if you leave off the semicolon on the line where you calculate the convolution). b. Add another line to your code to find the output of the circular convolution command in the previous part if you do not specify the number of points for the circular convolution . This is the same as the linear convolution. Turn in a copy of the output.

Answers

The code in MATLAB to compute the 4-point circular convolution is in the explanation part below.

Here's an example MATLAB code that uses the above sequences to execute circular and linear convolution:

% Circular convolution

x = [-5, 8, 2];

h = [3, -1, 0, 5];

conv_circular = cconv(x, h, 4);

disp('Circular Convolution:');

disp(conv_circular);

% Linear convolution

conv_linear = conv(x, h);

disp('Linear Convolution:');

disp(conv_linear);

Thus, in this code, we define the input sequences x and h.

For more details regarding MATLAB, visit:

https://brainly.com/question/30763780

#SPJ4

Which of the following guarantees that a graph has a Hamiltonian circuit? a The graph is analyzed by the "brute force" method. b The graph has an Euler circuit. c The graph is connected. d The graph is complete.

Answers

The option that guarantees that a graph has a Hamiltonian circuit is "The graph is connected." (Option C)

Why is this so?

A graph is said to have a Hamiltonian circuit if there exists a closed path that visits each vertex exactly   once.

While the brute force methodand Euler circuits are not sufficient guarantees for a Hamiltonian circuit, the condition that ensures a graph has a Hamiltonian circuit is that it is connected.

In a connected graphthere is a path between any two vertices, allowing for the possibility of constructing a Hamiltonian circuit.

Learn more about Hamiltonian circuit at:

https://brainly.com/question/28043791

#SPJ1

What is the horizon on a perspective drawing?

Answers

One form of eye-level line is the horizon. Eye-level lines are the lines that naturally direct the viewer's eye into a photograph.

What is photograph?

Photograph is defined as a picture made when light strikes a photosensitive surface, either a piece of film for photography or an electronic image sensor like a CCD or CMOS chip. Photography, which means "painting with light" in its literal sense.

A natural form of line to direct the viewer's eye level is a horizontal line. Because it enables you to manage the height of the viewer's eye as they stare at the image, a horizon line is crucial in art. The horizon line is always visible to you at eye level.

Thus, one form of eye-level line is the horizon. Eye-level lines are the lines that naturally direct the viewer's eye into a photograph.

To learn more about photograph, refer to the link below:

https://brainly.com/question/25379778

#SPJ1

Hi. I want to know how to download themes or templates for PowerPoint for religious purposes (if I need to make a presentation on religions)? Any suggested websites??

Answers

Hey, you can actually do it on the PowerPoint app. If you open the app, then go on a tab ‘new’ there should be a variety of templates available for you. There’s also a search tab if you want to specify the type of templates you want. Hope this helps!


How do you print the last three largest numbers in the Fibonacci
sequence using the default in Python when def fib(n=100) with
output being [354...], [2118..], and [1353...]

Answers

To print the last three largest numbers in the Fibonacci sequence up to a given limit using the default value of `n=100` in Python, you can define a function `fib()` and then retrieve the desired numbers.

Here's an example implementation in Python Program:

def fib(n=100):

   sequence = [0, 1]  # Initial Fibonacci sequence

   while True:

       next_num = sequence[-1] + sequence[-2]  # Compute the next Fibonacci number

       if next_num > n:

           break  # Stop if the next number exceeds the limit

       sequence.append(next_num)  # Add the next number to the sequence

   return sequence[-3:]  # Return the last three numbers

# Test the function

result = fib()

print(result)

In this example, the `fib()` function generates the Fibonacci sequence up to the provided limit (`n`). It starts with the initial sequence `[0, 1]` and iteratively adds the next Fibonacci numbers until it exceeds the limit. Finally, it returns the last three numbers in the sequence using slicing `[-3:]`.

By default, when calling `fib()`, it uses `n=100` as the limit.

To know more about Fibonacci numbers

brainly.com/question/29771173

#SPJ11

is concerned with improving productivity and safety by designing workplaces, equipment, instruments, computers, workstations, and so on that take into account the physical capabilities of people. question 26 options: ergonomics employee motivation job design job enrichment

Answers

The goal of ergonomics is to increase productivity and safety by designing work environments, tools, computers, workstations, and other items with people's physical capabilities in mind.

