How does an app process information

Answers

Answer 1
Mobile app designers often start app design with sketches on paper. ... Creating wireframes is a quick and cost-effective approach for designing app layouts and iterating through them in the design review process. While creating wireframes you should consider device specific design.
Answer 2
It is an iterative method to create a good mobile app. You've already heard of the words "sprints" and "agile technique." This essentially entails breaking down all development work into smaller milestones and building the app in cycles. Planning, production, testing, and evaluation will all be part of each cycle.

Related Questions

What do people in the movie e.t think about the character E.T


please answer its due in 8:30 PM pleaeee

Answers

Answer:

They were scared of him then they felt devotion to him.

Explanation:

can you help me with my homework what should i do

can you help me with my homework what should i do

Answers

Answer:

what is matter and two examples

How has segmentation of voters influenced direct mail?

Answers

The segmentation of voters has had a significant impact on direct mail in political campaigns. With the help of data analytics and voter databases, campaigns can target specific demographics and voter groups with tailored messages and advertising.

This means that campaigns can use direct mail to reach out to specific groups of voters, rather than sending mass mailings to entire regions or zip codes.For example, a campaign may use data to identify a group of voters who are particularly concerned about environmental issues, and then send a direct mail piece that highlights the candidate's positions on environmental policies. This approach allows campaigns to make more effective use of their resources and can increase the likelihood of reaching and persuading specific groups of voters.

To learn more about campaigns click the link below:

brainly.com/question/23323399

#SPJ11

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The first word within the output should be capitalized only if the original word was capitalized. Specifications Challenge.toCamelCase(str) given a string with dashes and underscore, convert to camel case Parameters str: String - String to be converted Return Value String - String without dashes/underscores and camel cased Examples str Return Value "the-stealth-warrior" "theStealthWarrior" "A-B-C" "ABC"

Answers

Answer:

I am writing a Python program. Let me know if you want the program in some other programming language.

def toCamelCase(str):  

   string = str.replace("-", " ").replace("_", " ")  

   string = string.split()

   if len(str) == 0:

       return str

   return string[0] + ''.join(i.capitalize() for i in string[1:])

   

print(toCamelCase("the-stealth-warrior"))

Explanation:

I will explain the code line by line. First line is the definition of  toCamelCase() method with str as an argument. str is basically a string of characters that is to be converted to camel casing in this method.

string = str.replace("-", " ").replace("_", " ") . This statement means the underscore or dash in the entire are removed. After removing the dash and underscore in the string (str), the rest of the string is stored in string variable.  

Next the string = string.split()  uses split() method that splits or breaks the rest of the string in string variable to a list of all words in this variable.

if len(str) == 0 means if the length of the input string is 0 then return str as it is.

If the length of the str string is not 0 then return string[0] + ''.join(i.capitalize() for i in string[1:])  will execute. Lets take an example of a str to show the working of this statement.

Lets say we have str = "the-stealth-warrior". Now after removal of dash in by replace() method the value stored in string variable becomes the stealth warrior. Now the split() method splits this string into list of three words the, stealth, warrior.

Next return string[0] + ''.join(i.capitalize() for i in string[1:])  has string[0] which is the word. Here join() method is used to join all the items or words in the string together.

Now i variable moves through the string from index 1 and onward and keeps capitalizing the first character of the list of every word present in string variable from that index position to the end.  capitalize() method is used for this purpose.

So this means first each first character of each word in the string starting from index position 1 to the end of the string is capitalized and then all the items/words in string are joined by join() method. This means the S of stealth and W of warrior are capitalized and joined as StealthWarrior and added to string[0] = the which returns theStealthWarrior in the output.

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The

he following items are inserted in the given order into an avl-tree: 6, 1, 4, 3, 5, 2, 7. which node is in the deepest node?

Answers

To determine the deepest node in the AVL tree after inserting the items in the given order, we need to construct the tree and calculate the height of each node.

