1. Briefly explain the various types of models used in software Engineering with benefits and limitations for each

Answers

Answer 1

Answer:

The Software Model represents the process abstractly. The different activities involved in developing software products are present in each phase of the software model. The order for each stage to be executed is also specified.

Explanation:

Waterfall model:-

Benefits

Implementing the waterfall model is very easy and convenient.

It is very useful for implementing small systems.

Limitations

If some of the changes are made at certain phases, it may create confusion.

First, the requirement analysis is performed, and sometimes not all requirements can be expressly indicated in the beginning.

Spiral model:-

Benefits

The working model of the system can be quickly designed through the construction of the prototype.

The project can be refined by the developer and the user during the development phase.

Limitations

If customer communication is not good or proper, the result is total project failure or project failure which could lead to project comission.


Related Questions

the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. find the margin of error if c = 0.98.

Answers

Answer:

[tex]E = 14.81\%[/tex]

Explanation:

Given

[tex]n = 150[/tex]

[tex]\sigma = 0.78[/tex]

[tex]c = 0.98[/tex]

Required

The margin of error (E)

This is calculated as:

[tex]E = z * \frac{\sigma}{\sqrt{n}}[/tex]

When confidence level = 0.98 i.e. 98%

The z score is: 2.326

So, we have:

[tex]E = 2.326 * \frac{0.78}{\sqrt{150}}[/tex]

[tex]E = 2.326 * \frac{0.78}{12.247}[/tex]

[tex]E = \frac{2.326 *0.78}{12.247}[/tex]

[tex]E = \frac{1.81428}{12.247}[/tex]

[tex]E = 0.1481[/tex]

Express as percentage

[tex]E = 14.81\%[/tex]

Describe computer in your own words on three pages

Answers

no entendi me explicas porfavor para ayudarte?

7. Lower than specified oil pressure is measured on a high-mileage engine. Technician A says that worn main or rod bearings could be the cause. Technician B says that a clogged
oil pump pickup screen could be the cause. Who is correct?

O A. Neither Technician A nor B

O B. Technician B

O C. Technician A

O D. Both Technicians A and B

Answers

Technician B as Technician A was a fraud

Decomposing and modularizing software refers to the process of combining a number of smaller named components having well-defined interfaces that describe component interactions into a single, larger monolithic system.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Decomposing and modularizing means that a large software is being divided into smaller named components that have a well-defined interfaces which basically describes the component interactions. The main goal is to place these different functionalities as well as the responsibilities in different components.

Decomposition and modularization forms the principle of software design.

Hence, the answer is false.

Given that s refers to a set, write a statement that attempts to remove integer 11 from the set, but will do nothing if 11 is not in the set.

Answers

Answer:

Here is the code:-

#(5) Given that s refers to a set, write a statement that attempts  

#to remove the int value 11 from the set, but will do nothing if 11 is  

#not in the set  

#check if 11 is in not in s  

if 11 is not in s:  

   pass  

else:  

   #other wise remove 11 from s  

   s.remove(11)

Explanation:

about system implementation in long

Answers

Answer:

Systems implementation & evaluation

What is systems implementation?

What are the tools for physical systems design?

What are the issues to consider before an information system is operational?

What are the key indicators of a quality system?

What are the techniques for systems evaluation?

Systems implementation is the process of:

defining how the information system should be built (i.e., physical system design),

ensuring that the information system is operational and used,

ensuring that the information system meets quality standard (i.e., quality assurance).

Systems design

Conceptual design – what the system should do

Logical design – what the system should look to the user

Physical design – how the system should be built

Physical system design using structured design approach:

à To produce a system that is easy to read, code, and maintain

1. Factoring: decomposition

2. Span of control: 9 subordinate modules

3. Reasonable size: 50-100 LOC

4. Coupling: minimize inter-module dependency

5. Cohesion: single module functionality

6. Shared use: multiple calls to lower level modules from different bosses

Structured design tools

· Organization of programs and program modules (structure chart)

· Processing logic specification in each module (pseudocode)

Structure chart – to show graphically

how the various program parts/modules of an information system are physically organized hierarchically

how the modules communicate with each other through data couple (data exchange) and flag (control/message)

how the modules are related to each other in terms of sequence, selection, and repetition

Describe what happens at every step of our network model, when a node of one network...

