Why isnt this code working in PyCharm?

Directions:
A social center is setting up a new mentoring program. The aim of the program is to match older
people with younger people in order to build mentor/mentee relationships. Several rooms have
been set up to serve as meeting spaces. When a person arrives at the social center, that person
is asked his name and then his age. Based on the age, that person will be directed to the
appropriate room as follows:
● Room A - Ages 10 and under and 80 and over
● Room B - Ages 11 to 20 and ages 70 to 79
● Room C - Ages 21 to 30 and ages 60 to 69
● Room D - Ages 31 to 40 and ages 50 to 59
● Room E - Ages 41 to 49

Code:

name = input("Hello! What is your name? ")
age = int(input("How old are you? "))

if age = 80:
print("Welcome " + name + ", you will be going to Room A")
elif (age > 11 or age 70 or age 21 and age = 60 or age <= 69):
print("Welcome " + name + ", you will be going to Room C")

Answers

Answer 1

In python:

name = input("Hello! What is your name? ")

age = int(input("How old are you? "))

if age <= 10 or age >= 80:

   print(f"Welcome {name}, you will be going to room A")

elif 11 <= age <= 20 or 70 <= age <= 79:

   print(f"Welcome {name}, you will be going to room B")

elif 21 <= age <= 30 or 60 <= age <= 69:

   print(f"Welcome {name}, you will be going to room C")

elif 31 <= age <= 40 or 50 <= age <= 59:

   print(f"Welcome {name}, you will be going to room D")

elif 41 <= age <= 49:

   print(f"Welcome {name}, you will be going to room E")

I hope this helps!


Related Questions

Which of the following of blockchain security features is NOT related to cryptography? Tamper resistance of the shared chain Decentralized consensus Integrity of orders and contents of blocks Encryption of block data on the chain

Answers

Decentralized consensus is the blockchain security feature that is NOT directly related to cryptography.

While cryptography plays a crucial role in ensuring the security of blockchain systems, decentralized consensus refers to the mechanism by which multiple participants in the network agree on the validity of transactions and the order in which they are added to the blockchain. It involves the use of consensus algorithms, such as Proof of Work (PoW) or Proof of Stake (PoS), to achieve agreement among participants. While cryptography is used to secure the data and maintain the integrity of transactions and blocks, decentralized consensus focuses on the agreement process and the distributed nature of decision-making in the blockchain network.

To know more about blockchain click the link below:

brainly.com/question/31236833

#SPJ11

________ means that IT capacity can be easily scaled up or down as needed,which essentially requires cloud computing. A) agility B) flexibility C) responsiveness D) IT consumerization

Answers

Answer:

C

Explanation:

ITEMS
Evan spent 25% of his money on rent and g on food, together his
expenses totaled to $75.00. Calculate the total amount of money Evan had​

Answers

Answer:

Total money he had = $136 (Approx.)

Explanation:

Given:

Spend on rent = 25%

Spend on food = 30%

Total of expenses = $75

Find:

Total money he had

Computation:

Total money he had = [Total of expenses][100/ (Spend on rent + Spend on food)]

Total money he had = [75][100/ (25 + 30)]

Total money he had = [75][100/ (55)]

Total money he had = 136.36

Total money he had = $136 (Approx.)

Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<

Answers

Answer:

1. Software de aplicación: Microsoft Word.

2. Software de diagnóstico: Speccy.

3. Software de sistema: Windows operating system (OS).

Explanation:

Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.

Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;

1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.

Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.

2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.

Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.

3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.

Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.

What should I watch on Netflix (shows for a 14 year old) ?

Answers

Answer:

The flash

Explanation:

Answer:

Im not a big horse fan but loved this show its called free rein

Explanation:

loved itttttt!

what are the three sections required for a for loop? initialization, condition, iteration initialization, compare, iteration initialization, condition, expression begin, compare, update

Answers

A: initialization, condition, iteration are the three sections required for 'for loop'.

'For loop' is a programming language conditional iterative statement that is used to check for a certain condition and then repeatedly executes a block of code as long as the specified condition remains true. The 'for loop' has three sections:

Initialization: initialization specifies the beginning of the 'for loop'.Condition: the condition is also called the end value. The condition is checked each time after the body of the 'for loop' is executed. Based on the condition specified, it is decided if the body of the 'for loop' continues to execute or terminate. Iteration: it defines a value that with every loop execution either increments or decrements.

