17. Which of the following keyboard shortcut is used to copy the selected text?
a. Ctrl+c
b. Ctrl+V
c. Ctrl+X
d. Ctrl+Z​

Answers

Answer 1

Answer:

ctrl+c is used to copy the selected text

Answer 2

Answer:

A. Ctrl+c

Explanation:

I took the test, also you can use Command c and Command v to copy and paste.


Related Questions

investigate the design objective of hybrid computers​

Answers

Explanation:

Hybrid computers are computers that exhibit features of analog computers and digital computers. The digital component normally serves as the controller and provides logical and numerical operations, while the analog component often serves as a solver of differential equations and other mathematically complex equations

A town decides to publicize data it has collected about electricity usage around the city. The data is freely available for all to use and analyze in the hopes that it is possible to identify more efficient energy usage strategies. Which of the following does this situation best demonstrate?
a. Citizen science.b. Crowdfunding.c. Open data.d. Machine Learning.

Answers

The answer is C.open data

Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to solve my problem this is for 24 points

Answers

Answer:

Just restart it. It would definitely work.

Explanation:

maybe try to do the discharge process?

close your laptop and take off your battery. then press on the power button for atleast 30 seconds or more. now put the battery back on and plug your laptop's charger in. then press power button......i think it'll open by then...I'm not sure tho

if you were a developer of software, what kind of software package would you develop? why ?​

Answers

Answer:

Software that would help my grandparents in the North end much money and help stop post harvest loss due to inadequate weather information Climate change etc

Explanation:

The app willbe able to tellif a soil is suitable forCropsthrough my othertechnologiesthat willcome with app it will alsodetect the whetherpattern accuratelyprovide securityin the farmand help farmers selltheir products online

Peter wants to make sure his code is going to work. He has Sally act as the computer mentally checking each step and its results for the entire set of computer instructor. Sally is performing a ________.
A) Inspections
B) Walk-throughs
C) Desk check
D) Unit test

Answers

The answer is B walk throughs

The fact that Sally act as the computer by mentally checking each step means she's performing B. walk throughs.

What is a computer?

A computer simply means an electronic machine that's important to make one's work easier and faster.

In this case, the fact that Sally act as the computer mentally checking each step means she's performing the walk throughs.

Learn more about computer on:

https://brainly.com/question/24540334

which data type uses %i as a format specifier​

Answers

A decimal integer(detects the base automatically

Describe Technology class using at least 3 adjectives

Answers

Answer:

clearly alien

typically inept

deadly modern

Explanation:

In this lab, you complete a C++ program that uses an array to store data for the village of Marengo.
The program is described in Chapter 8, Exercise 5, in Programming Logic and Design. The program should allow the user to enter each household size and determine the mean and median household size in Marengo. The program should output the mean and median household size in Marengo. The file provided for this lab contains the necessary variable declarations and input statements. You need to write the code that sorts the household sizes in ascending order using a bubble sort and then prints the mean and median household size in Marengo. Comments in the code tell you where to write your statements.
Instructions
Make sure that the file HouseholdSize.cpp is selected and open.
Write the bubble sort.
Output the mean and median household size in Marengo.
Execute the program by clicking the Run button and the bottom of the screen.
Enter the following input, and ensure the output is correct. Household sizes: 4, 1, 2, 4, 3, 3, 2, 2, 2, 4, 5, 6 followed by 999 to exit the program.
Here is my code so far. I need help finishing it (printing the mean & median, etc). Thanks so much:
// HouseholdSize.cpp - This program uses a bubble sort to arrange up to 300 household sizes in
// descending order and then prints the mean and median household size.
// Input: Interactive.
// Output: Mean and median household size.
#include
#include
using namespace std;
int main()
{
// Declare variables.
const int SIZE = 300; // Number of household sizes
int householdSizes[SIZE]; // Array used to store 300 household sizes
int x;
int limit = SIZE;
int householdSize = 0;
int pairsToCompare;
bool switchOccurred;
int temp;
double sum = 0;
double mean = 0;
double median = 0;
// Input household size
cout << "Enter household size or 999 to quit: ";
cin >> householdSize;
// This is the work done in the fillArray() function
x = 0;
while(x < limit && householdSize != 999)
{
// Place value in array.
householdSizes[x] = householdSize;
// Calculate total of household sizes
sum+= householdSizes[x];
x++; // Get ready for next input item.
cout << "Enter household size or 999 to quit: ";
cin >> householdSize;
} // End of input loop.
limit = x;
// Find the mean
// This is the work done in the sortArray() function
pairsToCompare = limit - 1;
switchOccured = true;
while(switchOccured == true)
{
x = 0;
switchOccured == false;
while (x < pairsToCompare)
{
if(householdSizes[x]) > householdSizes[x+1])
{
//perform switch
}
x++;
}
pairsToCompare--;
}
// This is the work done in the displayArray() function
//Print the mean
// Find the median
median = (limit-1) / 2;
if (limit % 2 ==0)
{
cout << "Median is: " << (householdSizes[(int)median] + householdSizes[(int)median + 1]) / 2.0 << endl;
}
else {
// Print the median household size
}
// Print the median
return 0;
} // End of main function