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

Write a Fortran Program to calculate area of a circle​

Answers

Explanation:

πr square

That's the formula for calculating area of a circle.

diagram of a central processing unit​

Answers

Hehehehehehehehehehdurnrjrir

3 Marks] Q 2. A host has the IP address 196.22.44.133/21. What are the network address, broadcast address and valid host addresses for the IP subnet which the host is a member of​

Answers

Answer:

Address:   192.22.44.133         11000000.00010110.0 0101100.10000101

Netmask:   255.255.128.0     11111111.11111111.1 0000000.00000000

Network:   192.22.0.0/17         11000000.00010110.0 0000000.00000000 (Class C)

Broadcast: 192.22.127.255        11000000.00010110.0 1111111.11111111

HostMin:   192.22.0.1            11000000.00010110.0 0000000.00000001

HostMax:   192.22.127.254        11000000.00010110.0 1111111.11111110

Explanation:

Given the following snippet of code, answer the following two questions based on the code: typedef enum {Sun, Mon, Tue, Wed, Thu, Fri, Sat} days; days x = Mon, y = Sat; while (x != y) { x++; } y++; printf("x = %d, y = %d", x, y); 1. What value will be printed for variable x? [ Select ] . 2. What value will be printed for variable y? [ Select ]

Answers

Answer:

1) The value of x will be 6.

2) The value of y will be 7.

Explanation:

1) The value of x will be 6.  

The enum values are labeled by default from 1. This means that Sun = 1, Mon = 2, Tue = 3 and so on.  

So, x = Mon = 2 and y = Sat = 6  

x increases up to y = 6 in the while loop.  

and then y also increments by 1.  

2)So the value of y = 7.  

You will need actual printf("Sun") or printf("Mon") for printing the actual text for the enum.

¿Cuál es la diferencia de un ciudadano digital entre la vida real y la vida en línea?

Answers

No podes ir a lugar sin tarjeta verde en los Estados Unidos Digitalmente podes comprar lo que puedas

PLS PAK I ANSWER NITO KAILANGAN LANGPO​

Answers

1. E-gro.up

2. Faceb.ook

3. Gm.ail

4. Go to www.gm.ail.com

5. Gm.ail

6. Go to www.faceb.ook.com

These are the answers.

The ________ is the most important component in a computer because without it, the computer could not run software. Note: You may use an acronym to respond to this question.

Answers

Answer:

Central processing unit (CPU)

Explanation:

A computer can be defined as an electronic device that is capable of receiving of data in its raw form as input and processes these data into information that could be used by an end user.

The central processing unit (CPU) is typically considered to be the brain of a computer system. It is the system unit where all of the processing and logical control of a computer system takes place.

Hence, the most important component in a computer is the central processing unit (CPU) because without it, it is practically impossible for the computer to run any software application or program.

Additionally, the component of the central processing unit (CPU) that controls the overall operation of a computer is the control unit. It comprises of circuitry that makes use of electrical signals to direct the operations of all parts of the computer system. Also, it instructs the input and output device (I/O devices) and the arithmetic logic unit on how to respond to informations sent to the processor.

preguntas sobre la búsqueda de alternativas de solución​

Answers

Answer:

Explanation:

Qué tipo de solución alternativa estás buscando

Compute the approximate acceleration of gravity for an object above the earth's surface, assigning accel_gravity with the result.
The expression for the acceleration of gravity is: (G*M)/(d2), where G is the gravitational constant 6.673 x 10-11, M is the mass of
the earth 5.98 x 1024 (in kg), and d is the distance in meters from the Earth's center (stored in variable dist_center)
Sample output with input: 6.3782e6 (100 m above the Earth's surface at the equator)
Acceleration of gravity: 9.81

Answers

Answer:

The summary of the given query would be summarized throughout the below segment. The output of the question is attached below.