You can learn more about 'for loop' at

https://brainly.com/question/19706610

#SPJ4

Complete the sentence.
A computer consists of two or more computers connected to each other.


network
switch
server
router

Answers

Answer:

its a network

Explanation:

that is how it is called

An expert system used on a medical website accepts an input illness from the user and produces a list of possible symptoms. What type of function is the interface engine performing?
A.
backward chaining
B.
production unit
C.
production rule
D.
forward chaining
E.
knowledge base

Answers

The answer is froward chaining

Answer:

The correct answer would be:

D.

forward chaining

#PLATOFAM

Have a nice day!

What is the shortcut key for opening a new tab in a web browser.

Answers

Crtl + T is the answer

you have an error in your sql syntax; check the manual that corresponds to your mysql server version for the right syntax to use near

Answers

A simple grocery list, a photo gallery, or the enormous volume of data on a business network might all be examples. You require a database management system like MySQL Server in order to add, access, and process data kept in a computer database.

What is the error in MySQL syntax?

Depending on the most likely reason of the MySQL 1064 problem, there are five different approaches you can try: retype commands that were mistyped, replacing outdated commands, Include missing data, designate reserved words, In compatibility mode, move WordPress databases.

Any time there is a problem with your SQL syntax, such as employing reserved terms, missing data in the database, or incorrectly typed/outdated commands, you will see the 1064 error.

There are two primary reasons and fixes for the issue "MySQL server has disappeared": Due to server timeout, the connection was cut off. Check to see if the wait timeout mysql variable in your my.cnf configuration file is large enough to handle your workload, for example wait

timeout = 28800. By replacing the semicolon with a colon, you may fix this incorrect syntax in Python.

To learn more about MySQL refer to :

https://brainly.com/question/17005467

#SPJ4

Which of the following statements is true?

A. A Multi-AZ setup is aimed at fault tolerance, while a read replica setup is aimed at scalability.

B. Both read replicas and Multi-AZ configurations are aimed at fault tolerance.

C. A Multi-AZ setup is aimed at scalability, while a read replica setup is aimed at fault tolerance.

D. Both read replicas and Multi-AZ configurations are aimed at scalability.

Answers

The correct statement is A. A Multi-AZ setup is aimed at fault tolerance, while a read replica setup is aimed at scalability. Therefore, a Multi-AZ setup focuses on fault tolerance by providing automatic failover, while a read replica setup focuses on scalability by offloading read traffic.

In Amazon Web Services (AWS), a Multi-AZ setup involves replicating your primary database to a standby instance in a different Availability Zone (AZ). This provides high availability and fault tolerance by automatically failing over to the standby instance in case of a failure in the primary instance.

On the other hand, a read replica setup involves creating one or more copies of your database to offload read traffic from the primary instance. Read replicas are asynchronous replicas that can be used for scaling read-intensive workloads. They do not provide automatic failover or high availability.

To know more about tolerance visit:

https://brainly.com/question/30478622

#SPJ11

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

whats your fav subject

Answers

Answer:

Computers

Explanation:

Thats why I'm looking thru new on this subject

Answer:

Science

but its fun oh and drama and art what about you

Consider the following scenarios.
Scenario 1: Raymond communicates with the computer by typing specific commands
to get some tasks done.
Scenario 2: Mary communicates with the computer by using the mouse to click on a
picture on the screen representing the task she wants to do.
Scenario 3: The cashier communicates with the computer by touching pictures on the
screen representing items being sold in the store.
(i) Identify the type of user interface indicated in
Scenario 1:
Scenario 2:
(ii)
Scenario 3:
Name the type of software which provides the user interface.
****************************
(iii) State the scenario number which indicates a hardware interface.
(3 marks)
(1 mark)
(1 mark)
Total 10 marks

Answers

Answer:

Explanatio(i)

Scenario 1: Command Line Interface (CLI)

Scenario 2: Graphical User Interface (GUI)

Scenario 3: Touchscreen Interface (TSI)

(ii)

The type of software which provides the user interface varies for each scenario:

Scenario 1: Command-line shell or Terminal Emulator

Scenario 2: Window Manager and Desktop Environment

Scenario 3: Point of Sale (POS) Software

(iii)

There is no scenario that indicates a hardware interface. The scenarios describe different types of user interfaces, which are software-based, rather than hardware-based.

which search engine is used as a search engine for every web browser? Give two web browser name and describe them which search engine they use. And why?