Answers

Answer:

For the mean, do the following:

mean = sum/limit;

cout<<"Mean: "<<mean;

For the median do the following:

for(int i = 0; i<limit; i++) {

  for(int j = i+1; j<limit; j++){

     if(householdSizes[j] < householdSizes[i]){

        temp = householdSizes[i];

        householdSizes[i] = householdSizes[j];

        householdSizes[j] = temp;       }    } }

median= (householdSizes[(limit-1)/2]+householdSizes[1+(limit-1)/2])/2.0;

if((limit - 1)%2==0){

   median = householdSizes[limit/2];

}

cout<<endl<<"Median: "<<median;

Explanation:

The bubble sort algorithm in your program is not well implemented;

So, I replaced the one in your program with another.

Also, some variable declarations were removed (as they were no longer needed) --- See attachment for complete program

Calculate mean

mean = sum/limit;

Print mean

cout<<"Mean: "<<mean;

Iterate through each element

for(int i = 0; i<limit; i++) {

Iterate through every other elements forward

  for(int j = i+1; j<limit; j++){

Compare both elements

     if(householdSizes[j] < householdSizes[i]){

Reposition the elements if not properly sorted

        temp = householdSizes[i];

        householdSizes[i] = householdSizes[j];

        householdSizes[j] = temp;       }    } }

Calculate the median for even elements

median= (householdSizes[(limit-1)/2]+householdSizes[1+(limit-1)/2])/2.0;

Calculate the median for odd elements

if((limit - 1)%2==0){

   median = householdSizes[limit/2];

}

Print median

cout<<endl<<"Median: "<<median;

Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C strings are equalbool match(const char str1[], const char str2[]){bool result = true;while (str1 != 0 && str2 != 0) // zero bytes at ends{if (str1 != str2) // compare corresponding characters{result = false;break;}str1++; // advance to the next characterstr2++;}if (result) {result = (str1 == str2); // both ended at same time?}return( result );}int main(){char a[10] = "pointy";char b[10] = "pointless";if (match(a,b)){cout << "They're the same!" << endl;}}

Answers

Answer:

The code is not dereferencing the pointers. You have to place an asterisk in front of the pointer to read the value the pointer points to.

Explanation:

So "if (str1 != str2)" must be "if (*str1 != *str2)".

likewise:

   while (*str1 != 0 && *str2 != 0)

and

     result = (*str1 == *str2);

g Boolean Algebraic properties _____. a. are used to make boolean expressions more complicated b. are used to convert a Boolean equation to a circuit c. can lead to a simpler expression and thus a simpler circuit d. can be used with integer numbers

Answers

Answer:

c. can lead to a simpler expression and thus a simpler circuit.

