(b) A management system for a university includes the following Java classes. (Methods are not shown). class Student { String regno, name; List modules; } class Module { String code, name; List students; } (i) Write a JSP fragment that will display in tabular form the names and codes of all of the modules taken by a student, and also the total number of such modules. You should assume that a reference to the student is available in a variable called stud of type Student. (ii) Briefly describe one weakness in the design of the classes shown above and suggest a better approach.

Answers

Answer 1

(i) JSP fragment: Display the student's module names and codes in a tabular form, along with the total number of modules using JSTL tags and the `length` function.

(ii) Weakness in design: The lack of a proper association between `Student` and `Module` classes can be addressed by introducing an intermediary `Enrollment` class to represent the relationship, allowing for better management of enrollments.

(i) To display the names and codes of all modules taken by a student in a tabular form and show the total number of modules, you can use the following JSP fragment:

```jsp

<table>

 <tr>

   <th>Module Code</th>

   <th>Module Name</th>

 </tr>

 <c:forEach var="module" items="${stud.modules}">

   <tr>

     <td>${module.code}</td>

     <td>${module.name}</td>

   </tr>

 </c:forEach>

</table>

Total Modules: ${fn:length(stud.modules)}

```

This JSP fragment utilizes the `forEach` loop to iterate over the `modules` list of the `stud` object. It then displays the module code and name within the table rows. The `fn:length` function is used to calculate and display the total number of modules.

(ii) One weakness in the design of the classes is the lack of a proper association between the `Student` and `Module` classes. The current design shows a list of students within the `Module` class and a list of modules within the `Student` class.

This creates a many-to-many relationship, but it doesn't specify how these associations are maintained or updated.

A better approach would be to introduce an intermediary class, such as `Enrollment`, to represent the association between a `Student` and a `Module`. The `Enrollment` class would have additional attributes such as enrollment date, grade, etc.

This way, each student can have multiple enrollments in different modules, and each module can have multiple enrollments by different students.

The modified design would be:

```java

class Student {

 String regno, name;

 List<Enrollment> enrollments;

}

class Module {

 String code, name;

 List<Enrollment> enrollments;

}

class Enrollment {

 Student student;

 Module module;

 Date enrollmentDate;

 // Additional attributes as needed

}

```

This design better represents the relationship between students, modules, and their enrollments, allowing for more flexibility and ease in managing the university management system.

Learn more about codes:

https://brainly.com/question/30270911

#SPJ11


Related Questions

If a person is searching on the web, all the links they used are being used for what type of data?.

Answers

When a person conducts a web search, they are likely to click on multiple links in order to find the information they are looking for.

Each link that is clicked on may lead to different types of data. For example, some links may lead to informational articles, while others may lead to product pages or social media profiles. Additionally, the data that is accessed may be in different formats, such as text, images, videos, or audio files.

Therefore, the type of data that a person accesses when searching the web depends on the links that they click on and the content that those links lead to. It is important to carefully evaluate the credibility and relevance of each source in order to ensure that the data obtained is accurate and useful.

To learn more about web search, visit:

https://brainly.com/question/27965856

#SPJ11

How are game designers linked with game players?

A.
In order to be a game player, you must be a game designer.
B.
In order to be a game designer, you must have extensive experience playing video games.
C.
Game designers must survey potential game players before creating a new game.
D.
Game designers create a narrative that game players can shape and become personally involved in.

Answers

The way in which game designers linked with game players is that: D. Game designers create a narrative that game players can shape and become personally involved in.

What is a game development tool?

A game development tool can be defined as a set of specialized software programs that are used by game developers (programmers) for the design and development of a game such as the following:

EmulatorGame engineModeling toolLevel editorScripting tool

Additionally, the four (4) team responsibilities that are required to create a game include the following:

The game designer create the rules and characters.The programmer writes an executable set of instructions (code).The artist choose colors and design each characters.The game designers create a narrative that game players can shape.