Answers

That's Go.ogle.

Two famous web browsers present are

Ch romeMo zila Firefox.

Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.

Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage

Answer:

go..ogle & Micr...osoft ed;.ge

Explanation:

i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......

which peripheral requires a video card? Monitor keyboard touchpad

Answers

Answer: touchpad

Explanation:

Which of the following is true regarding computer science?
O Jobs in this field are limited.
OIt only involves writing code.
OIt involves more than just writing code.
O Only a programmer can work in this field.

Answers

The true statement regarding computer science is -  "It involves more than just writing code."  (Option c)

 How   is this so?

Computer science is a multidisciplinary field that encompasses various areas such as algorithms,   data structures,software development, artificial intelligence, cybersecurity, computer networks, and more.

While coding is a fundamental aspect,computer science involves problem-solving, analysis, design,   theoretical understanding, and application of computing principles.

It offers a wide range   of career opportunities beyond programming, including research,system analysis, data science, and technology management.

Learn more about computer science at:

https://brainly.com/question/20837448

#SPJ1

Visit a shoot location for any video or film and observe the ongoing activities. Based on your observation, answer the following questions. If you’re unable to visit an actual shoot location, you can perform online or offline resources to answer the questions below.

What was the approximate size of the crew on the shoot? (Alternatively, what is the average crew size on a film shoot?)
What is the role of the director?
What is the role of a cameraman or cinematographer?
What is the role of the light technicians and assistants?
What does the makeup man do?
Was there a stylist on the shoot? What did he or she do?

Answers

Finding actual sites to act as the imaginary locations mentioned in a film's screenplay is known as location scouting. The correct setting aids the story and contributes to the creation of a believable world in films.

What does filming on location entail?

Location filming is simply shooting outside of a studio in the actual location where the story takes place. A soundstage is a space or building that is soundproof and utilized for the creation of movies and television shows.

How can I locate my shooting location?

For assistance, get in touch with the film commission or your local government office. They can aid in locating potential shooting sites for your movie. For a list of locations that are offered to filmmakers, you may also check out location-scouting websites.

to know more about shooting here:

brainly.com/question/10922117

#SPJ1

what are some technologies that professional coders use to be better at their job

please list at least 5

Answers

Answer:

Software application developer.

Web developer.

Computer systems engineer.

Database administrator.

Computer systems analyst.

Software quality assurance (QA) engineer.

Business intelligence analyst.

Computer programmer.

Explanation:

Software application developer.

Web developer.

Computer systems engineer.

Database administrator.

Computer systems analyst.

Software quality assurance (QA) engineer.

Business intelligence analyst.

Computer programmer.

C++

Javascript

Coding Training Courses

Who was the 1st person to use the term television

Answers

Answer: Constantin Perskyi

Explanation:

Java Programming:Objective: Design, implement, and use classes and objects with inheritance (including overriding methods)This discussion is intended to accompany project 4, which will be published next week. You will create a class for a zoo animal that implements the following iAnimal interface:public interface iAnimal {public String getAnimalType();public int getIdTag();public void setIdTag(int anIdTag);public int getMinTemperature();public int getMaxTemperature();}Create a class that implements the interface listed above for an animal type that begins with the same letter as your last name. For example, my last name begins with M, so I might create a Mongoose class. Your class must implement the interface and it must compile. If you cannot find an animal that begins with the same letter as your last name, you can choose an animal type that begins with the same letter as your first name.Implementation Requirements For Your Class:getAnimalType: This should return the type of animal. For example, for my Mongoose class, the animal type will be directly set to "Mongoose" in the code, which would be returned by this method. You must not get this information from the user, so you should not include a mutator method to set the animal type value.getIdTag and setIdTag: These can be standard mutator and accessor methods without any validation to get and set the animal's id number.getMinTemperature and getMaxTemperature: These methods should return the minimum and maximum temperatures for the animal's enclosure, but you must not get this information from the user, so you should not include a mutator method to set these values. Instead, set these values directly in your code according to the appropriate temperature range for your animal's environment. You can find this information online, such as from wikipedia or from an Animal Care Manual.

