Write a program that asks the user to enter ten temperatures and then finds the sum. The input temperatures should allow for decimal values. Sample Run Enter Temperature: 27.6 Enter Temperature: 29.5 Enter Temperature: 35 Enter Temperature: 45.5 Enter Temperature: 54 Enter Temperature: 64.4 Enter Temperature: 69 Enter Temperature: 68 Enter Temperature: 61.3 Enter Temperature: 50 Sum = 504.3

Answers

Answer 1

Answer:

#include <iostream>

#include <conio.h>

using namespace std;

main()

{

float temp[10], sum;

sum=0;

for (int i=1 ; i<= 10; i++)

{

cout<<"Enter the temperature in Decimal for temp"<<i<<"=";

cin>>temp[i];

}

for (int j=1 ; j<=10 ; j++)

{

sum = sum+temp[i];

}

cout<< "/nThe Total Temperature ="<<sum;

getch();

}

Explanation:

In this program we can take values of temperature in decimal values by taking the data type of temp variable as float. Array is used to enter the ten temperature values. Sum variable is used to add all the values.

Answer 2

The code example provided is a Python program that prompts the user to enter ten temperatures, validates the input as decimal values, accumulates the sum, and then prints out the total sum.

To write a program that asks the user to enter ten temperatures and then finds the sum, you would need a loop that runs ten times, prompting the user to input a temperature on each iteration. The program should allow for decimal values to be entered. Below is an example of how this can be implemented in Python:

sum_temperatures = 0
for i in range(10):
   while True:
       try:
           temp = float(input('Enter Temperature: '))
           sum_temperatures += temp
           break
       except ValueError:
           print('Please enter a valid temperature.')

Related Questions

A home user is looking for an ISP connection that provides high speed digital transmission over regular phone lines. What ISP connection type should be used?

Answers

Answer:

DSL

Explanation:

Digital subscriber line (DSL) is a family of technologies used for fast digital data transfer over telephone lines. DSL is widely known in telecommunications marketing as meaning asymmetric digital subscriber cable, Internet access is the most frequently deployed DSL infrastructure.

Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in the ad auction. What change to Brenda's ad might improve the Ad Rank?

Answers

Answer:

use Search terms as keywords

Explanation:

Based on the information provided within the question it can be said that one of the best ways that Brenda can improve her Ad Rank would be to use Search terms as keywords. Using terms that are searched extremely frequently by the world drastically increases the amount of visitors that your ad can receive and thus boosts your Ad Rank.

Arpanet was developed by the united states so that there was a communication network that would survive a nuclear war. True or False

Answers

Answer:

False

Explanation:

The Advanced Research Projects Agency (ARPA), an arm of the U.S. Defense Department, funded the development of the Advanced Research Projects Agency Network (ARPANET) in the late 1960s. Its initial purpose was to link computers at Pentagon-funded research institutions over telephone lines.

Answer:

the miltary

Explanation:

edge 2022

Something is wrong with the logic in the program above. For which values of time will the greeting "Good Morning!" be displayed? var time = promptNum("What hour is it (on a 24 hour clock)?"); var greeting = ""; if (time < 6) { greeting = "It is too early!"; } else if (time < 20) { greeting = "Good Day!"; } else if (time < 10) { greeting = "Good Morning!"; } else { greeting = "Good Evening!"; } console.log(greeting);

Answers

Answer:

There is logic problem in condition of elseif statement that is (time<20).

Explanation:

elseif(time<20) will be true for time<10 that means program will never greet good morning as to make logic correct either change condition from elseif(time<20) to elseif(time<20&& time>=10). Or change the order of condition like check first for elseif(time<10)

solution 1

if (time < 6) { greeting = "It is too early!"; }

else if (time < 20 && time>=10) { greeting = "Good Day!"; }

else if (time < 10) { greeting = "Good Morning!"; }

else { greeting = "Good Evening!"; }

console.log(greeting);

solution 2

if (time < 6) { greeting = "It is too early!"; }

else if (time < 10) { greeting = "Good Morning!"; }

else if (time < 20 ) { greeting = "Good Day!"; }

else { greeting = "Good Evening!"; }

console.log(greeting);

The ____________ deals with the well-being of the EMT, career progression, and EMT compensation. Select one: A. EMS administrator or chief B. local public health department C. office of the medical director D. human resources department

Answers

Answer:

The correct answer to the following question will be Option D (Human Resources Department).