Starting with the root node, we insert the items in the given order and balance the tree using rotations to maintain the AVL property:
  6

 / \

1   7

 \

  4

 / \

3   5

 \

  2

The deepest node is the node with the largest height. We can calculate the height of each node using the formula:
height = 1 + max(left_height, right_height)
where left_height and right_height are the heights of the left and right subtrees, respectively.
Starting at the bottom of the tree, we can calculate the height of each node as follows:
Node 2 has a height of 1.
arduino

    3  (height = 2)

   / \

  -   -

Node 3 has a height of 2.

arduino

    4  (height = 3)

   / \

  3   5  (height = 2)

Node 4 has a height of 3.

arduino

    1  (height = 1)

     \

      4  (height = 3)

     / \

    3   5

     \

      2  (height = 2)

Node 1 has a height of 1.

arduino

Copy code

    7  (height = 1)

   / \

  6   -

Node 7 has a height of 1.

arduino
    6  (height = 2)

   / \

  1   7

   \   \

    4   -

   / \

  3   5

   \

    2
Node 6 has a height of 2.
Therefore, the deepest node in the AVL tree is node 4, which has a height of 3.

To learn more about construct
https://brainly.com/question/13425324
#SPJ11

lucca wants to prevent workstations on his network from attacking each other. if lucca's corporate network looks like the network shown here, what technology should he select to prevent laptop a from being able to attack workstation b?

Answers

In this instance, Lucca's unique demand is to prevent assaults rather than just detect them, necessitating the use of a HIPS to satisfy his requirements.

What precisely is HIPS?

A security strategy known as a host intrusion prevention system (HIPS) uses external software tools to detect and stop hostile activity. Endpoint device protection is frequently provided by host-based intrusion prevention systems.

How do we describe Lucca's technical issue?

HIPS. -A host-based solution is necessary when endpoints are linked without a network control point in between them. In this instance, Lucca's unique demand is to prevent assaults rather than just detect them, necessitating the use of a HIPS to satisfy his requirements. If Lucca chooses a product with those qualities, which are common in contemporary products, he could have access to extra valuable features like data loss protection and system compliance profiling.

To know more about network security visit

brainly.com/question/14407522

#SPJ4

I get the following error : TypeError: append() missing 1 required positional argument: 'values'
where did I go wrong ?

Answers

The error "TypeError: append() missing 1 required positional argument: 'values'" is caused by the fact that the `append()` method is missing an argument that is required by the program.

To fix the error, add a value argument to the append() method. This error occurs when you forget to include a value to be appended to a list. It is a type error. Here is an example of how to append a value to a list correctly:```values = [1, 2, 3, 4]values.append(5)```ExplanationThe `append()` method is used to add new items to an existing list in python.

It adds the item to the end of the list. Here is the syntax for the `append()` method:`list.append(item)`In this syntax, `list` is the name of the list you want to append the item to, and `item` is the new item you want to add to the list.The error message is indicating that you are missing the `values` argument for the `append()` method. To fix this, make sure to provide a value for the method.

To know more about error visit:

https://brainly.com/question/32108561

#SPJ11

a hard disk is a _ storage device

Answers

electro-mechanical data storage device

Electro-mechanical data storage device

A computer program that is installed on the hard drive of a personal computer and that requires a computer operating system such as Microsoft Windows or Apple OSX to run

Answers

A computer program that is installed on the hard drive of a personal computer and requires an operating system such as Microsoft Windows or Apple OSX to run is known as an application or software. It is designed to run on an operating system, which is the software that manages computer hardware and software resources.

A computer program that is installed on the hard drive of a personal computer and requires a computer operating system such as Microsoft Windows or Apple OSX to run is called an application or software. In computing, a program is a collection of instructions that tell a computer what to do.The term "program" is frequently used synonymously with "application" and "software," and the terms are frequently used interchangeably. These programs are designed to run on an operating system, which is a system software that manages computer hardware and software resources and provides common services for computer programs. Operating systems serve as a link between hardware and software and provide a platform for programs to operate on.

Users interact with software by using the operating system's graphical user interface (GUI). The graphical user interface (GUI) is a type of user interface that allows users to interact with electronic devices using graphical icons and visual indicators instead of text-based user interfaces.A personal computer's hard drive, also known as the hard disk, is where programs and data are stored. Programs are installed on the hard drive so that they may be accessed by the user when needed. In summary, a computer program that is installed on the hard drive of a personal computer and requires an operating system such as Microsoft Windows or Apple OSX to run is known as an application or software. It is designed to run on an operating system, which is the software that manages computer hardware and software resources.

Learn more about Software here,https://brainly.com/question/28224061

#SPJ11

A computer program is a software application that requires a computer operating system such as Microsoft Windows or Apple OSX to run.

