Write a program that reads a string and outputs the number of times each lowercase vowel appears in it. Your program must contain a function with one of its parameters as a string variable and return the number of times each lowercase vowel appears in it. Also write a program to test your function. (Note that if str is a variable of type string, then str.at(i) returns the character at the ith position. The position of the first character is 0. Also, str.length() returns the length of the str, that is, the number of characters in str.)

Answers

Answer 1

Answer:

Here the code is given as follows,

Explanation:

#include <iostream>

#include <string>

using namespace std;

void Vowels(string userString);

int main()

{

   string userString;

   //to get string from user

   cout << "Please enter a string: ";

   getline(cin,userString,'\n');

   Vowels(userString);

   return 0;

}

void Vowels(string userString)

{

   char currentChar;

   //variables to hold the number of instances of each vowel

   int a = 0, e = 0, i = 0, o = 0, u = 0;  

   for (int x = 0; x < userString.length(); x++)  

   {

       currentChar = userString.at(x);

       switch (currentChar)  

       {

           case 'a':

               a += 1;

               break;

           case 'e':

               e += 1;

               break;

           case 'i':

               i += 1;

               break;

           case 'o':

               o += 1;

               break;

           case 'u':

               u += 1;

               break;

           default:

               break;

       }

   }

   // to print no of times a vowels appears in the string

   cout << "Out of the " << userString.length() << " characters you entered." << endl;

   cout << "Letter a = " << a << " times" << endl;

   cout << "Letter e = " << e << " times" << endl;

   cout << "Letter i = " << i << " times" << endl;

   cout << "Letter o = " << o << " times" << endl;

   cout << "Letter u = " << u << " times" << endl;

}

Hence the code and Output.

Please enter a string

Out of the 16 characters you entered.

Letter a = 2 times

Letter e = 1 times

Letter i = 0 times

Letter o = 1 times

Letter u = 0 times.

Write A Program That Reads A String And Outputs The Number Of Times Each Lowercase Vowel Appears In It.

Related Questions

A wireless router is what kind of networking device?
Select one
a. End device
b. Intermediary device
c Peripheral Device
d. Connecting Device​

Answers

Answer:

D, routers enable us to connect to the internet.

In the early days of computer technology, which system was justified because data-processing personnel were in short supply, hardware and software were expensive, and only large organizations could afford computers

Answers

Answer:

Centralized Processing

Explanation:

Centralized processing was developed to process all of the data in a single computer, and since the first computers were stand-alone with all input and output devices in the same room, only the largest organizations could afford to use centralized processing.

discuss seven multimedia keys​

Answers

Answer:

Any seven multimedia keys are :-

□Special keys

Alphabet keys

Number keys

□Control keys

Navigation keys

Punctuation keys

Symbol keys

Declare a seven-row, two-column int array named temperatures. The program should prompt the user to enter the highest and lowest temperatures for seven days. Store the highest temp in the first column and the lowest in the second column. The program should display the average high and average low temperature. Display the average temperatures with one decimal place.

Answers

Answer:

Following are the code to the given question:

#include<iostream>//header file

#include<iomanip>//header file 

using namespace std;

int main()//main method

{

  double temperatures[7][2];//defining a double array temperatures

  double lowAvg=0, highAvg=0;//defining a double variable

  for(int i = 0;i<7;i++)//defining loop to input the value

  {

     cout<<"Enter day "<<(i+1)<<" highest temperatures: ";//print message  

     cin>>temperatures[i][0];//input highest temperatures value

     cout<<"Enter day "<<(i+1)<<" lowest temperatures: ";//print message  

     cin>>temperatures[i][1];//input lowest temperatures value

  }  

  cout << fixed << setprecision(1);//using the setprecision method  

   for(int i = 0;i<7;i++)//defining loop to calculating the Average of the  

  {

     highAvg += temperatures[i][0];//holding highest value

     lowAvg += temperatures[i][1];//holding lowAvg value

  }

  cout<<"Average high temperature = "<<highAvg/7<<endl;//calculate amd print highest temperature Average

  cout<<"Average low temperature = "<<lowAvg/7<<endl;//calculate amd print lowest temperature Average

  return 0;

}

Output:

Please find the attached file.