How might you describe ergonomics?The study of individuals in their workplace environments is generally referred to as ergonomics. More specifically, an ergonomist (pronounced like economist) creates or changes the work to fit the worker, not the other way around. The intention is to reduce labor-related discomfort and injury risk.Ergonomics is the science of adapting the job to the person. Workers can stay healthy and businesses can cut back on or do away with the high costs related to MSDs by designing workstations and tools to reduce work-related musculoskeletal disorders (MSDs).Working in awkward postures or being in the same posture for long periods of time.

To learn more about Ergonomics, refer to:

https://brainly.com/question/8495020

Which of the following can be assumed as the simplest form a physical network topology? (1 point)
O the tree topology
O the mesh topology
O the star topology
the bus topology

Answers

This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.

What is Topology?

The full bandwidth is set aside between the two nodes because there are only two in this network.

Topology is the study of the characteristics of spaces that are unaffected by continuous deformation. Because the objects may be stretched and contracted like rubber sheets yet cannot be broken, it is frequently referred to as "rubber-sheet geometry."

Analysis and general topology are closely connected fields that often take into account local features of spaces. The definition of topological spaces, in which limits of sequences can be taken into consideration, generalizes the idea of continuity.

Therefore, This kind of network structure is the most basic. Here, a common medium is used to connect two nodes directly to one another.

To learn more about Topology, refer to the link:

https://brainly.com/question/10536701

#SPJ1

briefly explain about five kinds of network topology ​

Answers

Answer:

The mapping of the LAN (local area network) is design called as Topology.

Explanation:

The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.

(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.

What is an html skeleton? If you know what it is can you write it for me?

Answers

Answer:

HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.

Explanation:

please help i will give brainliest if right

Which elements are part of the Outlook interface? Check all that apply.

Ribbon
Quick Access Toolbar
Comments Box
Reading Pane
Formula Bar
Command Groups

Answers

Answer:

Ribbon, Quick Access Toolbar, Reading Pane, Command Groups

Explanation:

I did it on edge 2021

The elements which are part of the Outlook interface include ribbon, quick access toolbar, reading pane, and command groups. Therefore, the correct options are A, B, D, and F.

What is Outlook interface?

Outlook Main Interface is the folder pane. Outlook interface usually displays on the left hand side of the screen, and it helps in the Outlook users to switch to different folders and different views in the operating system such as mails, calendar, people, task, notes and all folders.

Basic features of Outlook interface include email service, email search, flagging, and color coding, along with the preview pane options. The calendar function enables scheduling, viewing, and communicating about the different appointments and meetings.

The main elements of the Outlook window include the ribbon, Quick Access Toolbar, Reading Pane, Command Groups.

Therefore, the correct options are A, B, D, and F.

Learn more about Outlook interface here:

https://brainly.com/question/19018627

#SPJ2

To reduce costs and the environmental impact of commuting, your company decides to close a number of offices and to provide support for staff to work from home. However, the senior management who introduce the policy are unaware that software is developed using Scrum. Explain how you could use technology to support Scrum in a distributed environment to make this possible. What problems are you likely to encounter using this approach

Answers

Answer:

The description including its query is provided throughout the section of the elaboration elsewhere here.

Explanation:

Coordination between teams is the main challenge that this new strategy can make. Agile creation is focused on the teamwork of cross-functional teams, where every other mission is identified and distinct teams are formed. All the departments collaborate and afterward work in stages until the completion of this research project.Unless the organization shuts several departments, contact with various teams and peers will be disrupted and contact differences with workers as well as the team would be established. The best approach will be to provide regular communication calls with multiple project managers such that each project stage is synchronized. In turn, this same project coordinator should always have numerous calls with his group members to even get construction progress.

The physical parts of a computer are called application software.

Answers

Ok so what was the question

Answer:

false

Explanation:

Which of the following updates should be performed on a regular basis to ensure the OS has the latest security patches?
A. Anti-malware updates
B. Driver updates
C. Windows updates
D. Firmware updates

Answers

Of the following updates should be performed on a regular basis to ensure the OS has the latest security patches. The correct answer is C. Windows updates.