Explanation:

Given values are:

[tex]G = 6.673e-11[/tex][tex]M = 5.98e24[/tex][tex]accel \ gravity = 0[/tex][tex]dist\ center=float(inp())[/tex]

here,

inp = input

By utilizing the below formula, we get

⇒ [tex]\frac{GM}{d^2}[/tex]

Now,

⇒ [tex]accel \ gravity=\frac{G\times M}{dist \ center**2}[/tex]

⇒ print("Acceleration of gravity: {:.2f}".format(accel_gravity))

Consider an array inarr containing atleast two non-zero unique positive integers. Identify and print, outnum, the number of unique pairs that can be identified from inarr such that the two integers in the pair when concatenated, results in a palindrome. If no such pairs can be identified, print -1.Input format:Read the array inarr with the elements separated by ,Read the input from the standard input streamOutput format;Print outnum or -1 accordinglyPrint the output to the standard output stream

Answers

Answer:

Program.java  

import java.util.Scanner;  

public class Program {  

   public static boolean isPalindrome(String str){

       int start = 0, end = str.length()-1;

       while (start < end){

           if(str.charAt(start) != str.charAt(end)){

               return false;

           }

           start++;

           end--;

       }

       return true;

   }  

   public static int countPalindromePairs(String[] inarr){

       int count = 0;

       for(int i=0; i<inarr.length; i++){

           for(int j=i+1; j<inarr.length; j++){

               StringBuilder sb = new StringBuilder();

               sb.append(inarr[i]).append(inarr[j]);

               if(isPalindrome(sb.toString())){

                   count++;

               }

           }

       }

       return count == 0 ? -1 : count;

   }

   public static void main(String[] args) {

       Scanner sc = new Scanner(System.in);

       String line = sc.next();

       String[] inarr = line.split(",");

       int count = countPalindromePairs(inarr);

       System.out.println("RESULT: "+count);

   }

}

Explanation:

OUTPUT:

A company is considering making a new product. They estimate the probability that the new product will be successful is 0.75. If it is successful it would generate $240,000 in revenue. If it is not successful, it would not generate any revenue. The cost to develop the product is $196,000. Use the profit (revenue − cost) and expected value to decide whether the company should make this new product.

Answers

Answer:

-16000

Explanation:

Given

P(success) = 0.75

Amount generated on success, X = 240000

P(not successful) = P(success)' = 1 - 0.75 = 0.25

Revenue generated, 0

Product development cost = 196000

Profit = Revenue - cost

When successful ; 240000 - 196000 = 44000

Unsuccessful ; 0 - 196000 = - 196000

x __________ 44000 _____ - 196000

P(x) _________ 0.75 _________ 0.25

The expected value ; E(X) = Σx * p(x)

Σx * p(x) = (44000 * 0.75) + (-196000 * 0.25)

= 33000 + - 49000

= - 16000

Hence, the company should not make the product

Answer:

-16000

Given P(success) = 0.75

Amount generated on success, X = 240000

P(not successful) = P(success)' = 1 - 0.75 = 0.25

Revenue generated, 0

Product development cost = 196000

Profit = Revenue - cost

When successful ; 240000 - 196000 = 44000

Unsuccessful ; 0 - 196000 = - 196000

x __________ 44000 _____ - 196000

P(x) _________ 0.75 _________ 0.25

The expected value ; E(X) = Σx * p(x) Σx * p(x) = (44000 * 0.75) + (-196000 * 0.25) = 33000 + - 49000 = - 16000 Hence, the company should not make the product

Explanation:

edge 2021

Describe how data is transmitted using half-duplex serial data transmission.

Answers

Answer:

In half duplex mode, the signal is sent in both directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same time. In simplex mode, only one device can transmit the signal. In half duplex mode, both devices can transmit the signal, but one at a time.

x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1) ​

Answers

Answer:

1 is the answer because ur trying to trick us

Explanation:

Let’s say you’re having trouble locating a file on your computer. Which of the following are good places to look for the file?

a. The Recycle Bin
b. Default folders like My Documents
c. The Downloads folder

Answers

Answer:

The downloads folder ( C )

Explanation:

when you have difficulty locating a file on your computer you can look for the file in any of the options listed ( The recycle bin, Default folders like My Documents  or The Downloads folder )

But the best place out of these three options is the Downloads folder. and this is because by default all files downloaded into your computer are  placed in the Downloads folder regardless of the type of file

Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

Need help ASAP!

Which of the following statements is true?

1) A PCAP format is handy because there is no additional tool to read it.
2) Network traffic can be captured using the Tcpdump protocol analyzer.
3) Normally, traffic inside a network is recorded within a capture file.
4) Sniffer is a program to save the network capture to a specific format.