Explanation:

Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.

Also, Boolean logic allow users to combine keywords with Boolean operators (quotes, AND, OR, near/n) to give a more personalized and relevant search results.

There are five (5) main Boolean Algebraic properties and these includes;

I. Commutative property: it applies to both multiplication and addition.

For addition; A + B = B + AFor multiplication; A.B = B.A

II. Associative property: it applies to both multiplication and addition.

For addition; A + (B + C) = (A + B) + CFor multiplication; A(BC) = (AB)C

III. Distributive property: it is formed using the product of a sum.

A(B + C) = AB + AC

IV. Complement property: it involves a variable and its complement.

For addition: A + A' = 1For multiplication; A.A' = 0

V. Identity property:

For addition; A + 0 = AFor multiplication; A.1 = A

In digital electronics, Boolean expressions are used to represent circuits which comprises of Boolean operations and as such simplifying any logic expression without changing or altering any of it's functionalities and properties based on given operations or variables.

Hence, Boolean Algebraic properties can lead to a simpler expression and thus a simpler circuit.

False
2. Complete the script by filling in the missing parts. The function receives a name, then returns a greeting based on
whether or not that name is "Taylor".
1
2
3
4
def greeting(name):
if
"Taylor":
return "Welcome back Taylor!"
5
6
return "Hello there,
+ name
7
8
print(greeting("Taylor"))
print(greeting("John"))
Run
Reset
3. What's the output of this code if number equals 10?
1
2
3
4
if number > 11:
print(e)
elif number ! - 10:
print(1)
elif number >= 20 or number < 12:
print(2)
else:
print(3)
5
6
7
8

Answers

Answer:

Explanation:

2. #The correct finished code would be the following.

def greeting(name):

  if name == 'Taylor':

      return "Welcome back Taylor!"

  else:

      return "Hello there, " + name

print(greeting("Taylor"))

print(greeting("John"))

3.  The output of this code will be 2 , this is because the second elif statement states that if the number is greater than 20 or less than 12 to print out the value 2. Since the input number is 10 then that is the elif that will be called.

Cindy tried to delete a customer but the customer still had open invoices so the system would not allow her to delete the customer. More than likely ________ was enforced.

Answers

Answer:

The answer is "Referential integrity".

Explanation:

This relates to one aspect of data integrity. Data across multiple tables are linked via relationships. In view of the distinct customer & invoice tables, each invoice table should have the primary key specified throughout the Customer table, for instance. Whenever the invoice table contains a customer ID reference. This ID including its customer will be only a table of the customer.

You manage the DNS servers for the eastsim domain. You have a domain controller named DNS1 running Windows Server 2016 that holds a standard primary zone for the eastsim zone. You would like to configure DNS1 to use forwarders for all unknown zones. You edit the DNS server properties for DNSl. On the forwarders tab, you find that the Use root hints if noforwarders are available option is disabled. You also find you are unable to edit the forwarders list.What should you do?A. Configure root hints on DNSl.B. Change the eastsim.com domain to an Active Directory-integrated zone.C. Enable recursion on DNSl.D. Configure conditional forwarders.

Answers

Answer:

..

Explanation:

...

What exactly is hyperloop, and how does it function?​

Answers

Answer:

The Hyperloop system consists of sealed and partially evacuated tubes, connecting mobility hubs in large metropolitan areas, and pressurized vehicles, usually called pods, which can move at very high speeds, thanks to contactless levitation and propulsion systems as well as to the low aerodynamic drag.

