Here is a super challenge for you if you feel up for it. (You will need to work this out in Excel.) In 2017 the Islamic month of fasting, Ramadan, began on Friday, 26 May. What fraction of the year was this? (to 1 decimal place) Hint: Think carefully which start and end dates to use.

Answers

Answer 1

The date Friday 26, May 2017 represents 2/5 of the year 2017

From the question, we understand that Ramadan starts on Friday 26, May 2017.

Using Microsoft Office Excel, this date is the 146th day of the year in 2017.

Also, 2017 has 365 days.

This is so because 2017 is not a leap year.

So, the fraction of the year is:

[tex]\frac{146}{365}[/tex]

Multiply the fraction by 73/73

[tex]\frac{146}{365} = \frac{146}{365} \times \frac{73}{73}[/tex]

Simplify

[tex]\frac{146}{365} = \frac{2}{5}[/tex]

Hence, the fraction of the year is 2/5

Read more about fractions and proportions at:

https://brainly.com/question/21602143

Answer 2

The fraction of the year that corresponds to the Islamic month of fasting, Ramadan, beginning on May 26, 2017, is 2/5.

Find out how many days passed from January 1, 2017, to May 26, 2017.

January has 31 daysFebruary has 28 daysMarch has 31 daysApril has 30 daysMay has 26 days

Total days = 31 + 28 + 31 + 30 + 26

Total days = 146 days.

The total days in regular year:

The total days = 31 + 28 + 31 + 30 + 31 + 30 + 31 + 31 + 30 + 31 + 30 + 31

The total days  = 365 days.

The required fraction is calculated as:

Fraction = 146 days / 365 days

Fraction = 2 / 5

So, the fraction is 2 / 5.

Learn more about Fraction here:

https://brainly.com/question/10708469

#SPJ3


Related Questions

Cora is writing a program to make a motorcycle racing game. If Cora wants to speed of the motorcycle to appear on the screen when the game is played, then Cora needs to add something to the code that will make the speed

Answers

Answer: C. Boolean value

Explanation:

The options are:

A. input

B. output

C. Boolean value

D. conditional statement

Boolean data type refers to the data type which possesses two values which are true and false which shows two truth values of values.

The boolean expression results in a boolean value. Based on the question given, then the answer will be Boolean value. Therefore, the correct option is C.

Answer:

c

Explanation:

sorry if I was wrong

rem wap a programe using function procedure to calculate simple interest

Answers

Answer:

The program in Python is as follows:

def interest(P,R,T):

    [tex]I = P * R * T/100[/tex]

   return I

   

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

print(interest(P,R,T))

Explanation:

Required

Simple interest program using function

This defines the function

def interest(P,R,T):

This calculates the simple interest

   [tex]I = P * R * T/100[/tex]

This returns the calculated interest

   return I

The main begins here

These get inputs for principal, rate and time

P = float(input("Principal: "))

R = float(input("Rate (%): "))

T = float(input("Time (years): "))

This calls the interest function

print(interest(P,R,T))

I get such an error when I turn on the computer, how can I fix it?

Answers

Answer:

Use the HLL ( Java C++ ) code to fetch the commands of that program, then translate them using any translatory program such as Microsoft notepad.

Or:

Download any utility software such as Avast, thunderbird, Dr. Solomon, or Norton software

Then install it to memory.

In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.

Answers

Solution :

The value of the K2 cell is filled by IF and OR functions with structured references as :

[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]

Now if the syntax of the formula is not provided, then we can use :

[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]

The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :

---   staff member should served for more than 3 years

--- staff members should be college graduate

what is the difference between coding with html and coding with python

Answers

Answer:

Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.

I love science its my favorite subject

Answers

Answer:

Nice!

Explanation:

i like physics and biology :)

Answer:

I also love science!!

Explanation:

Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I really need correct answer ASAP

What kinds of people do you think are susceptible to being duped by "phishing" attacks?

Answers

Answer:

Find answers below.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is simply a form of cyber attack which typically involves making an attempt to obtain sensitive user informations such as usernames, passwords and credit card details or bank account details by disguising one's self as a trustworthy entity in an electronic communication usually over the internet.

Generally, the type of people who are susceptible to being duped by "phishing" attacks are those who post or share their email address or contact informations on public forums and don't scrutinize and examine a message before acting on it.