Answers

The statement that  is true is that  Network traffic can be captured using the Tcpdump protocol analyzer.

How is network traffic captured?

Network traffic can be taken in using the Tcpdump. This is known to be a kind of packet sniffer that is often used to look and record network traffic on an interface.

An example is when a person capture 1,000 packets through the use of tcpdump. One can then analyze network traffic by using actual network traffic analyzer, which is as Wireshark.

Learn more about Network traffic from

https://brainly.com/question/26199042

how to add a fixed decimal value to an identifier using Delphi 10 coding?​

Answers

Answer:A declaration defines an identifier (such as the name of a function or variable) that ... This topic introduces the Delphi language character set, and describes the syntax for ... The Delphi language uses the Unicode character encoding for its character set, ... Integer and real constants can be represented in decimal notation as ...

Explanation:

After reading all L02 content pages in Lesson 02: Inheritance and Interfaces, you will complete this assignment according to the information below.Do not use the scanner class or any other user input request. You application should be self-contained and run without user input.Assignment ObjectivesPractice on implementing interfaces in JavaFootballPlayer will implement the interface TableMemberOverriding methodswhen FootballPlayer implements TableMember, FootballPlayer will have to write the real Java code for all the interface abstract methodsDeliverablesA zipped Java project according to the How to submit Labs and Assignments guide.O.O. Requirements (these items will be part of your grade)One class, one file. Don't create multiple classes in the same .java fileDon't use static variables and methodsEncapsulation: make sure you protect your class variables and provide access to them through get and set methodsAll the classes are required to have a constructor that receives all the attributes as parameters and update the attributes accordinglyAll the classes are required to have an "empty" constructor that receives no parameters but updates all the attributes as neededFollow Horstmann's Java Language Coding GuidelinesOrganized in packages (MVC - Model - View Controller)Contents

Answers

Solution :

App.java:  

import Controller.Controller;

import Model.Model;

import View.View;  

public class App

{  

public static void main(String[] args) // Main method

{  

Model model = new Model(); // Creates model object.    

View view = new View(); // Creates view object.    

Controller controller = new Controller(view, model); // Creates controller object that accepts view and model objects.    

}

}  

[tex]\text{Controller.java:}[/tex]  

package Controller;  

[tex]\text{impor}t \text{ Model.Model;}[/tex]

import View.View;  

[tex]\text{public class Controller}[/tex]

{

Model model; // Model object    

View view; // View object

public Controller(View v, Model m) // Method that imports both model and view classes as objects.

{

model = m;    

view = v;  

//view.basicDisplay(model.getData()); // basicDisplay method from View class prints FootballPlayer objects as Strings from Model class.  

view.basicDisplay(model.getMembers().get(1).getAttributeName(3));    

view.basicDisplay(model.getMembers().get(1).getAttribute(3));    

view.basicDisplay(model.getMembers().get(1).getAttributeNames());    

view.basicDisplay(model.getMembers().get(1).getAttributes());    

view.basicDisplay("size of names=" + model.getMembers().get(1).getAttributeNames().size());    

view.basicDisplay("size of attributes=" + model.getMembers().get(1).getAttributes().size());

}  

}  

FootballPlayer.java:

package Model;  

import java.util.ArrayList;  

public class FootballPlayer extends Person implements TableMember { // Used "extends" keyword to inherit attributes from superclass Person, while using "implements" to implement methods from TableMember interface.    

private int number; // Creating private attribute for int number.    

private String position; // Creating private attribute for String position.  

public FootballPlayer(String name, int feet, int inches, int weight, String hometown, String highSchool, int number, String position) // Full parameter constructor for FootballPlayer object (using "super" keyword to incorporate attributes from superclass).

{

super(name, feet, inches, weight, hometown, highSchool); // Used super keyword to include attributes from superclass.  

this.number = number; // Value assigned from getNumber method to private number instance variable for FootballPlayer object.  

this.position = position; // Value assigned from getPosition method to private position instance variable for FootballPlayer object.    

}  

public FootballPlayer() // No parameter constructor for FootballPlayer object.

{

this.number = 0; // Default value assigned to private number instance variable under no parameter constructor for FootballPlayer object.    

this.position = "N/A"; // Default value assigned to private position instance variable under no parameter constructor for FootballPlayer object.    