Regularly performing Windows updates is crucial to ensure that the operating system (OS) has the latest security patches. Windows updates are provided by Microsoft and include important security fixes, bug fixes, and feature enhancements for the Windows OS. Security patches are specifically designed to address vulnerabilities and weaknesses that could potentially be exploited by malicious actors. These vulnerabilities could allow unauthorized access, data breaches, or the execution of malicious code on the system. By keeping the OS up to date with the latest security patches, users can minimize the risk of security breaches and protect their systems from various threats. While anti-malware updates are also important for protecting against specific types of malicious software, such as viruses and malware, they primarily focus on detecting and removing known malicious code. Driver updates and firmware updates, on the other hand, are specific to hardware components and peripherals and may improve performance or fix compatibility issues but are not directly related to the security of the OS. In summary, performing regular Windows updates ensures that the OS receives the latest security patches, reducing the risk of vulnerabilities and enhancing the overall security of the system.

Learn more about Windows updates here:

https://brainly.com/question/32659498

#SPJ11

PLS HURRY!!!

which of the following is NOT a benefit of using modules in programming?

A. modules can help break the problem down into smaller pieces

B. modules are reusable

C. modules do not contain syntaxes errors

D. modules save the programmer time instead of rewriting code.

Answers

I believe the answer is c. Modules do contain syntaxes errors
The correct answer is:

C. modules do not contain syntax errors

What is the key sequence to copy the first 4 lines and paste it at the end of the file?

Answers

Press Ctrl+C after selecting the text you want to copy. Press Ctrl+V while holding down the cursor to paste the copied text.

What comes first in the copy and paste process for a slide?

Select the slide you wish to copy from the thumbnail pane, then hit Ctrl+C on your keyboard. Move to the location in the thumbnail pane where you wish to paste the slide, then hit Ctrl+P on your keyboard.

What comes first in the copying process of a segment?

The secret to copying a line segment is to open your compass to that segment's length, then mark off another segment of that length using that amount of opening.

To know more about copy visit:-

https://brainly.com/question/24297734

#SPJ4

Which of the following is based on the visibility and location of an object’s features?


arch

lines

prisms

curves

Answers

Answer:

The answer is Lines.

Explanation:

A visible line, or object line is a thick continuous line, used to outline the visible edges or contours of an object. A hidden line, also known as a hidden object line is a medium weight line, made of short dashes about 1/8” long with 1/16”gaps, to show edges, surfaces and corners which cannot be seen.

what two methods are available for windows to use to partition a drive? a. exfat b. uefi c. gpt d. mbr

Answers

The two methods available for partitioning a drive in Windows are:

c. GPT (GUID Partition Table)

d. MBR (Master Boot Record)

GPT (GUID Partition Table) is a newer partitioning scheme that is recommended for modern systems. It supports larger partition sizes, allows for more than four primary partitions, and provides better data redundancy and integrity.

MBR (Master Boot Record) is an older partitioning scheme that is still widely used, especially on legacy systems. It has limitations such as support for a maximum of four primary partitions and a maximum partition size of 2TB.

a. exFAT and b. UEFI mentioned in the options are not methods for partitioning a drive. exFAT is a file system, and UEFI (Unified Extensible Firmware Interface) is a system firmware interface. They are not directly related to the partitioning process.

Learn more about Windows here

https://brainly.com/question/33363536

#SPJ11

2. What is the difference
between a folder and sub
folder

Answers

Answer:

In a computer file system, a subdirectory is a directory that is contained another directory, called a parent directory. A parent directory may have multiple subdirectories. In operating systems with a GUI such as Microsoft Windows, a directory is called a folder, and a subdirectory is called a subfolder.

(50 Points) What is wrong with this code? I have an error. (The language is Python btw.)

(50 Points) What is wrong with this code? I have an error. (The language is Python btw.)
(50 Points) What is wrong with this code? I have an error. (The language is Python btw.)

Answers

The dose = 1.25 statement after elif weight < 5.2: is one that needs to be indented so that it can or it willbe in the same block as the if statement

What is the code about?

An error in indentation is present in the code in its original form. To be placed within the else block, the line with dosage amount of 10 needs to be indented by one level. The correct indentation of code is an essential factor in ensuring the proper functioning of code written in Python.

The adjusted code utilizes indentation to signify that each segment of code within an if or elif clause is related to the condition. The dose = 10 assignment is properly indented alongside the final else block.