Explanation:

The HR department of the company shall be responsible for managing human capital, monitoring different aspects of jobs, such as complying with employment law and labor standards, administering benefits of the employee, arranging personnel files with the documents required for future referenceThe Human Resources Division is concerned with some well-being of the EMT, career advancement and benefits of EMT.

The remaining three choices aren't in the right place because they haven't been too worried about the EMT and its rewards.

Therefore, Option D is the right answer.

Which part of the Office interface is located across the top of the application window and organizes common features and commands into tabs.

Answers

Answer:

The correct answer to the following question will be "Ribbon".

Explanation:

In the configuration of the computer interface, the ribbon is indeed a graphical controlling feature in the format of a series of toolbars mounted on several tabs. The standard ribbon layout requires large toolbars, loaded with graphical keys, tabbed as well as other visual control features, organized by feature.The aim of the ribbon should be to provide quick and easy access to widely used activities for each system. The ribbon is therefore tailored for each task and includes program-specific commands. Besides, the top of a ribbon contains multiple tabs that can be used to disclose various groups of commandments.

Therefore, Ribbon it the suitable answer.

The information gathering technique that enables the analyst to collect facts and opinions from a wide range of geographically dispersed people quickly and with the least expense is the___________.

a. document analysis
b. interview
c. JAD session
d. observation
e. questionnaire

Answers

Answer:

E. Questionnaire.

Explanation:

Information gathering is a technique or mechanism for collecting a large data for data analysis.

Questionnaires are paper documents with a well-thought list of questions meant for a large group of people to answer individually. They are faster and cheaper to implement.

Document analysis requires for an acquired document to be assessed or graded for analysis. Interviews are established between the information seeker and individuals directly. Observation is a long process of monitoring a sampled group for data collection. The JAD is a more complicated and effective way of data collection, it requires collection of data from different perspectives and locations. It is time consuming and expensive.

________ is when several processes on a computer system are distributed across different processors and executed simultaneously, generally to speed up processing.

Answers

Answer:

Parallel processing

Explanation:

Parallel processing also known as parallel computing is a computing process which involve breaking up and distribution of program task so as to run on several processors which are then executed simultaneously in order to enable the process come to completion in lesser time, and this can be only accomplish on system with two or more processors.

You have been asked to implement file-level system security on your Microsoft-based network. What method will you use to accomplish this?

Answers

Answer:

Access Control Lists

Explanation:

Access Control Lists are network traffic filters that can control incoming or outgoing traffic that is hat watches it and compares it with a set of defined statements to either permit the data to flow or prohibit it.

ACLs are used on Microsoft-based networks to achieve file level system security because they provide protection on high speed interfaces and they are not complex.

Consider the following statements about folders and your integrated development environment (IDE):_________
I. Hierarchical folders help to organize a project.
II. Folders are a way to visualize the layout of a file system.
III. Folders make it impossible to lose or accidentally delete a file.
Which statements are correct?

Answers

Answer:

Option I and II are correct options.

Explanation:

In the following statement, Option I and Option II are correct because folders and the user's IDE that folders which are hierarchical and also helps to organize the programmer's project. Folders are the method of visualizing a file system structure.  

Option III is incorrect because folders are possibly lost or delete files and their content.

Write multiple if statements. If car_year is 1969 or earlier, print "Few safety features." If 1970 or later, print "Probably has seat belts." If 1990 or later, print "Probably has antilock brakes." If 2000 or later, print "Probably has airbags." End each phrase with a period and a newline. Sample output for input: 1995 Probably has seat belts. Probably has antilock brakes.