Read more on game development here: https://brainly.com/question/13956559

#SPJ1

Discuss the evolution of file system data processing and how it is helpful to understanding of the data access limitations that databases attempt to over come

Answers

Answer:

in times before the use of computers, technologist invented computers to function on disk operating systems, each computer was built to run a single, proprietary application, which had complete and exclusive control of the entire machine. the  introduction and use of computer systems that can simply run more than one application required a mechanism to ensure that applications did not write over each other's data. developers of Application addressed this problem by adopting a single standard for distinguishing disk sectors in use from those that were free by marking them accordingly.With the introduction of a file system, applications do not have any business with the physical storage medium

The evolution of the file system gave  a single level of indirection between applications and the disk the file systems originated out of the need for multiple applications to share the same storage medium. the evolution has lead to the ckean removal of data redundancy, Ease of maintenance of database,Reduced storage costs,increase in Data integrity and privacy.

Explanation:

where should a user disable virus protection settings that might prevent the boot area of the hard drive from being altered? a. bios/uefi setup b. start menu c. device manager d. control panel

Answers

An end user should disable virus protection settings that might prevent the boot area of the hard drive from being altered in the: A. BIOS/UEFI setup.

What is a virus?

A virus can be defined as a malicious software program that moves through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

This ultimately implies that, you should update the antivirus software and virus definition on a regular basis, so as to protect your computer from the newest viruses.

Furthermore, an end user should disable virus protection settings that might prevent the boot area of the hard drive from being altered in the Basic Output-Input system/Unified Extensible Firmware Interface (BIOS/UEFI) setup.

Read more on BIOS/UEFI here: https://brainly.com/question/15345030

#SPJ1

Which of the following describes organizations that
self-regulate via feedback loops?
Group of answer choices
Cybernetics
Chaos Theory
Scientific Management
Classical Organization Theory

Answers

Organizations that self-regulate via feedback loops can be described as applying principles of cybernetics.

Cybernetics is a field that deals with systems and control processes, specifically focusing on the study of feedback loops and self-regulation. Organizations that employ self-regulation through feedback loops can be seen as applying cybernetic principles to their operations. In this context, feedback loops refer to the process of gathering information about a system's performance, comparing it to desired outcomes, and making necessary adjustments to achieve those outcomes.

By using feedback loops, organizations can monitor their activities, evaluate their performance, and make continuous improvements. Feedback loops involve collecting data, analyzing it, and using the insights gained to adjust behaviors, processes, or strategies. This iterative process enables organizations to adapt to changes, optimize their performance, and achieve desired outcomes.

In summary, organizations that self-regulate via feedback loops can be understood as implementing principles from cybernetics. They utilize feedback mechanisms to monitor and adjust their operations, aiming to improve performance and achieve their goals.

Learn more about Cybernetics here:

https://brainly.com/question/32095235

#SPJ11

users at universal containers (uc) adhere to the following process for expense reports: create the expense report. attach receipts in an expenses app. send the report to the accountant to review and approve. an administrator needs to enable this app for salesforce mobile. what should the administrator consider from the user's perspective?

Answers

From the user's perspective, the administrator takes into account. User records can be created, submitted for approval, and receipts can be attached as images.

What in Salesforce is a universal container?

The rapidly expanding global producer of container solutions, Universal Containers, comes up with various scenarios by getting users to consider things from a business perspective and also by giving instructions on what sectors and scenarios we will encounter and how to deal with them.

Which MDM data piece is required for reporting between these systems?

US recently put into place a master data management (MDM) solution that will serve as the system of record for consumer information.

To know more about universal containers visit :-

https://brainly.com/question/15056535

#SPJ4

tax preparation software can help prepare and file your taxes by _________.

Answers

tax preparation software can help prepare and file your taxes by April 15.

When you create a new database using --------- , the database includes prebuilt tables and forms which you can populate with data.

Access
DBMS
Template
Datasheet

Answers

Answer is C template. It includes prebuilt tables and forms.

Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face ​

Answers

Answer:

yes

Explanation:

because the people will be lazy to go and talk to that person instead They will call each other and discuss

You are asked to recommend an email retrieval protocol for a company's sales team. The sales team needs to access email from various locations and possibly different computers. The sales team does not want to worry about transferring email messages or files back and forth between these computers. Which email protocol is designed for this purpose

Answers

With IMAP4, a mail server can store messages that users can access from different locations and client devices. A POP3 server necessitates the user downloading their email.

Which of the following protocols allows for safe email retrieval?

Email on a remote web server can be accessed from a local client using the Internet Message Access Protocol (IMAP), a mail protocol. The two most often used Internet mail protocols for obtaining emails are IMAP and POP3.

What one of the following protocols do email servers communicate with one another using?

Over the Internet, emails are delivered using the Simple Mail Transfer Protocol (SMTP). Most email clients send messages to the server using this protocol.

To know more about IMAP4 visit :-

https://brainly.com/question/14289109

#SPJ4

Produce a function with the following specifications:
NAME: cheby PolyAppx_########
INPUT: f, N, TOL, intTOL, depth
OUTPUT: A
DESCRIPTION: The vector A contains the N + 1 Chebyshev coefficients for f, found using the your adaptSimpsonInt numerical integration algorithm with tolerance intTOL and adaptive depth 'depth' to approximate the coefficients on the interval (-1+TOL.1-TOL).

Answers

The main answer to the given question is to produce a function named "chebyPolyAppx_########" that takes inputs f, N, TOL, intTOL, and depth and returns a vector A containing the N + 1 Chebyshev coefficients for f. The function utilizes the adaptSimpsonInt numerical integration algorithm with tolerance intTOL and adaptive depth 'depth' to approximate the coefficients on the interval (-1+TOL, 1-TOL).

What is the role of the adaptSimpsonInt algorithm in approximating the coefficients, and how does the tolerance intTOL and adaptive depth 'depth' affect the accuracy of the approximation?

The given question requires the implementation of a function that calculates the Chebyshev coefficients for a given function f. The function takes inputs such as the number of coefficients N, tolerances TOL and intTOL, and the adaptive depth 'depth'. The adaptSimpsonInt algorithm is utilized to numerically integrate the function and approximate the coefficients. The tolerance intTOL controls the accuracy of the integration, while the adaptive depth 'depth' determines the number of recursive subdivisions performed by the algorithm. The resulting Chebyshev coefficients are stored in the vector A. Understanding the implementation details, the role of the algorithm, and the impact of the input parameters on the approximation accuracy is crucial for effectively using the function.

Learn more about adapt

brainly.com/question/30584720

#SPJ11

A list of sources used for in-text citations that appears at the end of a document is called:
Autobiography
Editor's reference
Works Cited page
Content Review

Answers

The correct answer is Works cited page

Which search engine does not track users? Choose the answer.
Bing
Yahoo!
Google
DuckDuckGo

Answers

Answer:

I think the answer is Bing,am familiar with others

Bing does not track users.

Cybersecurity is not a holistic program to manage Information Technology related security risk

Answers

Cybersecurity refers to the set of measures and techniques used to protect computer systems, networks and devices from malicious attacks, such as data theft, service interruption or information destruction.

Information security risk management is a broader approach that includes identifying, assessing and managing an organization's information security-related risks.

Although cybersecurity is a key element in information security risk management, it is not sufficient on its own to ensure complete protection of an organization's information assets.

In conclusion, cybersecurity is a critical element in protecting an organization's information assets, but it is not a holistic program for managing IT-related security risk.

Lear More About Cybersecurity

https://brainly.com/question/20408946

#SPJ11

What are examples of some Exotic currencies?
A) EURUSD, AUDUSD
B) GBPCHE, EURUSD
C) AUDCHF, NZDJPY
D) MXN, ZAR, HKD

Answers

Answer:

D) MXN, ZAR, HKD

Explanation:

Exotic currencies refer to currency that are used in countries with emerging economies therefore they lack liquidity, are extremely volatile and have very low volumes. The exchange rate of exotic currencies are usually very high because of its lack of liquidity, therefore trading these currencies are expensive. Examples of exotic currencies are South African rand (ZAR), Mexican peso (MXN), Hong Kong dollar (HKD), Chinese yuan (CYN), Turkish lira (TRY) and so on.