Answers

I have created a Java class called "Lion" that implements the iAnimal interface. The Lion class has the necessary methods to fulfill the requirements of the interface, such as getAnimalType, getIdTag, setIdTag, getMinTemperature, and getMaxTemperature.

How does the getAnimalType method work in the Lion class?

In the Lion class, the getAnimalType method simply returns the animal type as a string, which is set to "Lion" in the code. Since the animal type should not be obtained from the user, there is no need for a mutator method to set the animal type value. Instead, it is directly assigned within the class implementation.

The getAnimalType method is a simple accessor method that returns the animal type. In this case, it returns "Lion". This method provides a way to retrieve the animal type without exposing or modifying the internal state of the Lion object.

Learn more about getAnimalType

brainly.com/question/29588134

#SPJ11

Please answer these questions! Will mark Brainliest!!

Please answer these questions! Will mark Brainliest!!

Answers

Answer:

1) bob behnken and doug hurley

2)yes

3) august

Recommend a minimum of 3 relevant tips for people using computers at home, work or school or on their SmartPhone. (or manufacturing related tools)

Answers

The three relevant tips for individuals using computers at home, work, school, or on their smartphones are ensure regular data backup, practice strong cybersecurity habits, and maintain good ergonomics.

1)Ensure Regular Data Backup: It is crucial to regularly back up important data to prevent loss in case of hardware failure, accidental deletion, or malware attacks.

Utilize external hard drives, cloud storage solutions, or backup software to create redundant copies of essential files.

Automated backup systems can simplify this process and provide peace of mind.

2)Practice Strong Cybersecurity Habits: Protecting personal information and devices from cyber threats is essential.

Use strong, unique passwords for each online account, enable two-factor authentication when available, and regularly update software and operating systems to patch security vulnerabilities.

Be cautious while clicking on email attachments, downloading files, or visiting suspicious websites.

Utilize reputable antivirus and anti-malware software to protect against potential threats.

3)Maintain Good Ergonomics: Spending extended periods in front of a computer or smartphone can strain the body.

Practice good ergonomics by ensuring proper posture, positioning the monitor at eye level, using an ergonomic keyboard and mouse, and taking regular breaks to stretch and rest your eyes.

Adjust chair height, desk setup, and screen brightness to reduce the risk of musculoskeletal problems and eye strain.

For more questions on computers

https://brainly.com/question/24540334

#SPJ8

which of these exemplifies an iterative process
A: you walk to school everyday with a friend
B: you do homework at a different time each day
C: sometimes you eat breakfast at school and something you eat at home
D: you write a research paper, review it, revise it, review it again, revise it again

Answers

Answer:

its D

Explanation:

took the test

Answer:

d

Explanation:

What type of security camera provides the ability to maintain a degree of secrecy by using illumination that is outside of the visible light spectrum?

Answers

The type of security camera that provides the ability to maintain a degree of secrecy by using illumination that is outside of the visible light spectrum is an "infrared (IR) camera."

Infrared cameras are equipped with infrared sensors that can detect and capture images using infr-ared light. Infrared light is beyond the range of human vision, making it invisible to the nak-ed eye. These cameras emit infrared light or utilize existing sources of infrared radiation to illuminate the scene. The captured images or video appear in shades of gray or monochrome, allowing for discreet surveillance in low-light or nighttime conditions without alerting individuals being monitored.

You can learn more about Infrared cameras at

https://brainly.com/question/31897696

#SPJ11

please help me out with answering the questions

please help me out with answering the questions

Answers

10.

if "h" in letter:

   #do something

11.

if value >= 13.6:

   #do something

12.

if 5 < y < 11:

   #do something

13.

if num1 == num2:

   print("equal")

14.

num1 = int(input("Enter a number: "))

num2 = int(input("Enter a number: "))

if num1 > num2:

   print(num1)

else:

   print(num2)

15.

if number == 89 or number == 78:

   print("Your number is equal to 89 or 78")

I hope this helps! If you have any other questions, I'll do my best to answer them.

hiiiiiiiiihwdawdfgthnythgrfergthyjuhgfd

Answers

Answer:

Your answer would be gas.