Answers

Answer:

import java.util.Scanner;

public class Hggg {

       public static void main (String [] args) {

           System.out.println("Enter the car make year");

           Scanner in = new Scanner(System.in);

           int car_year = in.nextInt();

           if (car_year<1969){

            System.out.println("Few safety features.");

           }

           else if (car_year>=1970 && car_year<1990){

               System.out.println("Probably has seat belts.");

           }

           else if (car_year>=1990 && car_year<2000){

               System.out.println("Probably has seat belts.");

               System.out.println("Probably has antilock brakes.");

           }

           else if (car_year>=2000){

               System.out.println("Probably has seat belts.");

               System.out.println("Probably has antilock brakes.");

               System.out.println("Probably has airbags.");

           }

       }

   }

Explanation:

In this solution, multiple if statements have been used to accomplish each step. Observe that there are more than one print statements when year is greater than 1990 because the condition applied to year greater than 1970 holds true for every year greater than 1970 (1990, 2000 etc)

Which of the following refers to applications and technologies that are used to gather, provide access to, and analyze data and information to support decision-making efforts?

Answers

Answer:

Business Intelligence

Explanation:

Business Intelligence  refers to the processes or technologies which are used to collect, analyse and present data and business information. The main goal of BI is to take cost effective and productive business decisions, making the decision making process efficient and better. It is the set of services that transform the data into useful information.The information gathered using this technology can be accessed quickly which helps to make fast business decisions. The organized data can be used to generate reports from the data quickly  and it is easy to find or detect the flaws or certain areas that require attention . BI provides timely and information and dashboards to assess whether the business goals are being achieved.BI also provides with automatic and predictive data analysis methods that helps the decision makers to make productive business decisions.

Explain the significance of the loss of direct, hands-on access to business data that end users experienced with the advent of computerized data repositories.

Answers

Final answer:

The shift to computerized data repositories reduced direct access to business data, leading to efficiency gains but also risks such as system failures and data breaches. Dependence on technology has widened the digital divide and had societal impacts such as job loss.

Explanation:

The emergence of computerized data repositories marked a significant shift in the way end users interacted with business data. With computerization, direct, hands-on access to data decreased, which led to a reliance on digital systems to process and interpret information. This transformation has had profound impacts on businesses and employees. In the era before widespread computer use, businesses used tools like the Farmer's Almanac and Weather Bureau data; by contrast, today's business decisions are informed by data from global positioning systems, historical rainfall patterns, and other complex services.

The move away from direct data interaction meant that businesses became more efficient at data analysis and decision-making but also became dependent on technology. This dependence carries risks like system failures, data breaches, and the loss of personal data privacy. Furthermore, the digital divide has widened as technology becomes more central to operations. The societal and economic changes accompanying technological shifts, such as automations in manufacturing and mining, have profound repercussions, including job losses and the restructuring of whole communities.

Final answer:

The loss of direct, hands-on access to business data that end users experienced with the advent of computerized data repositories has both advantages and disadvantages. While physical access allows for manual verification and manipulation of data, computerized data repositories provide efficient storage, organization, and accessibility of data.

Explanation:

The significance of the loss of direct, hands-on access to business data that end users experienced with the advent of computerized data repositories is that it has both advantages and disadvantages. While computerized data repositories provide efficient storage, organization, and accessibility of data, end users lost the ability to physically interact with the data. This loss of physical access can affect the ability to manually verify and manipulate information, potentially leading to errors or limitations in data analysis.

For example, in the past, end users might have been able to physically hold and review paper documents, allowing them to manually check for any discrepancies or inconsistencies. With computerized data repositories, end users typically only have digital access to the data, which limits their ability to perform hands-on verification.

However, the advantages of computerized data repositories often outweigh the disadvantages. These repositories provide fast and efficient access to vast amounts of data, enabling end users to analyze and make informed decisions more quickly. They also offer features like searchability, data security, and data backups that can enhance data management and protection.