Explanation:

In this code, a 2D array "temperatures" and two-variable "highAvg, lowAvg" as double is declared, that uses the two for loops.In the first loop, it uses an array to input the value from the user-end.In the second loop, it uses the double variable that calculates the average value of the temperature.

1. Design pseudocode for a program that will permit a user to store exactly 75 numbers in an array. Create an array big enough to hold the numbers and store each number in the array as it's entered. Be sure to PROMPT the user for each number before it's entered. You do not need to initialize the array. HINTS: Make sure you use a named constant when you declare the array (the number inside the brackets should be a named constant that you declared before the array declaration.) Use a for loop (or while loop if you'd like) to get each number from the user. The module has an example of pseudocode very similar to this problem. You're free to use this pseudocode as you create your program. 2. Identify three advantages of arrays. For each advantage, write at least one complete sentence explaining why the advantage you listed is an advantage. More detail is better. You may use outside resources but be sure to CITE those resources using APA format.

Answers

Answer:

Question 1: The pseudocode is as follows:

int n = 70;

   int intArray[n];

   for(int i = 0; i< n; i++){

       print("Input "+(i+1)+": ")

       input intArray[i];

   }

Question 2: Advantages of array

Indexing in arrays in easyIt can be used to store multiple values of the same typeIt can be used for 2 dimensional inputs

Explanation:

Question 1

This declares and initializes the length of the array

int n = 70;

This declares the array

   int intArray[n];

This iterates through the length of the array

   for(int i = 0; i< n; i++){

This prompts the user for inputs

       print("Input "+(i+1)+": ")

This gets input for each element of the array

       input intArray[i];

   }

Question 2

Indexing: Elements of the array can easily be accessed through the index of the element.

For instance, an element at index 2 of array intArray can be accessed using: intArray[2]

Multiple Values: This is illustrated in question 1 above where we used 1 array to collect input for 70 values.

2 dimensional inputs: Literally, this means that array can be used to represent matrices (that has rows and columns).

An illustration is:

intArray[2][2] = {[0,1],[3,5]}

The above array has 2 rows, 2 columns and 4 elements in total.


What is the importance of using DNS?

Answers

Answer:

DNS provides a name to number (IP address) mapping or translation, allowing internet users to use, easy to remember names, and not numbers to access resources on a network and the Internet.

Thank you.......

Have a good day......

Answer:

DNS stand for Domain Name System

Explanation:

The benefits of DNS are that domain names: can map to a new IP address if the host's IP address changes. are easier to remember than an IP address. allow organizations to use a domain name hierarchy that is independent of any IP address assignment.

Is this one are you looking for??

HEALTH AND SAFETY IN USING ICT TOOLS

Answers

Answer:

Health and Safety using ICT Tools.

...

Some of the long-term health effects are:

Headaches and tiredness. Using the mobile phone for hours can be very stressful and may lead to mild or severe headaches.

Creates joint pain. ...

Mobile phone battery explosion. ...

Induced ringing!

Answer:

ICT tools for health and safety. Find common health issues related to computer usage and other ICT tools.

Explanation:

Use of ICT instruments

ICT tools are computer-based equipment used for processing and communicating information and technology. There are certain ICT tools;

- TV.

- System of Public Address

- Radio

- Mobile Phone

- Computer

What are the adverse consequences of long-term television exposure?

You don't have eyes for hours to stare at the TV.

Taking hours on the TV can be dangerous and dangerous for the eye.

If you starve continuously, your eye will get overworked and this will cause an irritation of the eye, such as dry eye, red, itchy, and watery eyes, fatigue, eyelid weight or forehead, as well as eye concentration.

Certain long-term effects on health are:

1. Tiredness and headaches.

2. Make pain joint.

3. Battery explosion mobile phone.

4. Ringing induced! In ears.

loa (speaker) thuộc nhóm thiết bị nào ?

Answers

Answer:

this say's "Which device group?" hope i helpped

calculateAverageSalary(filename): Returns the average salary of all employees rounded down to 2 decimal points highestHireMonth(filename): Returns the month (integer) during which most hires were made over the years getMonth(date): Helper function to extract and return the month number from a date given as a string input of format MM/DD/YY. Return type should be an int.