}  

Override

public String getAttribute(int n) // getAttribute method that is implemented from interface.

{

switch (n) { // Switch statement for each attribute from each FootballPlayer object. Including two local attributes, denoted by this. While the others are denoted by "super".

case 0:

return String.valueOf(this.number); // Use of the dot operator allowed me to discover String.valueOf method to output int attributes as a string.

case 1:

return this.position;

case 2:

return super.getName();

case 3:

return super.getHeight().toString();

case 4:

return String.valueOf(super.getWeight());

case 5:

return super.getHometown();

case 6:

return super.getHighSchool();

default:

return ("invalid input parameter");

}

}  

Override

public ArrayList<String> getAttributes() // getAttributes ArrayList method that is implemented from interface.

{

ArrayList<String> getAttributes = new ArrayList<>();    

for(int i = 0; i <= 6; i++){ // For loop to add each attribute to the getAttributes ArrayList from getAttributes method.    

getAttributes.add(getAttribute(i));    

}    

return getAttributes;

}  

Override

public String getAttributeName(int n) // getAttributeName method implemented from interface.

{

switch (n) { // Switch statement for the name of each attribute from each FootballPlayer object.

case 0:

return "number";

case 1:

return "position";

case 2:

return "name";

case 3:

return "height";

case 4:

return "weight";

case 5:

return "hometown";

case 6:

return "highSchool";

default:

return ("invalid input parameter");

}  

}  

Which of the following is not true about deep learning

Answers

Answer: it is also known as supervised learning

Explanation:

Deep learning is a sub field of machine learning and it refers to an artificial intelligence function that has to do with the imitation of the way that the brain works in the processing data which are used in making decisions.

It should be noted that deep learning is not thesame as supervised learning. While there's no creation of high-level abstraction of input features in the supervised learning, there's formation of abstractions of input features in deep learning.

what was the computer works in binary functions

Answers

Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit , is the smallest unit of data in computing.

Which statement, executed once at the start of main(), enables a program to generate a different sequence of pseudo-random numbers from rand() each time the program is run?

Answers

Answer:

(b) srand(time(0))

Explanation:

Given

See attachment for options

Required

Which would generate different set of random numbers

To do this, we analyze each of the options - one at a time.

(a) srand()

The above is an invalid usage of srand() because srand() requires an argument for it to function e.g. srand(2)

(b) srand(time(0))

The above is valid, and it will return different pseudo random numbers each time the statement is executed because time(0) lets srand() seed to the current time.

(c) srand(100)

The above is a valid usage of srand(), however rand() will generate same set of numbers because srand() has been seeded to only 100.

(d) time(srand())

The above is also an invalid usage of srand().

Examine the following output:
4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62]
5 39 ms 39 ms 65 ms placa01gr00.bb.ispxy.com [154.11.12.11]
6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [204.171.205.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]
Which command produced this output?
a. tracert
b. ping
c. nslookup
d. netstat

Answers

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

Write an ALTER TABLE statement that adds two new columns to the Products table: one column for product price that provides for three digits to the left of the decimal point and two to the right. This column should have a default value of 9.99; and one column for the date and time that the product was added to the database.

Answers

Answer:

ALTER TABLE Products

ADD Products_price float(5,2) DEFAULT 9.99,

ADD Adding_time datetime;

Explanation:

So at first we need to use ALTER TABLE statement, when we use this statement we also need to provide the table name. In this case, i assume it is 'Products'.

Then, as per question, we need to add two columns.

The first one is 'product_price' and it contains decimal points. So, we need to use ADD statement and give a column name like 'Prodcuts_price' and its datatype 'float' because it contains decimal or floating points. so, for 3 digits on the left and 2 digits on the right, it makes a total of 5 digits. So, we need to declare it like this. (5,2) it means a total of 5 digits and 2 after the decimal point. after that, we need to set our Default value using the DEFALUT statement. so DEFAULT 9.99. it will set the default value to 9.99 for existing products.

And for our next column, we give its a name like 'Adding_time' then it's datatype 'datetime' because it will contain date and times.