A BufferedReader has a constructor that takes a single InputStreamReader parameter. InputStreamReader has a constructor that takes a single InputStream parameter. Suppose there is a class Widget InputStream that is a subclass of InputStream and suppose there is a variable, wis, that refers to a Widget InputStream object. Write an expression whose value is a reference to a newly created BufferedReader that is based on the WidgetInputStream object wis refers to.

Answers

Final answer:

To create a BufferedReader based on a WidgetInputStream object, you would use the expression 'new BufferedReader(new InputStreamReader(wis))', which chains the streams together.

Explanation:

The question asks how to create a BufferedReader that is based on an existing WidgetInputStream object. The WidgetInputStream is a subclass of InputStream, meaning it can be passed to the constructor of an InputStreamReader, which in turn can be used to create a new BufferedReader.

The expression to create the BufferedReader based on the WidgetInputStream object referred to by wis is:

new BufferedReader(new InputStreamReader(wis))

This will wrap the WidgetInputStream in an InputStreamReader, and then wrap that in a BufferedReader, effectively chaining these streams for efficient reading of characters, arrays, and lines.

Marisol is using a software program to perform statistical tests on her experimental data to determine if her hypothesis is supported. With respect to the steps of the scientific method, Marisol is:

Answers

Answer: Drawing conclusion

Explanation:

Marisol must have been using a software program to analyze his data and draw conclusions through his analysis. This is done by organizing the data, simplify it so that it can be easily understood.

Marisol could also make use of some tools like graphs, drawing a charts(s), determining mean median mode, variance, etc as required by his experiment.

What will be the value of x after the following code is executed? int x = 10; do { x *= 20; } while (x < 5); A. 10 B. 200 C. This is an infinite loop. D. The loop will not be executed, the initial value of x > 5.

Answers

Answer:

Option B is the correct answer.

Explanation:

In the above code, the loop will execute only one time because the loop condition is false and it is the Do-While loop and the property of the Do-while loop is to execute on a single time if the loop condition is false.Then the statement "x*=20;" will execute one and gives the result 200 for x variable because this statement means "x=x*20".SO the 200 is the answer for the X variable which is described above and it is stated from option B. Hence it is the correct option while the other is not because--Option A states that the value is 10 but the value is 200.Option C states that this is an infinite loop but the loop is executed one time.Option D states that the loop will not be executed but the loop is executed one time

which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?

Answers

Answer:

Operating System

Explanation:

Operating System is a software program which acts as an mediator between computer hardware and user program applications and allows interaction between the user and computer/hardware. OS is used to manage both the hardware and software related tasks. OS is used to manage memory. It allocates  memory to various processes and manages the primary memory by monitoring what portion of it is in use and what portion is not in usage.OS is used to manage processes by allocating and deallocating resources to processes which is also called process scheduling.It also provide security by preventing unauthorized access to data and computer. This is done via passwords which identify who is authorized to use a computer programs or manipulate data.Operating system also communicates with hardware devices via device drivers and also monitors the devices through I/O controller.OS allows communication between user and computer. User cannot understand computer language therefore assemblers, compilers, interpreters are provided by the OS to the user to interact with computer and computer programs.OS also controls and manages file system, it checks the status of the files, manages the directories and files and keeps information about  where the data is stored.

What is the main purpose of a DNS server?
Assign IP addresses to devices
Filter IP traffic on devices
Resolve hostnames to IP addresses
Run directory services

Answers

Answer:

C

Explanation:

Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses.

Which of the following is the MOST sensitive Personally Identifiable Information (PII) and should be shared cautiously and only with trusted resources?A. Email addressB. Phone numberC. Mother’s maiden nameD. Last name

Answers

Final answer:

The most sensitive PII among the given options is the mother’s maiden name, as it's commonly used in security questions and identity verification.