A computer program is a software application that is installed on the hard drive of a personal computer. These programs are designed to perform specific tasks or functions, such as word processing, web browsing, or gaming. However, in order to run these programs, a computer operating system is required.

An operating system is a software that manages computer hardware and software resources and provides common services for computer programs. It acts as an intermediary between the computer's hardware and the software applications, allowing them to communicate and interact with each other.

Examples of popular computer operating systems include Microsoft Windows and Apple OSX. These operating systems provide a platform for computer programs to run and utilize the computer's resources effectively. They provide a user-friendly interface, file management system, and other essential services that enable users to interact with their computer and run various software applications.

Without an operating system, computer programs would not be able to execute and utilize the computer's resources effectively. The operating system provides the necessary environment and resources for the programs to run, ensuring their proper functioning and compatibility with the computer's hardware.

Learn more:

About computer program here:

https://brainly.com/question/3397678

#SPJ11

the page that is being used for i/o some os pages a new page that has just been brought in a page that belongs to a high priority process

Answers

The page that is being used for Input/output (I/O) is a new page that has just been brought in and belongs to a high-priority process.

When a process needs to perform I/O operations, it may require additional pages of memory to store the data being read from or written to external devices. In this case, the operating system (OS) will bring in a new page from secondary storage (such as a hard disk) into the main memory (RAM). This newly brought-in page is then used for the I/O operation.

Furthermore, since the process that requires this page is of high priority, it is given precedence over other processes in terms of accessing memory. This ensures that the high-priority process can quickly perform its I/O operations and continue executing without unnecessary delays.

Overall, the page being used for I/O is a recently brought-in page that specifically belongs to a high-priority process.

Know more about Input/output (I/O) here,

https://brainly.com/question/13566370

#SPJ11

In what year was the TED group created?

Answers

Answer:

1984

Explanation:

what is the predefined business logic within a blockchain called?

Answers

Smart contracts: With so much being said and published about blockchain, it appears that the technology may be misunderstood by the general public. They see it as a one-man band that can do everything, including enabling bitcoin, safeguard data, brew coffee, and more, rather than a technology.

Blockchain is a distributed, immutable database that simplifies the tracking of assets and the recording of transactions inside a business network. An asset may be tangible (such a home, automobile, sum of money, or plot of land) or intangible (intellectual property, patents, copyrights, branding). A blockchain network allows for the recording and trading of practically everything of value, lowering risk and increasing efficiency for all parties. Business depends heavily on information, which is why blockchain technology is significant. It is preferable if it is received promptly and accurately.Because it provides real-time, shareable, and fully transparent data that is recorded on an immutable ledger and only available to users of a permissioned network, blockchain is the perfect technology for delivering such information.

To learn more about " database " Click on below link brainly.com/question/28391263

#SPJ4

help pls
cmu cs 0
4.1.2.1 Creating Groups checkpoint 1

Answers

Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)

Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.

(Java) What, in your opinion, is wrong with this nested for loop?

for(int x = 0; x < 10; x++){

for(int x = 10; x > 0; x--){

System.out.println(x);

}

}

Answers

The issue with this   nested for loop in Java is the declarationof the second loop variable.

Why is this so?

Both loops   use the same variable name"x" for iteration. This creates a conflict because the inner loop re-declares the "x" variable, leading to a compilation error.

Each loop should have a unique variable name to avoid naming conflicts and ensure proper loop execution.

The corrected code will be --

for (int x =0; x < 10; x++)   {

   for (int y = 10;y > 0; y--)   {

       System.out.println(y);

   }

}

Learn more about Java at:

https://brainly.com/question/25458754

#SPJ1

Which of the following best describes an operating system's actions during typical system use? (1 point) A. Communicates between the computer and the end user or external world. B. Performs a specific action or function and processes data for the end user. C The main action an operating system performs during typical use is storing memory. D. Facilitates a computer's basic functions, such as executing applications, communicating between software applications programs and hardware.​

Answers

Answer:

D. Facilitates a computer's basic functions, such as executing applications, communicating between software applications programs and hardware.​

Explanation:

Operating systems generally act as the middle man between programs and hardware, though the code for the applications is usually executed by the hardware directly.

Having many _________ values in your database wastes space and causes problems working out totals.

Answers

Having many null values in your database wastes space and causes problems working out totals.

What are NULL values in SQL?