Learn more about code   from

https://brainly.com/question/29330362

#SPJ1

See code below



else:

dose 10

return dose

print (calculate_dose (8)) # output: 2.5

print(calculate_dose (18)) # output: 7.5

print (calculate_dose (25)) # output: 10

File "<ipython-input-8-35421712ee6a>", line 5 dose = 1.25

A

IndentationError: expected an indented block

SEARCH STACK OVERFLOW



def calculate_dose (weight):

if weight < 5.2:

dose = 1.25

elif weight>= 5.2 and weight < 7.9:

dose = 2.5

elif weight >= 7.9 and weight < 10.4: dose = 3.75

elif weight>= 10.4 and weight < 15.9: dose = 5

elif weight >= 15.9 and weight < 21.2:

dose = 7.5

else:

dose = 10

return dose

print (calculate_dose (8)) # output: 2.5

个♡女

(50 Points) What is wrong with this code? I have an error. (The language is Python btw.)

you are reviewing new ram to purchase for a gaming computer and find three different ram modules that are the same except for their cl rating. the memory with which rating will work best? group of answer choices cl15 cl18 cl20 they will all perform at the same speed.

Answers

shows many RAM modules that are identical besides CAS Latency as having a 15 ns CL.

What kind of memory feature will be necessary if data accuracy is crucial for a new computer?

Computer data storage that is capable of spotting and fixing the most prevalent forms of internal data damage is known as error-correcting code memory (ECC memory).

Which RAM includes an additional layer of security?

A memory chip that serves as both error detection and correction for the other eight RAM chips distinguishes ECC memory, also known as ECC RAM. Though slightly more expensive than non-ECC RAM, the additional security it offers is crucial as applications become more reliant on huge volumes of data.

To know more about RAM modules visit :-

https://brainly.com/question/28776521

#SPJ4

There are three groups of people, people who like Apples, Bananas, and Cherries. 19 people like Apples. 23 people like Bananas. 13 people like Cherries. 7 people like Apples AND Bananas. 7 people like Bananas AND Cherries. 6 people like Apples AND Cherries. 4 people like all of them. Using this information, answer the following questions.
1) How many people like Apples but don't like Bananas?
2) How many people like Apples or Bananas (not exclusively) but DO NOT like Cherries?
3) How many people only like one fruit?
4) How many people like AT LEAST two fruits?

Answers

Answer:

answer of QN 1 :10

QN 2:26

QN 2:27

QN 4:62

Explanation:

it goes long to explain

Draw one example of first-order reinforcing/balancing feedback system. Using Vensim, build the model. - Don't forget to set the time frame, units, and initial value of the stock

Answers

A feedback system is a concept that is used to describe a situation whereby a system's output is fed back to its input. Feedback is vital in maintaining the balance in many systems, and it comes in two types, namely reinforcing and balancing feedback.

A reinforcing feedback system is a system in which a change in a variable in one direction leads to a further change in the same direction, while a balancing feedback system is one in which a change in one direction leads to an opposing change.

A first-order reinforcing/balancing feedback system is a system in which the output is fed back to the input once, which means that the system only has one iteration. The system may be used to represent a wide range of physical and social systems, such as a population model, predator-prey model, and even climate change.

For instance, let us consider a first-order reinforcing feedback system for population growth. In this system, the output (population) feeds back to the input (birth rate). As the population increases, the birth rate increases, leading to further population growth. The system can be represented using Vensim modeling software. Here is the model:

Variables:
Population (P) – measured in individuals
Birth Rate (B) – measured in individuals per year

Equations:
Population Growth = Birth Rate * Population
Birth Rate Change = Birth Rate + Population Growth

Initial Values:
Population = 500
Birth Rate = 0.01

Time Frame:
10 years

Units:
Individuals

This model shows that as the population grows, the birth rate increases, leading to further population growth. However, if the population grows too fast, it can cause the birth rate to increase at a slower rate, leading to a balancing feedback system that helps regulate population growth.

Learn more about feedback system here:-

https://brainly.com/question/30676829

#SPJ11

Cars are an example of what technology?

Answers

Answer:

cars is an example of automonile technology they are used for transpot livestock, human being, other goods

Use nested for-loops to have the turtle draw a snowflake of polygons. Use the variable turnamount to turn after each shape and the variable n for the sides of the polygon

Answers

An interlocking loop is referred to as nested loop . These are frequently utilized while working in two dimensions, such as when printing stars in rows and columns.

How do two for loops that are nested work?

An inner loop encloses the body of an outer loop, creating a nested loop. In order for this to operate, the inner loop must be triggered by the outer loop's initial pass in order to begin working. The inner loop is then reactivated during the second transit of the outer loop.

The for loop may be nested, right?

For loops that are nested are placed inside of one another. With each outer loop iteration, the inner loop is repeated.

To know more about nested for-loops visit :-

https://brainly.com/question/13971698

#SPJ4

Why is quantum computing potentially a better fit for weather forecasting than classical computers?.