Explanation:

The most sensitive Personally Identifiable Information (PII) that should be shared cautiously and only with trusted resources among the options provided is C. Mother’s maiden name. This piece of information is often used as a security question for various accounts and can be used for identity verification. Consequently, it can provide access to someone’s personal and financial details if it falls into the wrong hands. While an email address, phone number, and last name are unique to individuals and are considered PII, the mother’s maiden name holds a higher risk and sensitivity due to its common use in security settings.

____ devices are high-performance storage systems that are connected individually to a network to provide storage for the computers connected to that network.A. Network attached storage (NAS)B. Super network storageC. Holographic StorageD. RAID (redundant arrays of independent disks)

Answers

Answer:

The correct answer to the following question will be Option A "Network Attached Storage (NAS)".

Explanation:

Network-connected storage is indeed a document-level data storage server based to a communications network providing information accessibility to a heterogeneous collection of users.The NAS is experienced in supporting files by hardware, code or modification.

The other three option are not able to perform such type of tasks. Therefore, Option A is the right answer.

The on-demand use of software and other computing resources hosted at a remote data center (including servers, storage, services, and applications) over the Internet is called ________.

Answers

Answer:

Cloud computing.

Explanation:

Cloud computing is a process of using an online platform to centralise the storing and sourcing of information and applications. Cloud computing requires a database or datacenter subscribed service.

There are different areas for cloud computing services, they are, IaaS (infrastructure as a service), PaaS (platform as a service), SaaS (software as a service) and MaaS ( mobility as a service).

It helps provide large inexpensive online resources for companies as compared to establishing and maintaining database servers.

True or False:Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user.

Answers

True.................

The idea that innovations in transportation and communication technologies has changed the way we think about distance and time is the central argument of __________________________ theory.

Answers

Answer:

Innovations in transportation and communication technologies has actually changed the way we think about distance and time

Explanation:

Transportation and communication were part of the major challenges humanity was facing in time past, the distance between places was seen as a barrier, it delayed many things, communication inclusive because of the lengthy time involved in sending messages, goods and services from one place to another, this gave birth to invention of various means of getting these major activities (that man can not do without) done without wasting much time. Ever since then man has began to see distance and time from a completely different angle, things that will take months to get done because of the great distance in time past can actually be carried out today in a couple of seconds.

Ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under?

Answers

Answer:

The correct answer to the following question will be "GNU General Public License".

Explanation:

GNU General Public License:

This is a commonly used free and license open source that ensures the right to operate, test, distribute and change the program for end-users.To prevent the GNU program from becoming proprietary, Richard Stallman developed the GPL. It is a basic use of his idea of the "copyleft."

If an individual alters and downloads a free software program, the program will then be uploaded with another name, then they would have to use this type of software license.

The correct answer to the following question will be "GNU General Public License".

Given,

Open source software program .

Here,

GNU General Public License.

This is a commonly used free and license open source that ensures the right to operate, test, distribute and change the program for end-users.

To prevent the GNU program from becoming proprietary, Richard Stallman developed the GPL.

It is a basic use of his idea of the "copyleft."

If an individual alters and downloads a free software program, the program will then be uploaded with another name, then they would have to use this type of software license.

Learn more about software programs,

https://brainly.com/question/1576944

#SPJ6

A PowerPoint file that contains a theme, sample text, and graphics on the slides or slide background to guide you as you develop your content is called ____.

Answers

Answer:

edit

Explanation:

Answer:

Outline

Explain

Outline shows the total number of slide a user is working with and template

A(n) ________ is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more data items to be processed.

Answers

Answer:

A Sentinel is a special value that cannot be mistaken as a member of a list of data items and signals that there are no more data items to be processed.

Explanation:

The sentinel value is a form of  data (in-band) to identify the end of the data when there is no out-of-bound data provided.

The value should picked in a way that is different and unique from all legal data values.

helppppppppppppppppppp

Answers

For both it is the second option I think :)

What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the disc?

Answers

Answer:

Live file system

Explanation:

The live file system allows you to continue adding files to CD or DVD disc after an initial burn as long as there is enough space left on the disc.