The SQL NULL is known to be a word that connote a term used that is often used to depict a missing value.

A null value can be seen in any form of a relational database is known to also be one that is often used if the value in a column is said to unknown or missing.

Note that there are different kinds of database system and as such one can say that A null value in a relational database is used when the value in a column is unknown or missing and then it acts in its place.

Learn more about null values from

https://brainly.com/question/15593034

#SPJ1

BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.

blocks websites
filters all emails
filters social media
filters web searches
jams signals

Answers

Answer:

the first four options

Explanation:

they make the most sense

The Great Firewall of China is designed and developed to:

Block websites.Filter all emails.Filter social media.Filter web searches.

What is the Great Firewall of China?

The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.

In this context, the Great Firewall of China is designed and developed to domestically:

Block websites.Filter all emails.Filter social media.Filter web searches.

Read more on Great Firewall of China here: https://brainly.com/question/27411286

#SPJ2

Select the three type of undesirable software.

virus
firewall
peer-to-peer
nannyware
adware
malware
VPN

Answers

Virus, Adware, Malware

a workstation was patched last night with the latest operating system security update. this morning, the workstation only displays a blank screen. you restart the computer, but the operating system fails to load. what is the next step you should attempt to boot this workstation? reboot the workstation into safe mode and disable windows services/applications reboot the workstation into safe mode and roll back the recent security update reboot the workstation into safe mode, open regedit, and repair the windows registry reboot the workstation into the bios and reconfigure boot options see all questions back next question

Answers

Answer:

A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a black screen

Explanation:

navigation tracking uses satellites to transmit signals that determine the location of a device. called

Answers

Global positioning system (GPS) tracking, the technology is used in a variety of applications, including navigation, surveillance, and theft prevention.

What is Navigation?
Navigation is the process of planning, recording and controlling the movement of a vehicle from one place to another. It involves the use of various navigational tools such as maps, compasses, GPS systems, radar, and sonar to determine the position of a vehicle at any given time. It also involves accurate calculation of time, speed, and direction in order to get to the desired destination safely and efficiently. Navigation plays a critical role in the transportation industry, military operations, and marine exploration.

To know more about Navigation
https://brainly.com/question/146597
#SPJ4

Information system using the latest information technology has benefited which modern need?.

Answers

Information system using the latest information technology has benefited increased data security.

Give a brief account on data security.

Data security is the process of guarding digital data against unwanted access, corruption, and theft across all stages of its life. It is a notion that covers every facet of information security, including the logical security of software programs, administrative and access controls, and the physical security of hardware and storage devices. It also contains the policies and practices of the organization.

Strong data security measures, when correctly executed, will safeguard an organization's information assets from cybercriminal activities but they also guard against insider threats and human mistake, which continue to be among the top causes of data breaches in the present. Data security entails the use of tools and technology that increase an organization's awareness of where its crucial data is located and how it is being used. These solutions ought to be able to implement security measures like encryption, data masking, and redaction of sensitive files, as well as automate reporting to speed up audits and ensure compliance with legal standards.

To know more about, data security, visit :

https://brainly.com/question/14487203

#SPJ1

listen with readspeaker which remote access protocol is used over an ethernet network?

Answers

The remote access protocol that is typically used over an Ethernet network is the Remote Desktop Protocol (RDP).

This protocol is used to remotely connect to a computer or server over a network connection, allowing users to access resources and applications from a remote location. RDP is commonly used for remote support, remote administration, and remote access to desktops and applications. Other remote access protocols that may be used over an Ethernet network include Virtual Network Computing (VNC) and Secure Shell (SSH). However, RDP is the most commonly used protocol for remote access over an Ethernet network.

Learn more about Remote Desktop Protocol: https://brainly.com/question/14099873

#SPJ11

A database administrator wants to correlate pairs of rows from the same table. Which type of join should the database administrator use?

Answers

To construct two or more database  copies of the same table using a self-join, a table is linked to itself using a table alias. A join condition is then used to match the rows from the various copies of the table.

Which join may be used to link rows from two tables so that there is a match in every row in each table?

Data from both tables is retrieved using the INNER JOIN statement, which only returns records or rows with matching values.

Which of the following joins is used to return every row from every table when the join condition is met?

When the join condition is met, the MySQL INNER JOIN is utilised to return all rows from all tables.