Explanation:

Steam is just water just evaporated.

no i will not marry u

targeted study that readies you for a specific application of knowledge

Answers

Targeted study refers to focused learning that prepares individuals for a specific application of knowledge by tailoring their efforts towards acquiring expertise, skills, and practical experience directly relevant to their desired field or profession.

What is targeted study and how does it prepare individuals for a specific application of knowledge?

A targeted study refers to a focused approach to learning that prepares individuals for a specific application of knowledge. It involves concentrating efforts on acquiring expertise and skills relevant to a particular field, industry, or profession.

When pursuing targeted study, individuals identify their specific goals and tailor their learning activities accordingly. This may involve selecting relevant courses, workshops, certifications, or specialized training programs that directly align with the desired application of knowledge.

The advantage of targeted study is that it allows individuals to acquire in-depth knowledge and skills in a specific area, enhancing their proficiency and competitiveness within their chosen field. By focusing on the specific application of knowledge, individuals can develop a specialized skill set that meets the requirements of a particular industry or job role.

Targeted study enables individuals to gain practical experience, theoretical knowledge, and problem-solving abilities that are directly applicable to their desired field. It provides a more efficient and directed learning path, allowing individuals to make significant progress in a shorter timeframes compared to a more generalized approach to learning.

Ultimately, targeted study increases the readiness and effectiveness of individuals in applying their knowledge to a specific context, increasing their prospects for success in their chosen field or application.

Learn more about knowledge

brainly.com/question/28025185

#SPJ11

I NEED HELP WITH MY HOMEWORK! PLEASE!! It's Cybersecurity though... 50 POINTS... because that's the most I can give

I NEED HELP WITH MY HOMEWORK! PLEASE!! It's Cybersecurity though... 50 POINTS... because that's the most
I NEED HELP WITH MY HOMEWORK! PLEASE!! It's Cybersecurity though... 50 POINTS... because that's the most
I NEED HELP WITH MY HOMEWORK! PLEASE!! It's Cybersecurity though... 50 POINTS... because that's the most
I NEED HELP WITH MY HOMEWORK! PLEASE!! It's Cybersecurity though... 50 POINTS... because that's the most

Answers

Answer:

Search the answer.

Explanation:

Determine the correct direction. For the vector (2, 6, -1), the negative one represents movement .

Answers

The unit vector of the vector (2, 6, -1) is obtained by dividing the vector by its magnitude, and it indicates the direction the vector (2, 6, -1) denotes.

How do you choose a course of action?

When the sun rises in the east, the north will be to your left and the south to your right. North and South are on each side of you while you are facing west and the sun is setting.

What way does the line follow?

In visual arts, the terms "line direction" refer to either a horizontal, vertical, or diagonal line. A line can be curved as well as straight. When discussing line direction in art, it's critical to understand that every line has some kind of direction.

To know more about diagonal line visit:-

https://brainly.com/question/16188625

#SPJ1

Answer:

Away from the user.

Explanation:

Other Questions
T or F: Inhibitory postsynaptic potentials (IPSPs) are associated with membrane depolarization, whereas excitatory postsynaptic potentials (EPSPs) are associated with hyperpolarization plz help i have NO clue what this is After myocardial infarction, serum glucose levels and free fatty acids are both increased. What type of physiologic changes are these?A) electrophysiologicB) HematologicC) MechanicalD) Metabolic changes in sea level alternately flood and expose the edges of continents. what is the primary control on sea-level changes (Annuity payments) Calvin Johnson has a $4,500 debt balance on his Visa card that charges 11.9 percent APR compounded monthly. In 2009, Calvin's minimum monthly payment is 3 percent of his debt balance, which is $135. How many months (round up) will it take Calvin Johnson to pay off his credit card if he pays the current minimum payment of $135 at the end of each month? In 2010, as the result of a federal mandate, the minimum monthly payment on credit cards rose to 4 percent. If Calvin made monthly payments of $180 at the end of each month, how long would it take to pay off his credit card? a. If Calvin made monthly payments of $135 at the end of each month, how long would it take to pay off his credit card? months (Round up to the nearest unit.) Prove by definition that {(x,y,z)| x +2-6z=0} is a C surface. America the Not-So-Beautifulby Andrew A. Rooney How does the author use loaded language to convey his point of view about throwing things away? Cite examples from the text. A The author uses loaded language when he says, Some of the things we're throwing away are poisoning the Earth and will eventually poison all of us and all living things,B T\he author says that because the United States is prosperous, or has an abundance of things we want and need, that we make more waste. True or false? A system must contain more than one object. explain why there is a mismatch between risk perception and risk realities with regard to flying. what was the consequence of this misunderstanding immediately post 9/11 during the holiday travel season? What concerns about the Cold War does Kennedy express in his speech? what happens when y=X becomes y=4x 1.28 Reading the paper. Below are excerpts from two articles published in the NY Times:(a) An article titled Risks: Smokers Found More Prone to Dementia states the following:25Researchers analyzed data from 23,123 health plan members who participated in a voluntary exam andhealth behavior survey from 1978 to 1985, when they were 50-60 years old. 23 years later, about 25% ofthe group had dementia, including 1,136 with Alzheimers disease and 416 with vascular dementia. Afteradjusting for other factors, the researchers concluded that pack-a-day smokers were 37% more likely thannonsmokers to develop dementia, and the risks went up with increased smoking; 44% for one to two packsa day; and twice the risk for more than two packs.Based on this study, can we conclude that smoking causes dementia later in life? Explain your reasoning.(b) Another article titled The School Bully Is Sleepy states the following:26The University of Michigan study, collected survey data from parents on each childs sleep habits andasked both parents and teachers to assess behavioral concerns. About a third of the students studied wereidentified by parents or teachers as having problems with disruptive behavior or bullying. The researchersfound that children who had behavioral issues and those who were identified as bullies were twice as likelyto have shown symptoms of sleep disorders.A friend of yours who read the article says, The study shows that sleep disorders lead to bullying inschool children. Is this statement justified? If not, how best can you describe the conclusion that canbe drawn from this study? Topic: Europe and Religious Freedom Discussion prompt: In 2004, France banned the wearing of headscarves, while a referendum at the end of 2009 resulted in a ban on minarets in Switzerland. Learn more about these developments and discuss them in the context of freedom of religion. In myosin, kinesin, and dynein molecular motors, the core domains are attached to extended structures. Which of the following is NOT a function of these extended structures?a. They link the core domains to one another or to other structures. b. They link the core domains to one another or to other structures.c. They serve as "channels" conducting the NTPs to the core domains. Correct. Channeling of NTPs is not a function of the extended structures. d. They are rigid and contain regions for interacting with other proteins. Which answer best explains the choice of materials used in this coffeemaker?A. Metal is used for the burner below the pot to slow the transfer of thermal energy, because its electrons move freely.B. Metal is used for the burner below the pot to speed the transfer of thermal energy, because its electrons do not move freely.C. Plastic is used for the handle to slow the transfer of thermal energy, because its electrons do not move freely.D. Plastic is used for the handle to speed the transfer of thermalenergy, because its electrons do not move freely. In an informational piece, what should your purpose be? Select the two correct answers. (20 points)to convince to explain to inform to persuade to entertain Aneesha travels at a rate of 50 miles per hour. Morris is traveling 3 feet per second less than Aneesha. Which is the best estimate of the speed Morris is traveling? algebra Which of the following presentations would best be organized using a spatial pattern?Video Games and Super MarioThe Douglas Fir and Other Evergreen TreesGreat Places to Visit in FloridaThe History of the Computer QuestionAsIn the third paragraph of the passage C, which sentence best shows that Katherine Johnson washeld in high regard while she worked at NASA?Select the correct text in the passage.HolaIn 1953, Johnson began working for what would become NASA. As a human computer, shecalculated the path of space flight for Alan Shepard, the first American to travel into space.Even after NASA began using electronic computers, astronauts continued to rely onJohnson's work. John Glenn, the first American to orbit Earth, requested that Johnsonpersonally recheck the electronic calculations for his historic flight on Friendship 7. Hercalculations were just as critical to the success of the Apollo moon landing program and thestart of NASA's space shuttle program. After she retired from NASA, Johnson's workcontinued to be celebrated. In 2015, President Barack Obama honored her with the nation'shighest civilian award, the Presidential Medal of Freedom. Casey's compensation includes health and dental insurance. This part of her compensation is considered ________.A: base payB: a wage and salary add-onC: incentive payD: benefitsE: profit sharing