If you aren’t familiar with the idea of a leap year, read “Why Is There a Leap Day?” before continuing with the lab.

Your friend is writing a program that will allow the user to input a year and then print “LEAP!” if that year is a leap year or print “not a leap year” if it is not. However, the program isn’t working properly, and your friend asked you for help in debugging.

Before you take a look at the program, you should know these rules for leap years:

A year is a leap year if it can be divided by 400 without a remainder.
A year is a leap year if it can be divided by 4 without a remainder, unless it can also be divided by 100 without a remainder; if that is the case, it is not a leap year.
All other years are not leap years.
Here is your friend’s code:

year=int(input()
if year%400=0:
print("LEAP!")
else:
print(not a leap year")
elseif year%4==0 and year%100!=0
print(“not a leap year")
Note: You may not have seen the % symbol used this way before. It calculates the remainder of the number to the left of it when it is divided by the number to the right of it. So, 10%3 is 1, because when you divide 10 by 3, the remainder is 1.

Answers

The correct debugged code is attached below

What is a leap year

A leap year is a year with 366 days and this year occurs once every 4 years. The debugged code line of code of the program written, is as attached below. because the line of code in the question lacks some functions and symbols

Hence we can conclude that the correct debugged code is attached below.

Learn more about Python coding : https://brainly.com/question/16397886

#SPJ1

If you arent familiar with the idea of a leap year, read Why Is There a Leap Day? before continuing with

platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as

Answers

Platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as

social networking sites.

What is a social networking site?

A social networking site is sometimes referred to as social network and it can be defined as a collection of Internet software applications and websites (platforms) which are designed and developed in order to avail end users with similar interests, an ability to connect, add, share, and discuss different information, as well as enhance remote connection, collaboration and debates (discussions) between community members over the Internet.

Additionally, some examples of a social networking site include the following:

Twi-tterFace-bookTi-kT-okInst-agr-amHangoutYou-tube

In this context, we can reasonably infer and logically deduce that social networking sites can help connect users such as employees to other employees with similar professional interests.

Read more on social networks here: brainly.com/question/28072110

#SPJ1

Complete Question:

Platforms that enable users to create a profile, specify which users they can connect with, and connect with other users are known as

____________ _____________ sites.

How has music changed with the use of technology?


Musicians can now share their music on the World Wide Web.

Music can easily be created and edited with different applications.

Developers can include music in the background of their websites.

all of the above

please help

Answers

Answer: All of the above

Explanation:

Music like most other things, has been changed by its interaction with technology. Music for instance can now be shared on the internet to people far away from each other with services like Apple music and Tidal benefitting from this.

Different applications have also been created that can help make music from being able to create instrumentals to changing the voices of singers.

Developers are now even able to include their music in their website background as way to market their product, proof of another way music has changed due to technology.

Answer:

all of the above

Explanation:

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

Will give Brainlets: I am creating a resumé in computers, the cover letter we are allowed to use a fake job. What are some ideas for a fake job I can use that are not real companies or businesses? We are not having a job interview with these cover letters. These are for practice. Please include what the fake job does.

Answers

You could use a fake job such as a "Virtual Marketing Coordinator" or a "Social Media Content Creator." A virtual marketing coordinator would be responsible for managing a company's online presence, while a social media content creator would be responsible for creating content for social media platforms. Both of these jobs are relevant in today's digital age and would allow you to showcase your skills in marketing and content creation.

D. It's based on command and control models
5. The best way to support the growth of social media in your organization is to:
A. Develop a social media policy and strategy
B. Allow anyone in your organization to post on your organization accounts
C. Only repost/share information from other organizations in your organization accounts
D. Only post on your accounts during an emergency

Answers

The best way to support the growth of social media in your organization is to Develop a social media policy and strategy.