In conclusion, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

Answer:

what do you look like?

Each time David saves a file, he saves it to the desktop of the computer. His desktop is very cluttered and he has trouble finding the files that he needs. Advise David on a more effective way to organize his files​

Answers

Answer:

well she should organise his desktop a-z so that way he can just look at the name of the file he needs or give the files easier names to remember that way whatever file he needs he can just click on it

Explanation:

David could organise them in alphabetical order or he could delete all the files he no longer needs. He could also sort them into different folders depending on the type of software he uses for each file.

What is missing in this list of information needed to cite a book?
Author, title, date, publisher
A. page numbers
B. author’s name
C. city and state where it was published
D. author’s sources

Answers

Answer:

C. City and state where it was published

Explanation:

#CarryOnLearning

[tex]{hope it helps}}[/tex]

The one that is missing in the list of information given is author’s sources. The correct option is D.

What is citation?

A "citation" is the way you tell the readers that some of the information in your work came from another source.

It also provides your readers with the information they need to locate that source on the reference or Works Cited page. A citation must be enclosed by parentheses.

It properly credits the authors of the phrases or concepts that you used in your paper. It enables those reading your work to find your sources and learn more about the ideas you present in your paper.

In the given list to cite a book, i.e. Author, title, date, publisher, the one that is missing and should be incorporated is author's source.

Thus, the correct option is D.

For more details regarding citation, visit:

https://brainly.com/question/1272936

#SPJ2

Data bars are a form of ________.

data input
conditional formatting
data calculations
data formatting

Answers

Answer:

Hello There!!

Explanation:

The answer is conditional formatting.

hope this helps,have a great day!!

~Pinky~

Answer:

conditional formatting

Explanation:

hopes it helps

what is the most important/powerful computer in a typical network?​

Answers

Answer:

A network server is a computer that provides various shared resources to workstations and other servers on a computer network. They are built with more powerful components than individual workstations

Two devices used by the supermarket point-of-sale (POS) terminal are a bar code reader and a keyboard. Name two other input/output devices used at the POS and give a use for each device.

Answers

Answer:

1. Receipt printer

Use of receipt printer:

i. They are used to print customer transaction receipts for proof.

2. Touch screen monitor

Use of touch screen monitor:

i. Allow record of when, where, price, and other important information about the sale conducted.

Explanation:

A Point of sale (POS) terminal takes record of transactions at the point where a product is purchased or a service is rendered. A barcode reader is a price scanner that is an input device used in a point-of-sale (POS) terminal. The keyboard is also an input device. The receipt printer is an output device since it converts information into a readable format. While only a touch screen monitor among the other devices mentioned above is an input and output device, because of its touch panel and its ability to display information.

             

use of concave mirrors​

Answers

Explanation:

concave lens use for shaving mirrors and satellite

there are 2048bytes in4megabytes true or false​

Answers

Answer:

FALSE IS THE ANSWER.

I HOPE IT IS HELPFUL

The lines that can be formatted to display on the edges of cells are called _______.

style lines
edge lines
borders
underlines

Answers

Answer:

borders

Explanation:

Borders can be formatted in cells of excel or goog.le sheets. You can change width, shape, color, and whole plethora of things!

The lines that can be formatted to display on the edges of cells are called [tex]\boxed{ borders . }[/tex]

a. style lines

b. edge lines

c. borders

d. underlines

[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]

benefits of Internet in modern means of transport benefit of Internet as modern method of information transmission ​

Answers

Answer:

It is a network through which individuals transfer data and information. Using the internet, you can conduct financial services

Which of the following negatively impacts the readability of a web page?
ОА.
a mix of serif and sans-serif fonts
OB.
too many hyperlinks
O c.
the use of a single font for the entire page
D.
the use of italicization for emphasis

Answers

Answer:

i think its OB. too many hyperlinks

Explanation:

i read the book_____you gave me last month​

Answers

Answer:

You didn't provide any answer choices therefore I shall provide some that make sense with the sentence.

that

which

I hope these answers were of any help to you.

I read the book THAT/WHICH you gave me last month.

Define the terms of data and information .​

Answers

data is a collection of facts such as numbers words measurements observation or just description of thing. information is facts provided or learned about something or someone.


1.can you identify the materials needed in making simple doorbell ???