In an attempt to burn files on a CD or DVD disc, Windows will prompt you if you want the live file system or the other (which is mastered disc format). Once you select the live file system, you can then keep adding files over and over until there is not enough space on the disc.

Note that Windows might not display the prompt as "live file system". It could be represented in some other ways like: "Like a USB flash drive". But then going through the prompt will tell you which is which.

During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. What kind of risk has Rick identified? Rick has identified a _________ risk.

Answers

Final answer:

Rick has identified a financial risk during the software planning process due to an incorrect estimation of funds.

Explanation:

During the software planning process, Rick, a project manager, finds that his team has made an incorrect estimation of funds. The kind of risk Rick has identified is a financial risk. Financial risks are associated with the management and estimation of funds in a project and include the possibility that the company may not have adequate funds or may allocate too much, leading to financial issues. It's important for project managers like Rick to carefully assess financial risks to make informed decisions that will protect the company's financial health and ensure the project's success.

A(n) system resource is any part of the computer system, including memory, storage devices, and the microprocessor. _________________________

Answers

Answer:

The above statement is TRUE

Other Questions
Services, Inc., began 2018 with total assets of $220 million and ended 2018 with total assets of $375 million. During 20182018, McKayMcKay Services earned revenues of $ 400$400 million and had expenses of $161 million. McKay Services declared and paid dividends of $21 million in 2018. Prepare the company's income statement for the year ended December 31, 2018, complete with an appropriate heading. Two people bought 46 apples. Chris bought 5 times more than Brian. How many apples did Brian buy? 8x^2 - 2x = 1 quadratic simplification will give brainiest In ABC, angle bisectorsAKandBLare drawn. It is known that mBAC =mAKC and mABC=mALB. Find all the angles of ABC. Help me please and thank you Sociologists want to determine the probability of exactly 4 out of the next 7 individuals they survey earning over$50,000 dollars per year. The probability of an individual earning over $50,000 a year is 30%. What is the probability ofexactly 4 out of the next 7 individuals that they survey earning over $50,000? A. 0.07859 B. 0.07651 C. 0.08311 D. 0.09724 the process of adjusting an IDPS to maximize its efficiency in detecting true positives, while minimizing both false positives and false negatives. 1. Cuntas horas estudiaste para la prueba de espaol? 2. Qu libro que leste el ao pasado te gust ms? 3. Te compraron un regalo el mes pasado? 4. A qu hora volviste a casa el fin de semana pasado? 5. Viste ayer la televisin? Each Excedrin tablet contains 250 mg aspirin (ACE), 250 mg of acetaminophen (ACE), and 65 mg of caffeine (CAF). Calculate the theoretical percent (%) recovery of each component using the mass of one tablet (675 mg). (a) ASP (b) ACE (c) CAF (250 mg / xx mg tablet) x 100% a)ASP: 37.04%b)ACE: 37.04%c)CAF: 9.63% which body organ is surrounded by by a series of tubes that are used for the transport of oxygen. What do we normally call these transport tubes _______________ governs the prosecution of those charged with serious offenses against public order, such as murder. University Company produces collegiate apparel. From its accounting records, it prepares the following schedule and financial statements on a yearly basis.(a)Cost of goods manufactured schedule.(b)Income statement.