Answers

The reason why quantum computing is potentially a better fit for weather forecasting than classical computers is that It can perform advanced simulations more efficiently.

What is quantum computing?

Quantum computing is known to be  a kind of technologies that is known to be futurists in nature.

Quantum computers is one that is seen to have the power to quickly process a lot of high numbers of quantities of weather data and carry out analysis that are said to be too complex for classical computers.

Hence, The reason why quantum computing is potentially a better fit for weather forecasting than classical computers is that It can perform advanced simulations more efficiently.

See full question below

Why is quantum computing potentially a better fit for weather forecasting than classical computers?

It can perform advanced simulations more efficiently.

It can be easily installed at locations around the globe.

It can function efficiently when stored at high temperatures.

It can store extensive data for better pattern recognition.

Learn more about quantum computing from

https://brainly.com/question/25513082

#SPJ1

modify this worksheet so you can see four different areas of the worksheet at the same time

Answers

Modifying a worksheet to view four different areas at the same time can be a useful tool for improving productivity and reducing errors. By utilizing the split screen, multiple windows, or zooming functions, users can more efficiently navigate their worksheets and accomplish their tasks.

There are several ways to achieve this, depending on the program being used. Here are a few methods:

Split the screen: In Microsoft Excel, for example, users can split the screen into multiple sections by going to the “View” tab and selecting “Split.” This creates two panes, which can be adjusted to show different areas of the worksheet. To split the screen into four sections, the process can be repeated for each pane, resulting in four quadrants.Use multiple windows: Another option is to open multiple instances of the same worksheet or different worksheets altogether. This allows users to view different areas of the worksheet in each window, which can be resized and positioned to suit their needs. This can be done by selecting “New Window” under the “View” tab in Microsoft Excel.Zoom in/out: A third option is to zoom in or out of the worksheet to adjust the viewable area. This can be done by selecting the “Zoom” button in the “View” tab and adjusting the percentage to show more or less of the worksheet. This method may not be as effective as the other two, as it limits the amount of information visible at once.

For such more questions on worksheet

https://brainly.com/question/28737718

#SPJ11

Other Questions
which value for x makes the sentence true 1/7 + x = 1/29/142/91/55/14 Find the total surface area of a cylinder with a diameter of 11 meters and a height of 11 meters. Round to the nearest tenths place. diatoms are found in both fresh and marine waters. they have an external shell of silica where half is inherited from its parent cell and it produces a new, smaller half that fits within it. how have these organisms dealt with the decrease in size with each generation? What can you determine about mechanical energy from this graph? The following sentence is most likely which part of an expository essay? was an American writer, poet, editor, and literary critic. Poe is best known for his poetry and short stories Assuming the population is in hardy-weinberg equilibrium, calculate the frequency of the wild-type (nonmutant) allele for the enzyme glucocerebrosidase. PLEASE HELP FAST!!!!!public class Main { public static void main(String[] args) { String firstName = "John "; String lastName = "Doe"; String fullName = firstName + lastName; System.out.println(fullName); }}From this example copy and paste code that when run would say the name Ryan John. in java A rectangular slit is 200 mm wide and has a height of 1000 mm. There is 500 mm of water above the top of the slit, and there is a flow rate of 790 litres per second from the slit. Calculate the discharge coefficient of the slit. Sudoku Company issues 26,000 shares of $8 par value common stock in exchange for land and a building. The land is valued at $235,000 and the building at $380,000. Prepare the journal entry to record issuance of the stock in exchange for the land and building. There are 210 concrete blocks available to make a retaining wall. The bottom three rows will all have the same number of blocks. The next six rows will each have two blocks fewer than the row below it. How many blocks are in each row? Roger's face is dirty and he washes up at Mrs. Jones' sink. What point is Hughes trying to make with the extended elements involvingRoger's dirty face and the warm water? Giselle paid an accountant 25$ per hour to do her taxes plus a 100$ one-time fee. Her total bill was $250. How many hours did the accountant work? what was the optimistic phrase white southerns used to describe the post-reconstruction south based on segregation, white supremacy and the development of a modern econy In the formation of sodium chloride by the combination ofsodium and chlorine: What is the wealth gap quizlet? Has a slope of 1/2 and passesthrough the point (-2, 4).Need the equation please help m-e-e people -_-! pls help i am really confused How would you draw a DNA molecule that is 10 nucleotides in size?