Answers

Answer:

An extract from the answer is as follows:

for i in salary:

 total_salary+=float(i)

 count+=1  

return round(total_salary/count,2)

def getMonth(date):

ddate = []

for i in date:

 ddate.append(i.split('/')[0])

mode = int(max(set(ddate), key=ddate.count))

return mode  

def highestHireMonth(filename):

month = []

See explanation for further details

Explanation:

Given

Attachment 1 completes the question

The complete answer could not be submitted. So, I've added it as an attachment.

See attachment 2 for program source file which includes the main method.

Comments are used to explain difficult lines

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam.
What should he do?
O Configure a safe recipient.
O Configure a blocked sender.
O Configure a safe sender
O Do nothing.

Answers

Answer:

Configure a safe sender

Explanation:

The Safe Sender List in Outlook, is a list of domain names and email addresses that are not managed in the manner spam and junk messages are filtered out and placed in the spam or junk folder. The emails of contacts added to the Safe Senders list are always received in the inbox

Therefore, to ensure that messages from his colleague are never treated as spam, Walt should;

Configure a safe sender.

You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID solution that offers redundancy over performance. Which would you use?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 6
e. RAID 10

Answers

Answer:

d. RAID 6

Explanation:

RAID is a data storage technology that combines multiple physical disk drive components into a single logical unit. The functions of RAID is to provide performance and redundancy.

RAID 0 provides data stripping but it does not offer data stripping.

RAID 1 increases performance to about 2x but it limits the disk capacity to about 50%

RAID 5 provides redundancy and increased perfomance but it is limited to small disk drive.

RAID 6 also provides redundancy but it slows performance

RAID 10 increases performance and data protection.

RAID 6 is the best drive that offers redundancy over performance.

The small flash memory used in
protable device like Laptop

Answers

Answer: flash drive

Explanation:

Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.

Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.

go sub to VolleyBall_chan on y.o.u.t.u.b.e

Answers

okkkkkkkkkkkkkkkkkkk God bless you!

Answer go to y o u t u b e type in volleyball_chan hit the sub button

Explanation:

space bar in computer​

Answers

Answer: Its the one in the middle the really long thingy it looks like a rectangle

Explanation:

ITS IN THE MIDDLE

why absolute reference is used in spreadsheet

Answers

Answer:

Absolute reference is used especially to keep the value or content of a column or row constant.

Explanation:

Cell referencing is one common and important concept in spreadsheets. A cell reference or cell address is a value, mostly alphanumeric, used to identify a specific cell or cell range in a worksheet.

In spreadsheets such as that of Microsoft - excel - there are basically two types of referencing.

i. relative referencing

ii. absolute referencing

iii. mixed referencing

Relative reference is the default cell reference. When a relative reference is copied and pasted across multiple cells, it changes depending on its relative position. This type of reference is especially useful when there is a need to apply same formula across multiple rows or columns.

Absolute reference, on the other hand, will not change even though it is copied across multiple cells. It is used especially to keep the value or content of a column or row constant.

Mixed reference is a hybrid of the relative and absolute references.

Smartphones are more likely to be used than laptop computers for everyday ICT use.
Describe three advantages of using a smartphone rather than a laptop computer.

Answers

Answer:

it's small amd you can carry it everywhere

easy to use

long lasting battery

Explanation:

hope the answers are right:)

write short notes about monitor printer and speaker​

Answers

Answer:

A computer monitor is an electronic device that shows pictures for computers. Monitors often look similar to televisions. The main difference between a monitor and a television is that a monitor does not have a television tuner to change channels. Monitors often have higher display resolution than televisions.

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.

Speakers receive audio input from the computer's sound card and produce audio output in the form of sound waves. Most computer speakers are active speakers, meaning they have an internal amplifier which allows you to increase the volume, or amplitude, of the sound.

Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
least important to her in designing the company's network?
the tasks performed by each computer on the network
the number of hours each employee works
O the number of computers that will be on the network
the way in which business documents are shared in the organization
TURN IT IN
NEXT QUESTION
ASK FOR HELP

Answers

The way the documents are shared

Brody is concerned that he is going to exceed the quota set for his mailbox. Where should he go to access the Mailbe
Cleanup tools?
O Backstage view
Inbox
O Deleted Items Folder
Outlook Web App
ANSWER QUICK IM TIMED WILL GIVE OUT PTS

Answers

Answer:

Outlook Web App

Explanation:

For Brody to accomplish this he will need to go to the Outlook Web App. Here, he will need to navigate to the top of the application where the toolbar is located. Then he will need to click on File, then Tools, and finally Mailbox Cleanup. This will give him access to all of the cleanup tools that the Outlook Mailbox has for managing all of his electronic mail as well as adjusting the quota set for his mailbox.

Answer:

A. Backstage view indox

Explanation:

Create a method called letterGrade that will pass the student's average grade as a parameter and return a letter grade (char). Once passed, use an if..else if structure to determine whether the student has an A, B, C, D, or F. Return that letter grade. Use the standard grade scale: 90-100 (A), 80-89 (B), 70-79 (C), 60-69 (D), 0-59 (F).

Answers

Answer:

The method in Java is as follows:

public static char letterGrade(int average){

    char grade =' ';

    if(average>= 90 && average <=100){ grade ='A'; }

    else if(average>= 80 && average <=89){ grade ='B'; }

    else if(average>= 70 && average <=79){ grade ='C'; }

    else if(average>= 60 && average <=69){ grade ='D'; }

    else if(average>= 0 && average <=59){ grade ='F'; }

    return grade;

}

Explanation:

This defines the method

public static char letterGrade(int average){

This initializes the grade to a blank

    char grade =' ';

If average is between 90 and 100 (inclusive), grade is A

    if(average>= 90 && average <=100){ grade ='A'; }

If average is between 80 and 89 (inclusive), grade is B

    else if(average>= 80 && average <=89){ grade ='B'; }

If average is between 70 and 79 (inclusive), grade is C

    else if(average>= 70 && average <=79){ grade ='C'; }

If average is between 60 and 69 (inclusive), grade is D

    else if(average>= 60 && average <=69){ grade ='D'; }

If average is between 0 and 59 (inclusive), grade is F

    else if(average>= 0 && average <=59){ grade ='F'; }

This returns the grade

    return grade;

}

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

Answers

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should determine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .

Answers

Answer:

The method in Python is as follows:

def checkStr(strng):

   if strng[0].isupper() and strng[-1] == "?":

       return True

   else:

       return False

Explanation:

This defines the method

def checkStr(strng):

This checks if the first character i upper and if the last is "??

   if strng[0].isupper() and strng[-1] == "?":

If the condition is true, the function returns true

       return True

Else, it returns false

   else:

       return False

Design a class named largeIntegers such that an object of this class can store an integer of any number of digits. Add operations to add, subtract, multiply, and compare integers stored in two objects. Also add constructors to properly initialize objects and functions to set, retrieve, and print the values of objects. Write a program to test your class. g

Answers

Answer:

Here the code is given as follows,

Explanation:

Code:

import java.util.Scanner;

//created class named largeintegers

class largeintegers{

   //class can hold a long number

   long number;

   //constructor to set number

  largeintegers(long number){

      this.number=number;

  }

  //getNumber method to get number

  long getNumber(){

      return number;

  }

  //below are some basic operations

  long addition(long num1,long num2){

       return num1+num2;

   }

   long subtract(long num1,long num2){

       return num1-num2;

   }

   long multiply(long num1,long num2){

       return num1*num2;

   }

   boolean compare(long num1,long num2)

   {

       return num1>num2;

   }

  public static void main(String[] args) {

      //declared to long numbers

      long number1,number2;

      //scanner class to take user input

      Scanner sc= new Scanner(System.in);

      //taking input numbers

      System.out.println("Enter a Number ");

      number1=sc.nextLong();

      System.out.println("Enter 2nd Number :");

      number2=sc.nextLong();

      //created two objects

      largeintegers object=new largeintegers(number1);

      largeintegers object2=new largeintegers(number2);

      //displaying two numbers

      System.out.println("Entered Numbers ");

      System.out.println(object.getNumber());

      System.out.println(object2.getNumber());

      //calling basic methods using created objects

      System.out.println("Some Operations on Given two Numbers ");

      System.out.println("Addition:"+object.addition(object.getNumber(), object2.getNumber()));