Other Questions
Provide one reason why you think we engage in causal analysis despite knowing the possible negative effects of that behavior or activity. Make sure to support your answer with at least two examples. A spectator at a professional hockey game was injured when an errant hockey puck flew over the glass boards and struck him in the head, causing permanent eye damage. The spectator brought an action for negligence against the facility owner in federal district court under diversity. By statute, the state in which the federal court is located allows the use of assumption of the risk as a defense when a spectator is injured at a sporting event. Although no valid federal statute or rule governs this issue, federal courts have generally not permitted facility owners to raise an assumption of the risk defense, to encourage facility owners to take more stringent precautions regarding spectator safety. The federal court opted to apply federal common law to resolve the issue, and the resolution was in the spectator's favor. However, a different outcome would have occurred if the district court had applied state law.Was the court's application of federal common law proper? The numbers 1, 2, 3 , and 4 are drawn one at a time from the set {0, 1, 2, , 9}. If these four numbers are drawn with replacement, what is the probability that 14 23 is an even number? How did the invention of the cotton gin increase the demand for slaves Gideon Company uses the allowance method of accounting for uncollectible accounts. On May 3, the Gideon Company wrote off the $2,000 uncollectible account of its customer, A Hopkins. The entry or entries Gideon makes to record the write off of the account on May 3 is:________. a. Accounts Receivable. A-Hopkins 2000Allowance for Doubtful Accounts 2000 b. Allowance for Doubtful Accounts 2000Bad debts expense 2000c. Accounts Receivable A-hopkins 2000 Bad debts expense 2000 d. Accounts Receivable A Hopkins 2000Allowance for Doubtful Accounts 2000e. Allowance for Doubtful Accounts 2000 Accounts receivables A-Hopkins 2000 Cleft Sentence. 15 POINTS!!!Rewrite the sentence as a cleft sentence, Please!My father has to wear a uniform and check everyones identity.What my father has ______ and check everyone's identity. A turkey has a mass of 6 kilograms. A bag of sweet potatoes has a mass of 2 kilograms. How many more grams does the turkey weigh than the sweet potatoes? Which of these are features of epic poetry? Select 4 options.a courageous hero who answers a call to adventurea main character who has to overcome common challengesa journey filled with many obstaclesa vast setting of distant landscapessupernatural forces, such as gods or monsters, that intervenecircumstances that would be very familiar to readers.Because no answer slots available due to mainly wrong or copycat answers. lawd help me. this is right out of the lesson! Please just say 1, 3, 4 and 5 to post this and get you a 5 star. or better yet, just post a quality chuck norris quote. 1. My number has two digits2. I am greater than 303. I am less than 904. My second digit is greater than 35. My first digit is divisible by 26. Both of my digits add up to either 11 or 127. I am the smallest number ofthe four numbers that are left. is a written set of instructions that tells a bank how to use money to pay someone. 3. Escribe la ecuacin de la elipse que cumple con:F1(-3,0) F2(3,0) y a=4 Brook states that the distance on the line is 4 units. Caleb states that the whole line does not have a distance because it continues on forever. Vivian states that the line is 6 units long. A number line goes from negative 8 to positive 8. A line with arrows as endpoints is above the line and contains points L, M, N. A closed circle appears at negative 6 and is labeled L. A closed circle appears at negative 2 and is labeled M. A closed circle appears at positive 4 and is labeled N. Which distance did Brook measure? Which distance did Vivian measure? discuss three ways in which the local government should promote safe and healthy living is a 6.33 a D grade or a C grade any 10disadvantages of living in community Identify and write the indirect object in the following sentences.1. Hector, did you sell Mike your car?2. We have given the dog a thorough scrubbing.3. Give the usher your ticket.4. Uncle Carl brought my brother a gold ring from Mexico.5. Hand me a pencil, please.6. The conductor gave the orchestra a short break.7. Show me the picture of your boat.8. I have given you my money.9. Give Lee this message.10. The club gave the town a new statue. How do the resources available to people influence how theygrow food? What is does the word multimedia mean?A. media that exclude audio and video B. media that combine text, images, animation, and soundC. software programs for creating graphics and soundD. the use of text only which prediction can most likely be made on this scenario? 5. An object has a constant acceleration of 40 ft/sec2, an initial velocity of -20 ft/sec, and an initial position of 10 ft. Find the position function, s(t), describing the motion of the object. (10 points)