To know more about database  visit:-

https://brainly.com/question/3804672

#SPJ1

I need to learn c++ program . can someone please help me With this​

Answers

Answer:

sure i can help

Explanation:

What’s the work???? Or problem ?

A collection of wiress connecting the CPU with main memory that is used to identify particular location is called

Answers

Answer:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.

Explanation:

Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

What is CPU?

The electronic equipment that carries out the instructions included in a computer program is known as a central processing unit (CPU), sometimes known as a central processor, main processor, or simply processor.

The CPU executes fundamental mathematical, logical, controlling, and input/output (I/O) activities as directed by the program's instructions. In contrast, specialized processors like graphics processing units and external components like main memory and I/O circuitry (GPUs).

Although CPUs' shape, design, and implementation have evolved throughout time, their basic function has remained mostly same. The arithmetic-logic unit (ALU), which performs arithmetic and logic operations, processor registers.

Therefore, Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.

To learn more about CPU, refer to the link:

https://brainly.com/question/16254036

#SPJ5

Why is the no video recording in iPhone camera

Answers

Answer:

it really does depend on what iphone you have but go to Settings > Privacy > Camera and disable the last app that was allowed access to the phone's Camera. check the camera app again and you should see the video recording access.

hope this helped!

Answer:

Wait is this a genuine question im not sure how to answer

Explanation:

If you were to make a looping photo carousel you would select...
A both the state 'Next' and check Wrap from last to first
B check Wrap from last to first
C State 1
D the state 'Next'

Answers

To make a looping photo carousel, you would select A both the state 'Next' and check 'Wrap from last to first'. This would allow the carousel to loop continuously without stopping at the last photo.

By selecting the state 'Next', the carousel will move to the next photo in the sequence. By checking the "Wrap from last to first" option, the carousel will automatically move back to the first photo after reaching the last one, creating a continuous loop. Without this option, the carousel would stop at the last photo and not continue. Therefore, the correct answer is A both the state 'Next' and check Wrap from last to first.

Learn more about looping: https://brainly.com/question/28814421

#SPJ11

select the name, creaturetype, creaturesubtype, gender, and appearance from litcharacters for creatures who have made 5 or more appearances (this includes characters that have made 5 appearances). order ascending by the character id. what is the first entry?

Answers

I'm sorry, but as an  I don't have access to a specific database or its data. Therefore, I cannot retrieve the first entry from the "litcharacters" table as requested.

To obtain the first entry from the "litcharacters" table with the given conditions, you would need to execute a SQL query on the database that contains the table. The query would look something like this:

SELECT name, creaturetype, creaturesubtype, gender, appearance

FROM litcharacters

WHERE appearance >= 5

ORDER BY character_id ASC

LIMIT 1;

Executing this query on the appropriate database would give you the first entry from the "litcharacters" table that meets the criteria of having 5 or more appearances.

Learn more about database here

https://brainly.com/question/24027204

#SPJ11

You are in a group of five people whose small airplane crashed and
now you are stranded on a deserted tropical island for 24 hours. The
safety island is 3 miles away and can not be reached by walking.
Limited supplies from the plane have washed ashore(a flashlight, 2
bottles of water, a sheet, the tail of the plane, a bottle of perfume,
a ball of string, and a knife). Flora(plants/vegetation) and
fauna(animals) exist on the island.
1. You must use all of the supplies
2. Think of the "what if" issues: ex. How will your group
protect themselves from the animals? How can you reach
the safety island? How will your group eat? The sea
contains salt water, etc.

Answers

First and foremost, it's important to prioritize survival and safety in this situation.

What are the necessary steps?

Here are some steps that the group could take using the available supplies:

Using the knife and ball of string, construct a shelter that can protect the group from the elements and provide a place to sleep. The sheet can be used as a roof or to create walls, and the tail of the plane can be used for support.

With the flashlight and knife, explore the island to find a fresh water source. If one is not found, the group can ration the two bottles of water until they can be rescued.

Use the knife and ball of string to create weapons and tools for protection and gathering food. The perfume can be used as a deterrent for some animals.

If there is no source of fresh water on the island, the group can use the ball of string and sheet to create a solar still to purify salt water from the sea.

Finally, the group can work together to come up with a plan to safely make their way to the safety island. This may involve using the tail of the plane as a makeshift raft, or building a larger boat using materials found on the island.