What is Social media policy?

A social media policy is known to be the rules and regulations that are used in policing the use of social media.

Conclusively, They help to give advise to any person, etc. who is acting as a representatives of a firm on the right use of social media and thus the  The best way to aid the growth of social media in your firm is to develop a social media policy and strategy.

Learn more about social media policy from

https://brainly.com/question/3653791

Give me atleast 10 common shorcut keys that is often use while working in computer​

Answers

Answer:

1. Ctrl T = opens a new tab

2. Ctrl W = closes a tab

3. Ctrl P = print you screen

4. (for Microsoft users^^) Windows + G = for the Xbox Game Bar

5. Windows + Alt + R = to start recording and to end recording

6. (my personal fav <3) Ctrl + Shift + N = incognito

7. Ctrl Z = undo

8. Ctrl X = cut

9. Ctrl C = copy

10. Ctrl V = paste

Hope This Helps

Barry-

The 10 common shortcut keys that are often used while working on the computer​ are as follows:

Alt + F: File menu options in the current program.Alt + E: Edits options in the current program.F1: Universal help (for any sort of program).Ctrl + A: Selects all text.Ctrl + P: Print the document. Ctrl + X: Cuts the selected item.Ctrl + Del: Cut selected item.Ctrl + C: Copy the selected item.Ctrl + V: Paste the selected item. Alt + Tab: Switch between open apps.

What is the significance of shortcut keys?

The significance of shortcut keys is determined by the fact that they are used to perform a menu function or other common functions in a program or operating system at a very fast and rapid speed. It makes the process easier and faster.

Keyboard shortcuts are generally used to expedite common operations by reducing input sequences to a few keystrokes, hence the term "shortcut". They make the entire process more efficient and productive.

To differentiate from general keyboard input, most keyboard shortcuts require the user to press and hold several keys simultaneously or a sequence of keys one after the other.

Therefore, the 10 common shortcut keys that are often used while working on the computer​ are well mentioned above.

To learn more about Shortcut keys, refer to the link:

https://brainly.com/question/28959274

#SPJ2

write a program that accepts three decimal numbers as input and outputs their sum​

Answers

Answer:

sum = 0.0

for i in range(0,3):

   sum += float(input("Enter a decimal number to sum: "))

print ("Sum: ", sum)

*** Sample Input ***

Enter a decimal number to sum: 1.1

Enter a decimal number to sum: 2.2

Enter a decimal number to sum: 3.3

*** Sample Output ***

Sum:  6.6

Explanation:

For this problem, a method was devised in python to create the sum of three individual decimal numbers.

The first line of code, sum = 0.0, initializes a variable to the float type in which we will store the value of our sum.  Note, it is initialized to 0.0 to start from a value of 0 and be considered a float.

The second line of code, for i in range(0,3):  is the creation of a for loop control structure.  This will allow us to repeat a process 3 amount of times using the iterator i, from value 0 to 3 in this case.  Note, 0 is inclusive and 3 is exclusive in the python range.  This means the for loop will iterate with, i=0, i=1, and i=2.

The third line of code, sum += float(input("Enter a decimal number to sum: "))  is simply asking the user for a number, taking that input and converting it from a string into a float, and then summing the value with the previous value of sum and saving that into sum.

The fourth line of code, print ("Sum: ", sum) is simply displaying the final value that was calculated by adding the three user inputs together which were stored into the variable sum.

Cheers.

Answer:

a = float(input("Enter an integer: "))

b = float(input("Enter an integer: "))

c = float(input("Enter an integer: "))

print (a + b + c)

Explanation:

Takes three numbers that user inputs and outputs their sum (of whatever numbers are given.)