      System.out.println("Subtraction:"+object.subtract(object.getNumber(), object2.getNumber()));

      System.out.println("Multiplication:"+object.multiply(object.getNumber(), object2.getNumber()));

      System.out.println("Comparison:");

      if(object.compare(object.getNumber(), object2.getNumber())==true)

      {

          System.out.println("First Number is Greater than Second Number ");

      }

      else

      {

          System.out.println("Second Number is Greater than First Number ");

      }

      sc.close();

  }

}

Output:-

Depending on your web browser, you may be able to locate a folder or a file on your machine that contains cookies. Look through the folder or open the file. List references to three websites you have visited.

Answers

Answer:

yourmom.com    yourhaouse.com   and     mcdonalds.org

Explanation:

For which of the following values of A and B will the expression A || B be true?

A = False, B = False

Both A and B must be true

The expression is impossible to be true no matter the values of A and B.

A = False, B = True

Answers

Answer:

A = False, B = True

Explanation:

|| is equal OR. To the expression be true, you need one of them to be true or both.

A = TRUE, B = FALSE

Returns true

A = FALSE, B = FALSE

Returns true

A = TRUE, B = TRUE

Returns true

Assume a varible is declared in a block of code within a pair of curly braces. The scope of the variable ______ Group of answer choices starts from its declaration point and extends to the end of the block. starts from its declaration point and extends to the end of the entire program. covers the entire block, including the code before the declaration point. covers the entire program, including the code in the other blocks.

Answers

Answer:

The answer is the second choice that is "starts from its declaration point and extends to the end of the entire program".

Explanation:

In a functional component were specified variables of local scope, and those outside are defined of global scope. It shows that the local variables can be accessible within the specified function, whereas global variables can be accessed via all functions all through the code structure. The variable size is the code portion where the variable can be accessed.

C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in an expression.#include using namespace std;double FindMax(double num1, double num2) { double maxVal; // Note: if-else statements need not be understood to complete this activity if (num1 > num2) { // if num1 is greater than num2, maxVal = num1; // then num1 is the maxVal. } else { // Otherwise, maxVal = num2; // num2 is the maxVal. } return maxVal;}int main() { double numA; double numB; double numY; double numZ; double maxSum; cin >> numA; cin >> numB; cin >> numY; cin >> numZ; /* Your solution goes here */ cout << "maxSum is: " << maxSum << endl; return 0;}

Answers

Answer:

Replace the comment with:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

Explanation:

Required

The statement to add up the two maximum from the functions

To do this, we have to call FindMax for both arguments i.e.

FindMax(numA,numB) and FindMax(numY,numZ) respectively

Next, use the + sign to add up the returned value.

So, the complete statement is:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

See attachment for complete program

21
22
23
24
25
26
27
28
29
30
TIME REMA
01:08:
Which view is most often used to reorder slides in a presentation that has already been created?
HERE
ОО
Outline view
Slide Sorter view
O Reading view
O Normal view

Answers

Answer:

slide sorter view

Explanation:

Explanation: while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

Slide sorter view. while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

What is Slide sorter view?

You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view.

The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here.

  All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in the PowerPoint Slide Sorter view

Therefore, Slide sorter view. while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.

To learn more slide sorter view, refer to the link:

https://brainly.com/question/7696377

#SPJ7

you can use a minus sign to make a negative numberlike -2. What happens to each of the following 2++2
2 - -2
2+ - 2
2- +2

Answers

2 - -2 = 4
2 + -2 = 0
2 - +2 = 0
:)

If we use a minus sign to make a negative number like -2. Then the following terms will be:

2 - -2 = 42 + -2 = 02 - +2 = 0What is calculation?

A calculation is a methodical, well-thought-out process. Calculating the solution to a math problem is the first type of calculation, for which you might use a calculator. The calculation also includes applying logic to a non-numerical issue.

Plus, minus, multiply, and divide are the basic signs used in math to calculate problems. These signs also change when come n contact with each other, like plus and minus are equal to minus.

Like here, 2 - -2. Minus and minus is plus, so two plus two is four.

2 + -2 = 0, here plus minus = minus, so two minus two is 0.