2.what is the use of each material or tool needed in making simple doorbell?????

pakianswer po ng maayos​

Answers

Answer:

1. rotary tool, spray paint, light, drill,

Explanation:

Explain cell reference and its types with examples?​

Answers

Answer:

There are two types of cell references: relative and absolute. Relative and absolute references behave differently when copied and filled to other cells. Relative references change when a formula is copied to another cell. Absolute references, on the other hand, remain constant, no matter where they are copied.

What are the best editing apps?

Answers

Answer:

Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt.

Explanation:

Snapseed, Lightroom, Adobe Photoshop, Prisma, Bazaart, Photofox, VSCO and PicsArt are the best editing apps. Some of the apps are present as free while some of them are not available without paying money for it. These are the top best editing apps so you can use it anyone of it. Snapseed is free on iOS and Android whereas Lightroom needs $5 per month for full access. Adobe Photoshop is also free on iOS and Android.

Answer:

After effects or alight motion on mobile are pretty good

Explanation:

help please asap please l​

Answers

Answers:

(a) Processor type

(b) Processor speed

(c) Display size

(d) Resolution

(e) Drive size

(f) Memory size

(g) Memory type

(h) Available interfaces

(i) Operating system

(j) Utilities

♛ Mark me as Brainliest if I’m right

i need a constant supply and i am not portable
A. desktop pc
B. smart phone
C. tablet pc
D. laptop​

Answers

the answers desktop pc

Convert the algebraic expression below to C++ statement Do not use the pow function. Ans = 5x^2 + 15k + y^-2

Answers

Answer:

The C++ statement for the given algebraic expression 5x^2 + 15k + y^-2 is ( ( 5 * ( x * x ) ) + ( 15 * k ) + ( 1 / ( y * y ) ).

Explanation:

To convert the given algebraic expression 5x^2 + 15k + y^-2 into the C++ statement without using the pow function is:

In the given algebraic expression, there are three expressions combined using the + operator.

The first algebraic expression is 5x^2.

Here, x has a power of 2, and 5 is multiplied by the result of x^2. x having the power of 2 means x is multiplied itself twice. The C++ statement for this algebraic expression is (5 * ( x * x)).

The second algebraic expression is 15k.

Here, 15 is multiplied by k. The C++ statement for this algebraic expression is (15 * k).

The third algebraic expression is y^-2.

Here, x has a power of -2. it means [tex]1/y^{2}[/tex].  The C++ statement for this algebraic expression is (1/ (y * y).

The combination of all the three C++ statement is (5 * ( x * x)) + (15 * k) + (1/ (y * y).

I need help in raft survival ocean nomad I was traveling and now I can't enter the island or go back home (raft). Please help me

Answers

Answer:

Raft Survival : Ocean Nomad is a survival game

Explanation:

The raft survival ocean nomad is a survival video game that is developed by a Swedish developer,  Redbeet Interactive. This game is published by Axolot Games.

In the game the player is moving in a raft in the middle of an ocean searching for his family. It is a survival and strategy game. The player needs to survive in the deserted ocean by whatever he finds and collect from the ocean and also protect himself from the attacks of the sharks.

The player moves by a small island which he can explore to eat something or collect other items to developed his raft.

In the context, if you can not enter the island or go back to the raft, then save the game at that point and press the escape button to start from the first.

In this way, you can refresh the game and start he game again to enter the island.

i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?​

Answers

Answer:

In theory yes it is gonna be pretty hard but it is very possible

What should Iris obtain from the client in order to display the work in her portfolio?

Answers

Answer:

depends on the laws of the country in which you are working

Explanation:

This is very vague and usually depends on the laws of the country in which you are working. In some cases, Iris would need permission from the client in order to display the work. In other cases, Iris would not need anything because she is the original creator of the content. This mostly depends on the laws of the country and whether or not a specific contract was created between Iris and the client, stating if the content rights where transferred or not.

Match each career to its various job roles. digital media coordinator digital media specialist photographer sound producer creates audio and video content for websites arrowRight records and modifies sound and music for video games and movies arrowRight posts content on the Internet arrowRight captures images and edits the images in graphic design software arrowRight

Answers

Answer:

1. Digital media coordinator.

2. Sound producer.

3. Digital media specialist.

4. Photographer.

Explanation:

1. Digital media coordinator: he or she is saddled with the responsibility of creating audio and video content for use on websites.