To protect themselves from animals, the group can create weapons and tools using the knife and ball of string.

Learn more about word problem on;

https://brainly.com/question/21405634

#SPJ1

write a program to loop 1,2,3,4,5,....20th term using for...next statement​

Answers

Here's a program that uses the for...next statement to loop through the numbers 1 to 20:

The Python Program

for i in range(1, 21):

   print(i)

In this program, the for statement is used to iterate through the range of numbers from 1 to 20 (inclusive). The range function generates a sequence of numbers starting from the first parameter (1) and ending before the second parameter (21). Inside the loop, each number i is printed using the print function.

This program will output the numbers 1 to 20, each on a separate line.

Read more about programs here:

https://brainly.com/question/26497128

#SPJ1

Other Questions
____ uses information on all pairs of distances not merely the minimum or maximum distances A compound has a percent composition of 38.7% carbon, 9.76% hydrogen, 51.5% oxygen.Laboratory data shows that the compound's molar mass is 62.0 g/mol. What is themolecular formula of the compound? JOHN RICHARDS BORROWED $875 AGAINST HIS CHARGE ACCOUNT ON SEPTEMBER 12 AND REPAID THE LOAN ON OCTOBER 14 (32 DAYS LATER). IF THE INTEREST RATE IS 0.04273% PER DAY, HOW MUCH INTEREST DID JOHN PAY ON THE LOAN AND WHAT AMOUNT DID HE PAY THE BANK WHEN HE REPAID THE LOAN Write a four paragraph analysis of the external influences on Okonkows character. In your response, think about how Okonkows character is shaped and influenced by his father. Learning Objective: To effectively write and call overloaded methods. Instructions: Type the solution in asurite-h02.pdf. Problem: True or False? It is legal to write a method in a class which overloads another method declared in the same class. Explain. 3.15 Learning Objective: To effectively write and call overridden methods. Problem: True or False? It is legal to write a method in a superclass which overrides a method declared in a sub- class. Explain. According to scientists, what is one of the biggest threats to a manned Marsmission? If a wave moves from a medium with a high wave velocity to one with a low wave velocity, which of the following CANNOT change: frequency, amplitude, wavelength, velocity, direction Which of the following is not true regarding the natural rate of unemployment?A. The natural rate is calculated by averaging the unemployment rate over an extended time period.B. The natural rate of unemployment is 0 percent when the U.S. economy is not in a recession.C. The natural rate includes both frictional and structural unemployment.D. The natural rate of unemployment does not include cyclical unemployment. A normal good is one Multiple Choice for which its consumption varies directly with income. whose amount demanded will increase as its price increases. whose amount demanded will increase as its price decreases. whose demand curve will shift leftward as incomes rise. How has the Internet changed the news industry and the quality of news reported? Nerally speaking, if a state or local law contradicts federal law, it is more likely to be ruled unconstitutional if challenged in courts because of the __________ clause. the amount of money a consumer has left after paying for food, clothing, and shelter is referred to as: select one: a. gross income. b. discretionary income. c. defined income. d. disposable income. a nurse is reinforcing instructions to a client in the first trimester of pregnancy about measures to help with morning sickness. which would the nurse include in the instructions? select all that apply. How was the Three-Fths Compromise like the Great Compromise?O it gave states the power to determine their own populations.O it determined how states would be represented in Congress.O it became a way for norther states to gain more representationO It determined that states would have equal representation in the Senate. given xz with x(1,9) and z(5,-11) if y lies on xz such that the ratio of xy to xz 1:4, find the coordinates of y Which of the following is an expense that results from the usage of a natural resource? A. depletion B. obsolescence C. depreciation D. amortization B= 921Please type the solution. I always have hard time understanding people's handwriting. 3) An electronic company produces keyboards for the computers whose life follows a normal distribution, with mean (150 + B) months and standard deviation (20+ B) months. If we choose a hard disc at random what is the probability that its lifetime will be a. Less than 120 months? (4 Marks)b. More than 160 months? (6 Marks)c. Between 100 and 130 months? (10 Marks) Can anyone please help me with this assignment What is the probability that you would pick a blue marble and roll a 5 OR 6? Suppose you are holding a 5 percent coupon bond maturing in one year with a yield to maturity of 15 percent. If the interest rate on one-year bonds rises from 15 percent to 20 percent over the course of the year, what is the yearly return on the bond you are holding