Therefore, the calculation for the given is

2 - -2 = 42 + -2 = 02 - +2 = 0

To learn more about calculation, refer to the link:

https://brainly.com/question/14106833

#SPJ2

Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime​

Answers

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

Any action that causes harm to your computer is called a security risk. That is option 3.

What is security risk in computer?

A computer is an electronic device that can be used to prepare, process and store data.

Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.

Some of the security risks that predisposes a computer to damage include the following:

unpatched software,

misconfigured software or hardware, and

bad habits such as keeping fluid close to the computer.

Therefore, any action that causes harm to your computer is called a security risk.

Learn more about security risks here:

https://brainly.com/question/25720881

Other Questions
Find the vertices and foci of the hyperbola with equation (x + 2)^2/144 - (y-4)^2/81 =1 With the temperature held constant at 300 K, use the Select mass slider to place weights on the lid. Record the pressure and volume of the gas for each added mass. Added mass on the lid Total mass Pressure Volume (Lid + added mass)0 kg 10 kg 10 kg 20 kg 20 kg 30 kg 30 kg 40 kg sarah climbs at 23-meter tower to ride a straight water slide. The slide is 43 meters. After landing the splash pool, how far does she walk to get back to the base of the tower (nearest tenth) Which line from the passage most clearly identifies thereason Wilson has changed his position on the war?O when I addressed the Congress on the 26th ofFebruary last"O "I thought that it would suffice to assert our neutralrights with arms""armed neutrality, it now appears, is impracticable"O "German submarines have been used againstmerchant shipping" NEED HELP ASAP!!the surface area of a sphere is S(x)=4pix^2, where x is the length of the radius of the sphere. restrict the domain to create a one-to-one function. find and describe the inverse function. {ANSWERS ARE PICTURED} Which of the following is NOT a reason for theorigins of government?A. Defend private propertyB. Collect tax revenuesC. Protect people from conflictD. Provide law and order Radioactive radon-222, found in many homes, is a potential health hazard. The half-life of radon-222 is 3.82 days. If you begin with 35.3 mg of this isotope, what mass remains after 10.1 days have passed Read this excerpt from "Mending Wall," by Robert Frost:Something there is that doesn't love a wall,That sends the frozen-ground-swell under it,And spills the upper boulders in the sun,And makes gaps even two can pass abreast.The work of hunters is another thing:I have come after them and made repairWhere they have left not one stone on a stone,But they would have the rabbit out of hiding,To please the yelping dogs.What is the speaker of this poem doing? visiting beach experience 23, 24, 25, 20, 25, 29, 24, 25, 30Mean?Median?Mode?Range?Please help? What do you mean by the word "Solitary"? Explain it in your own words.NO SPAM The _____ made it illegal to form trusts that interfered with free trade and prohibited monopolies that hindered competition in the marketplace. Cardiorespiratory endurance decreases your chances for living a longerand healthier life. *O TrueO False Sir Edwin Sandys tried to solve the labor shortage in Jamestown through Wll mark Brainlest helllppoooooo How much pressure is created by a circular piston that is 0.24 meter in diameterwith a Force of 200.0 N? N/m2 ... (round answer to nearest ones place -no decimal) URGENT PLEASE HELP ANSWER ASAP FOR BRAINLIEST !!!!!!!!!! Succulents and cacti often have short, thick leaves with a waxy coat. What function does this structure serve? A) retains water B) the plant uses less energy to grow these short leaves and conserves energy C) prevents water from evaporating off leavesD)all of the above which laws protect citizens from human human rights violence In the early days of life on Earth, plants were exposed to extremely high doses of ultraviolet radiation, Constant UV exposureresulted in some land plants developing narrow leaves with thick, waxy cuticles. Over many, many generations, these narrowleaves evolved into needles.Relate the development of plant needles to the occurrence of mutations,A)Plant needles adaptations for survival that some plants developed due tohigh temperatures on EarthB)Plant needles are the result of leaf cell mutations that made some leavesthick and waxy, while other leaves did not change,Plant needles are the result of neutral mutations to leaf tissue that wouldneither help nor harm the plants living in such a harsh environment.D)Plant needles were a beneficial mutation that increased survival of certainplants that reproduced and passed the mutated gene to offspring,