2. Sound producer: he or she records and modifies sound and music for video games and movies through the use of specialized software application such as fruity loops.

3. Digital media specialist: he or she is saddled with the responsibility of posting content such as news, pictures, graphic designs, etc., on the Internet.

4. Photographer: he or she captures images using a camera or camcorder and edits the images using a graphic design software such as Adobe Photoshop.

suggest a reason why it was constructed there?​

Answers

Can you post the work assigned so I can better understand?
Other Questions
Eve's sequence decreases by 2 hundreths each time. she picks a number to start with. what is the difference betwen her 3rd and 6th number? X, Y, Z l ba axit cacboxylic n chc cng dy ng ng (MX < MY < MZ), T l este to bi X, Y, Z vi mt ancol no, ba chc, mch h E. t chy hon ton 26,6 gam hn hp M gm X, Y, Z, T (trong Y v Z c cng s mol) bng lng va kh O2, thu c 22,4 lt CO2 (ktc) v 16,2 gam H2O. Mt khc, un nng 26,6 gam M vi lng d dung dch AgNO3/NH3, sau khi cc phn ng xy ra hon ton thu c 21,6 gam Ag. Mt khc, cho 13,3 gam M phn ng ht vi 400ml dung dch NaOH 1M v un nng, thu c dung dch N. C cn dung dch N thu c m Below is information from the financial statements of Greenwich Company: Accounts receivable (net) 2016: $2,400 Accounts receivable (net) 2015: $2,200 Net sales 2016: $25,875 What is the average collection period the romans conquered many people. in what order did they conquer the following people: Greeks, Etruscans, and Latins? 1. A photograph measures eleven inches wide and fourteen inches long. The picture is enlarged to fit on a wall. If the new larger picture is 231 inches wide, how long is it?234 inches294 inches181.5 inches412.5 inches. MAN on metropolitan area network is a network spanning a large distances of a few kilometre like a city true or false 2. A bag contains one red, one blue and one white marble. One marble is chosen at randomfrom the bag, and then replaced into the bag. A second marble is chosen.a) Draw a probability tree and find the sample space.(3 marks) In the SDS-PAGE (sodium dodecylsulfate - polyacrylamide gel electrophoresis) method, separation takes place on the basis of:_____________ a. charge only, because all particles have different charges, but the same mass. b. the sieving action of the gel, because all particles have the same charge, but different masses. c. the sieving action of the gel, because all particles have approximately the same charge/mass ratio, but different masses. d. the chemical nature of the buffer used as the electrolyte. Primary and secondary workers produce goods needed for the local and export markets. True or false If we will be conducting the experiments in tanks with dimensions of roughly 10 in by 10 in. Estimate the volume of oil you would need to cover half the total area. Again assume a molecule is 10 nm in size. Show your work. How did imperialism contribute to the start of WWI? A. European rivalries over colonial territory led to nationalistic tension among these states. B. Eagerness to take over land in postrevolutionary Russia led to territorial conflicts. C. Conflicts between church and government led to distinct divisions within key European countries. D. Centralized governments whose powers were unchecked caused internal uprisings in many nations. Those who were loyal to the Roman Empire were the:PhariseesSadduceesHerodiansscribes I have oxygen gas at 2 L and 2 atm. At what pressure is the oxygen gas if my volume decreases to 1 L? How do I solve this Determine the equation of the line that is perpendicular to the given line, through the given point.y=3x+4; (9, -7) Assume the following: 1) the scattergraph intersects the Y axis at $200; 2) the estimated line on the scattergraph increases by $10 for every 1 unit of volume increase. What is total cost if volume is 20 units Thy thy tr s dng ti liu trong phng thi. Thy tin ti lp bin bn v vic tr mang ti liu vo phng thi. Tr hi l do ti sao. Thy yu cu tr t ti liu trong ti o ln mt bn. Hi lun im, lun chng, lun c What are variables used by Honda to segment the market? Why do they use those variables to segment? Jade has seven cards. Each card is labeled with a letter. A B C D E F G H J Jade picks one of her cards at random. Find the probability that the card she picks is a) labelled F, b) labelled with a letter in her name JADE c) labelled with a letter that has at least one line of symmetry select all explanation that prove triangle ABC is congruent to triangle A'B'C