(c)Balance sheet.The following items are found in its ledger and accompanying data.For each item, indicate the schedule and/or financial statement(s) in which the item will appear.1.Direct labor Balance SheetCost of Goods Manufactured Schedule and Balance SheetIncome Statement and Balance SheetCost of Goods Manufactured ScheduleCost of Goods Manufactured Schedule and Income StatementIncome Statement2.Raw materials inventory, 1/1 Income Statement and Balance SheetBalance SheetCost of Goods Manufactured ScheduleCost of Goods Manufactured Schedule and Balance SheetCost of Goods Manufactured Schedule and Income StatementIncome Statement3.Work in process inventory, 12/31 Cost of Goods Manufactured Schedule and Balance SheetIncome Statement and Balance SheetCost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured ScheduleIncome StatementBalance Sheet4.Finished goods inventory, 1/1 Income Statement and Balance SheetCost of Goods Manufactured Schedule and Balance SheetCost of Goods Manufactured ScheduleCost of Goods Manufactured Schedule and Income StatementBalance SheetIncome Statement5.Indirect labor Cost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured Schedule and Balance SheetCost of Goods Manufactured ScheduleIncome Statement and Balance SheetIncome StatementBalance Sheet6.Depreciation on factory machinery Balance SheetIncome StatementCost of Goods Manufactured Schedule and Balance SheetIncome Statement and Balance SheetCost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured Schedule7.Work in process, 1/1 Income Statement and Balance SheetCost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured Schedule and Balance SheetIncome StatementCost of Goods Manufactured ScheduleBalance Sheet8.Finished goods inventory, 12/31 Income StatementCost of Goods Manufactured Schedule and Balance SheetIncome Statement and Balance SheetCost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured ScheduleBalance Sheet9.Factory maintenance salaries Cost of Goods Manufactured Schedule and Income StatementBalance SheetCost of Goods Manufactured ScheduleCost of Goods Manufactured Schedule and Balance SheetIncome StatementIncome Statement and Balance Sheet10.Cost of goods manufactured Cost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured Schedule and Balance SheetCost of Goods Manufactured ScheduleBalance SheetIncome Statement and Balance SheetIncome Statement11.Depreciation on delivery equipment Cost of Goods Manufactured Schedule and Balance SheetCost of Goods Manufactured ScheduleIncome StatementBalance SheetIncome Statement and Balance SheetCost of Goods Manufactured Schedule and Income Statement12.Cost of goods available for sale Income Statement and Balance SheetCost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured ScheduleIncome StatementCost of Goods Manufactured Schedule and Balance SheetBalance Sheet13.Direct materials used Cost of Goods Manufactured ScheduleIncome StatementCost of Goods Manufactured Schedule and Income StatementBalance SheetCost of Goods Manufactured Schedule and Balance SheetIncome Statement and Balance Sheet14.Heat and electricity for factory Balance SheetCost of Goods Manufactured ScheduleIncome StatementCost of Goods Manufactured Schedule and Balance SheetIncome Statement and Balance SheetCost of Goods Manufactured Schedule and Income Statement15.Repairs to roof of factory building Cost of Goods Manufactured Schedule and Balance SheetCost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured ScheduleIncome StatementBalance SheetIncome Statement and Balance Sheet16.Cost of raw materials purchases Cost of Goods Manufactured Schedule and Income StatementCost of Goods Manufactured ScheduleCost of Goods Manufactured Schedule and Balance SheetIncome StatementBalance SheetIncome Statement and Balance Sheet 28.71 is what percent of 6.6? DNA replication is said to be semiconservative. What does this mean? a. Each new double helix consists of one old and one new strand. b. The old double helix is degraded, and half of its nucleotides are used in the construction of two new double helices. c. Half of the old strand is degraded, and half is used as a template for the replication of a new strand.d. One of the two resulting double helices is made of two old strands, and the other is made of two new strands. e. One strand of the new double helix is made of DNA, and the other strand is made of RNA. Complete the equation of the line through (-10,3) and (-8,-8) Marxist criticism Beginnings and basics of Marxism. Karl Marx (1818-1883), a German philosopher, and Friedrich Engels (1820-1895), a German sociologist (as he would now be called), were the joint founders of this school of thought. Area of Myanmar sometimes called tropical Scotland The structure on the south african coast has a range of 63 km is called What are we calculating when we calculate expected frequencies? What is the reason for calculating expected frequencies the way we do? In laymens terms, what do expected frequencies tell us? PLS HELP - What is the product?(2x-1)(x+4) A- O 2x - 4B- O zx+4C- 2x?+7x-4D- O 2x - 7x-4 Steam Workshop Downloader