Who Likes K-pop? Which group or groups do you like

Who Likes K-pop? Which group or groups do you like
Who Likes K-pop? Which group or groups do you like
Who Likes K-pop? Which group or groups do you like

Answers

Answer:

i like k pop a little and im a blink i also like mother mother and arctic monkeys

Explanation:

Answer:

k-pop & Blackpink

Explanation:

<3

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

Select the correct answer from each drop-down menu.
You can lose data
. So, you should periodically back up your data

Answers

Answer:

... where drop down menu? from what i got, back up ur data daily

Explanation:

Answer:

The answer is: "You can lose data because of a virus attack, So you should periodically back up your data on a different hard drive."

Explanation:

I got it right on the Edmentum test.

you are the network administrator for a city library. throughout the library are several groups of computers that provide public access to the internet. supervision of these computers has been difficult. you've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet.

Answers

Since you are the network administrator for a city library. The thing that you can you do is option B: Configure port security on the switch.

What does a switch's port security entail?

With the help of port security, you can set up each switch port with a specific list of the MAC addresses of the devices that are permitted to connect to the network using that port. With the use of this security, individual ports are able to identify, stop, and record attempts by illegal devices to connect with the switch.

Therefore, to activate port security, use the switchport port-security command. I've set up port security so that only one MAC address is permitted. The switch will be in violation once it detects a different MAC address on the interface, and something will take place.

Learn more about network administrator from

https://brainly.com/question/28729189
#SPJ1

See full question below

You are the network administrator for a city library. Throughout the library are several groups of computers that provide public access to the internet. Supervision of these computers has been difficult. You've had problems with patrons bringing personal laptops into the library and disconnecting the network cables from the library computers to connect their laptops to the internet.

The library computers are in groups of four. Each group of four computers is connected to a hub that is connected to the library network through an access port on a switch. You want to restrict access to the network so that only library computers are permitted connectivity to the internet.

What can you do?

Create a VLAN for each group of four computers.Configure port security on the switch.Configure port security on the switch.Create static MAC addresses for each computer and associate it with a VLAN.Create static MAC addresses for each computer and associate it with a VLAN.Remove the hub and place each library computer on its own access port.Remove the hub and place each library computer on its own access por

An example of documentary evidence that might be presented at trial for a cyber crime is:


A. None of these choices.

B. data retrieved from slack space on a hard drive.

C. a cellular telephone.

D. a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses.

Answers

It’s d cause it has valuable info that the person was using to commit the crime

An example of documentary evidence that might be presented at trial for cybercrime is a photocopy of a hacker’s spreadsheet of telephone numbers and e-mail addresses. Thus, option D is correct.

 

What is the evidence?

Evidence is really the data used to attempt to support anything in a court of justice. Evidence is gathered from people, artifacts, and records. The only means through which the court may draw conclusions and reach a ruling is via the use of evidence.

According to the definition of information, it is the demonstration of any claim to be true. A hard copy of a hacker's worksheet with contact information and e-mail accounts is an illustration of documented evidence that might be used in court to prove a cybercrime. Therefore, option D is the correct option.

Learn more about evidence, here:

https://brainly.com/question/14370298

#SPJ2

To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
do first is
get on her computer to search the topic
make a list of the books she could use.
ask her teacher for specific suggestions.
make a list of relevant sources to check out

Answers

Answer:

The correct option is D)  

Explanation:

To get information about a research topic the first thing to do is make a list of relevant sources.

Georgias sources would depend on the type of research she has been asked to conduct.

If it's primary research, she would collect information from:

Her own experienceHer own observationthe Information she gathers personally from other people

If it is  secondary research, she can look at

books (hard copy, e-copy)journals (online, offline)online (blogs, videos, websites etc)

Whilst looking online, it is important to stick to authoritative sources as it is possible for anyone to publish anything online.

Examples of reliable sources are:

Journals from Industry AssociationsBureaus of StatisticsGlobal Research CompaniesHigher Institutions e.t.c.

Cheers!

Answer:

D

Explanation:

Edge 2021

True or Fale A criminal defense attorney's main focus is to convict the accused of a crime, and a state prosecutor is to defend the accused of the crime

Answers

Answer:

true i guess......