Answer:

https://youtu.be/k-UdTsEpaw0

Explanation:

Suppose a computer using set associative cache has 221 bytes of main memory, and a cache of 64 blocks, where each cache block contains 4 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, set, and offset fields

Answers

Answer:

Tag = 1

Index = 5

Block offset = 2

Explanation:

From the given information:

The main memory bits(MM) = 221

number of block in the cache = 64 blocks

Block size = 4B

Recall that;

MM = log (memory size)

Thus;

main memory bits = log (221)

= 8 bits

Since this is a 2-way assoicative set;

the number of set in each cache = block size/2

64/2  = 32

Now, the index bit = log( no of set in each cache)

= log(32)

= 5 bits

Also since block size = 4B;

the block offset = log(4) = 2 bits

As such, tag = main memory bits - (index bit + block offset)

tag = 8 -(5 + 2)

tag = 8 -7

tag = 1

The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data

Answers

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

Write code to take a String input from the user, then print the first and last letters of the string on one line. Sample run: Enter a string: surcharge se Hint - we saw in the lesson how to get the first letter of a string using the substring method. Think how you could use the .length() String method to find the index of the last character, and how you could use this index in the substring method to get the last character.

Answers

Answer:

//import the Scanner class to allow for user input

import java.util.Scanner;

//Begin class definition

public class FirstAndLast{

   //Begin the main method

    public static void main(String []args){

       

       

       //****create an object of the Scanner class.

       //Call the object 'input' to receive user's input

       //from the console.

       Scanner input = new Scanner(System.in);

       

       //****create a prompt to tell the user what to do.

       System.out.println("Enter the string");

       

       //****receive the user's input

       //And store it in a String variable called 'str'

       String str =  input.next();

       

       //****get and print the first character.

       //substring(0, 1) - means get all the characters starting

       //from the lower bound (index 0) up to, but not including the upper

       //bound(index 1).

       //That technically means the first character.

       System.out.print(str.substring(0,1));

       

       //****get and print the last character

       //1. str.length() will return the number of character in the string 'str'.

       //This is also the length of the string

       //2. substring(str.length() - 1) - means get all the characters starting

       // from index that is one less than the length of the string to the last

       // index (since an upper bound is not specified).

       // This technically means the last character.

       System.out.print(str.substring(str.length()-1));

       

       

       

    }  // end of main method

   

} //end of class definition

Explanation:

The code has been written in Java and it contains comments explaining important parts of the code. Kindly go through the comments.

The source code and a sample output have also been attached to this response.

To run this program, copy the code in the source code inside a Java IDE or editor and save it as FirstAndLast.java

type of operating system used i handleheld device

Answers

Answer:

6

Explanation:

Palm OSPocketOSSymbianOSLinuxOSWindowsAndroid

An electric kettle has the resistance of 30ohms what will flow when it connected to a 240v supply... find also the power rating of the power​

Answers

Answer:

Power = 1920 Watts or 1.92 Kilowatts

Explanation:

Given the following data;

Resistance = 30 Ohms

Voltage = 240 Volts

To find power rating of the kettle;

Mathematically, the power consumption of an electric device is given by the formula;

Power = voltage²/resistance

Substituting into the formula, we have;

Power = 240²/30

Power = 57600/30

Power = 1920 Watts or 1.92 Kilowatts

Topic: Graphs.1.) Bob loves foreign languages and wants to plan his courseschedule for the following years. He is interested in the followingnine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127,LA141, and LA 169. The course prerequisites are.i.) LA15: (None)ii.) LA16: LA 15iii.) LA22: (None)iv.) LA31:LA 15v.) LA32:LA16, LA31vi.) LA126: LA22, LA32vii.) LA127: LA 16viii.) LA141:LA22, LA 16ix.) LA 169: LA32.Find the sequence of courses that allows Bob to satisfy allthe prerequisites.

Answers

Answer:

  LA15; LA22

LA16; LA31; LA32

  LA169; LA126;

  LA127; LA141

Explanation:

Given

[tex]Courses: LA15,\ LA16,\ LA22,\ LA31,\ LA32,\ LA126,\ LA127,\ LA141,\ LA 169.[/tex]

Required

Course sequence to satisfy the prerequisite

From the course prerequisite, we have:

[tex]1.\ LA15 \to None[/tex]    and    [tex]3.\ LA22 \to None[/tex]

This means that LA15 and LA22 are the base courses, and they have no prerequisite. So, we have:

[tex][LA15; LA22][/tex]

LA16 and LA31 have LA15 as their direct course prerequisite. So, the sequence becomes

[tex][LA15 \to [LA16, LA31]; LA22][/tex]

To complete the sequence, we read each course and place them other their prerequisite.