Explanation: sorry if this is wrong

A state prosecutor accuses someone in the magistrates’ court on behalf of the state, whilst a criminal defense attorney defends their client against accusations and will try to negotiate deals with their opposer (prosecutors) this could include; reduced bail, reduced sentences, and reduced charges. The answer is false. Keywords; DEFENSE, and PROSECUTOR
Other Questions
The College Bookstore sells a unique calculator to college students. The demand for this calculator is constant at 20 units per day. The lead time for this calculator is variable at an average of 9 days with a standard deviation of 2 days. Compute the statistical reorder point that results in a 95 percent in-stock probability. Choose the closest answer.a. 182 unitsb. 226 unitsc. 246 unitsd. 26 unitse. 46 units A female client who is falsifying her daughters symptoms of asthma without any apparent personal gain might meet the diagnostic criteria for: At a banquet hall, each table requires 18 plates. The kitchen has 387 plates available. How many full tables can be set? how did natural environments affect population growth of native americans A question asks: How many hours per week do you watch television? The respondent can answer in minutes and/or hours. What would be the best numerical summary of data from 300 participants? A. Mean, standard deviation, and range B. Median, IQR, and range C. Number and percent of total for each response option D. A or B depending on the distribution of the sample E. B and C write the ratio as a fraction in simple form 14 boxes:8 boxes The classrooms in the Oakhurst School District are painted every summer. Seven gallons of paint are needed to paint 3 classrooms. How many more gallons are need to paint the 129 classrooms at North High School than the 48 classrooms at Edgewater Elementary? The function g(x) is a transformation of the parent function f(x). Decide howf(x) was transformed to make g(x).f(x)g(x)x-2-126199-1392781-2-1234931102781OA. Horizontal or vertical stretchB. Horizontal or vertical shiftC. Horizontal or vertical reflectionD. Reflection across the line y=x Please answer both questions. 1. An ion formed from an atom has a 1- charge. The number of electrons present in the ion is 36 and the number of neutrons is 46. Identify the element.options: chlorine, bromine, krypton, rhodium.2. Identify which of the following particle(s) contain more electrons than neutrons.I. 11HII. 35 17ClIII. 23 11Na+ 1. The invasion of Iraq was very controversial. Many editors and columnists voiced strong opinions on the Iraq War. Use your knowledge of current events and the information in your textbook to write two short editorials. One should state why the United States should have invaded Iraq; the other editorial should state why the United States should not have invaded Iraq.Some points you may wish to consider: What was the stated purpose of the invasion? Why did the United States initiate a preemptive war? Has the United States engaged in preemptive wars in the past? Were there alternatives to invasion? Was it reasonable to assume that the U.S. military could defeat the Iraqi military? What strategy did the United States have for rebuilding the Iraqi government and economy after the fall of Saddam Hussein? What was the American public asked to do to support the war effort? What was the human cost of the war on Iraq and on the United States? What was the economic impact of the war on Iraq and on the United States? How did the invasion affect relations between the United States and its traditional allies? How did the invasion affect relations between the United States and other nations of the Middle East? Which of the following could be given lengths of sides of a triangle? Check all that apply. This figurative term makes a comparison between two things using thewords "like" or "as" Janet was buying food for her birthday party. She bought a 78.40 oz bag of barbeque chips and a 63.6 oz bag of regular chips. How many ounces did she buy all together? Rank from largest to smallest equilibrium constant. To rank items as equivalent, overlap them KBr2, KCl2, KI2 Which structure aids in balancing the amount of water inside and outside of both plant and animal cells? A touchscreen is a type of _____ screen.capacitive interactive resistive LED Spoke latin in their religious services. Used unleavened bread in communion. Believed the bishop of rome was the head of the church. These describe the beliefs and practices of the. What happens to GDP unemployment and inflation during an economic expansion? Tanya ran the 200-meter race in 24 +(6x) seconds. Cecella ran the same race in 24 and 6 hundredths seconds.Which girl finished the race first? What is the GCF to 54 and 32?