See attachment for complete tree

From the tree, we have the sequence to be:

LA15; LA22

LA16; LA31; LA32

LA169; LA126;

LA127; LA141

how to get fast frontend development online job as a beginner?​

Answers

Answer:

hmmm well what is your magager?? every job will ask you what you can do.

Write a program to play the Card Guessing Game. Your program must give the user the following choices: 1. Guess only the face value of the card (guessFace() in face.cpp) 2. Guess only the suit of the card (guessSuit() in suit.cpp) 3. Guess both the face value and the suit of the card (guessBoth() in both.cpp) Before the start of the game, create a deck of cards. Before each guess use the function random_shuffle() (

Answers

Answer:

Hey bro I don't know such programs to write but I have number guessing game. Here:

Explanation: Built with python......

import random

while True:

   x = True

   while x:

       num = input("type a limiting number  ")

       if num.isdigit():

           print("lets play")

           num = int(num)

           meow = False

       else:

           print("Invalid input! Try agian.")

   secret = random.randint(1, num)

   guess = None

   count = 1

   while guess != secret:

       guess = input("Please guess a number between 1 and " + str(num) + ":")

       if guess.isdigit():

           guess = int(guess)

       if guess == secret:

           print("You guessed correctly!")

       else:

           print("Oops wrong answer!! Try again..")

           count += 1

   print("it took you", count, "guesses", )

Select the tasks that would be performed by an information systems graduate.

data mining
forest management
n software design
automotive design
construction planning
mainframe operations
NEXT QUESTION
ASK FOR HELP

Answers

I think data mining and software design.

Answer:

mainframe operations, data mining, software design

Explanation:

There are several types of software development methods, but almost all of them are based on the ________ model.

Answers

Answer:

Waterfall

Explanation:

The waterfall model development strategy may be classed as a flexible design architecture exhibiting a linear operational sequence with each phase being largely dependent on the preceeding phase. Each phase of the waterfall has clearly defined task ; usually starting with the requirement phase where use cases and required docs are gathered, then the design, which caters for the software architecture, the the implementation (which is the main software build) followed by verification and maintainance.

We can see that the waterfall method is sequential and not extremely complex as it follows an entirely linear process.

If myClass has a constructor with a parameter of type String, select the other constructor that should be included.
a. public void myClass( ) {. . .}
b. public myClass(int value ) {. . .}
c. public myClass(String str1, String str2) {. . .}
d. public myClass( ) {. . .}

Answers

Answer:

d. public myClass( ) {. . .}

Explanation:

A constructor is a special method that is called when an object of a class is created. It is also used to initialize the instance variables of the given class. A class may have one or more constructors provided that these constructors have different signatures. A class that does not have a constructor explicitly defined has a default parameterless constructor.

Having said these about a constructor, a few other things are worth to be noted by a constructor.

i. In Java, a constructor has the same name as the name of its class.

For example, in the given class myClass, the constructor(s) should also have the name myClass.

ii. A constructor does not have a return value. It is therefore wrong to write a constructor like this:

public void myClass(){...}

This makes option a incorrect.

iii. When a constructor with parameters is defined, the default parameterless constructor is overridden. This might break the code if some other parts  of the program depend on this constructor. So it is advisable to always explicitly write the default parameterless constructor.

This makes option d a correct option.

Other options b and c may also be correct but there is no additional information in the question to help establish or justify that.

Please help it’s timed

Answers

Answer:

archetecture firm

Explanation:

government dont do that,

energy company arent engineers, and manufactures dont do specifically mapping techichian work

When my phone powers on does it take away 1 percent of battery?

Answers

Answer:

No, battery is based on your phone activity. Simply turning your phone on will not take away battery percentage.

No turning on your phone does not take up any batteries, your phone battery going go when your phone is used too much-

____________ RAM resides on the processor

Answers

Answer:

Brain of the computer i.e Random Access memory RAM resides on the processor

Explanation:

Brain of the computer i.e Random Access memory RAM resides on the processor. RAM is located in the central processing unit (CPU) also called processor which is located within the motherboard of the computer. It carry out the commands.

The Mac OS was the first to use a graphical user interface.


False

True

Answers

True
Hope this helps

What lets the computer's hardware and software work together?

Monitor

Central Processing Unit (CPU)

Computer Viruses

Operating System

Answers

Answer:

Operating System

Explanation:

The operating System lets the computer hardware and software work together.

Other Questions
Find the length of the third side. If necessary, write in simplest radical form. 7 V15 One person pushes to the left on a big rock. What are two ways a friend can apply a push or pull to help him? Please help me choose the correct answer to find the answer What did China, Egypt, and India have in common after WW2? On 6/30/12, a company paid $106,000 to retire a bond before maturity. The company recorded a $6,000 loss as part of the transaction. Which of the following must be true regarding this transaction?a. The face value of the bond was $100,000b. The market interest rate had increased since the bond was issuedc. The face value of the bond was $106,000d. The company paid more than the current fair value of the bond to retire it.e. The market interest rate had decreased since the bond was issued Someone please help me with this lol Im struggling I hope I dont get a bad grade Which action was unique about the 2008 presidential election?For the first time, neither party nominated a white man for president.Neither candidate had served in an elected office before.It was the first election in which a woman had a very good chance of winning a major party's nomination.The Republican party nominated an African American for the first time. How do you think the human population has changed over time? What makes you say that? a three-digit lottery ticket using the numbers 0 to 9 has how many possible combinations? using only the fundamental counting principal. Write the Spanish translations of the following sentences. Be careful to use ser and estar correctly. Also, remember to have your adjectives agree in number and gender with the subjects.Pay attention to (a) choosing the correct verb, (b) using the correct form of the verb, and (c) using the correct adjective form.I am short.They are ugly.You are sick.We are sad.She is American.*Note: This is a practice activity. Completing this activity will not only prepare you for future tests and assessments but, more importantly, it will enhance your language ability. This activity will not count towards your grade. Find the volume of a pyramid with a square base, where the area of the base is12.9 cm2 and the height of the pyramid is 15.2 cm. Round your answer to thenearest tenth of a cubic centimeter. PLEASE HELP! Simplify the expression and write any restrictions. A sample of juniors and seniors were asked if they plan to attend college. One surveyed student is selected at random. Select all that apply. Percents are rounded. A. The probability the student is a junior is 52%. B. The probability the student plans to attend college is 70%. C. Given the student plans to attend college, the probability the student is a junior is 68%. D. Given the student is a junior, the probability the student plans to attend college is 68%. E. Events "is a junior" and "plans to attend" are independent. F. Events "is a senior" and "plans to attend" are independent. In an experiment determining the effects of antibiotics on the treatment of pneumonia in mice, two groups of mice with pneumonia are compared. One group, group A, receives no antibiotic, and the other group, group B, receives 10 mg/kg of body weight of a new antibiotic. Besides the administration of the antibiotic, there are no differences between the two groups of mice. What is the purpose of group A What is the answer to this? A flexible camping tank has a sample of butane gas at 17.2 atm and has volume of 6.5L. What will be the volume if the pressure is adjusted to6.4 atm? A factory found that 8% of its produced light bulbs are defective.If the factory produces 500 light bulbs, how many light bulbs are expected to be defective? in own word what is photography please help with my biology 4/x + 2/y = 3 is that linear? explain please help i need it for my final