The following data (in increasing order) for the attribute age: 13, 15,
16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46,
52, 70.
(a) Use smoothing by bin means to smooth these data, using a bin depth of 3. Illustrate
your steps. Comment on the effect of this technique for the given data.
(b) How might you determine outliers in the data?
(c) What other methods are there for data smoothing?

Answers

Answer 1

Answer:

Explanation:

Step-by-step explanation:

13, 15, 16, 16, 19, 20, 20, 21, 22, 22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70.

a) Smoothing by bin means

Each bin has depth of 3

Dividing data into bins

so, Bin 1= 13, 15, 16

Bin 2=  16, 19, 20

Bin 3=  20, 21, 22

Bin 4= 22, 25, 25

Bin 5= 25, 25, 30

Bin 6= 33, 33, 35

Bin 7 = 35, 35, 35

Bin 8= 36, 40, 45

Bin 9=  46, 52, 70

Now, smoothing data by bin mean

so, Bin 1= 13, 15, 16 = (13+15+16)/3 = 15 Bin 1 = 15,15,15

Bin 2=  16, 19, 20 = (16+19+20)/3 = 18 Bin 2 = 18,18,18

Bin 3=  20, 21, 22= (20+21+22)/3 = 21 Bin 3 = 21,21,21

Bin 4= 22, 25, 25 = (22+25+25)/3 = 24 Bin 4 = 24,24,24

Bin 5= 25, 25, 30 =(25+25+30)/3 = 27 Bin 5 = 27,27,27

Bin 6= 33, 33, 35 = (33+33+35)/3 = 34 Bin 6 = 34,34,34

Bin 7 = 35, 35, 35 = (35+35+35)/3 = 35 Bin 7 = 35,35,35

Bin 8= 36, 40, 45 = (36+40+45)/3 = 40 Bin 8 = 40,40,40

Bin 9=  46, 52, 70=(46+52+70)/3 = 56 Bin 9 = 56,56,56

This technique is used to smooth the data. Data may have noise, using binning techniques we can remove noise from the data. It helps in providing more accurate results

b) How might you determine outliers in the data?

Outliers are the data that are abnormal to other data points. Outliers can be found by Box and whisker chart (box plot). Inter Quartile range can also be used to identify outliers

c)  What other methods are there for data smoothing?

Other methods of smoothing data are

a) binning by boundaries

b) Exponential smoothing

c) Random walk

Answer 2

Smoothing by bin means with a bin depth of 3 involves dividing the data into bins of size 3, and replacing each value in the bin with the mean of the bin.

What is bin depth?

According to the definition of equal depth binning, it divides the range into N intervals, each containing approximately the same number of samples.

The steps are as follows:

Bin 1: 13, 15, 16 → (13 + 15 + 16)/3 = 14.67

Bin 2: 16, 19, 20 → (16 + 19 + 20)/3 = 18.33

Bin 3: 20, 21, 22 → (20 + 21 + 22)/3 = 21

Bin 4: 22, 25, 25 → (22 + 25 + 25)/3 = 24

Bin 5: 25, 25, 30 → (25 + 25 + 30)/3 = 26.67

Bin 6: 33, 33, 35 → (33 + 33 + 35)/3 = 33.67

Bin 7: 35, 35, 35 → (35 + 35 + 35)/3 = 35

Bin 8: 35, 36, 40 → (35 + 36 + 40)/3 = 37

Bin 9: 45, 46, 52 → (45 + 46 + 52)/3 = 47.67

Bin 10: 70 → 70

(b) Data outliers can be identified using a variety of methods, including:

Z-score: For each data point, compute the Z-score, and consider any data point with a Z-score greater than 3 or less than -3 to be an outlier.The Tukey method: Calculate the data's interquartile range (IQR), and consider any data point that is more than 1.5 times the IQR below or above the first quartile to be an outlier.Visual examination: Plot the data and look for any values that seem out of place with the rest of the data.

(c) Other data smoothing methods include:

Moving average: Replace each data point within a specified window with the average of itself and its neighboring data points.Fit a polynomial to a moving window of data points and replace each data point with the value of the polynomial at that point using the Savitzky-Golay filter.Exponential smoothing: Assign each data point exponentially decreasing weights, with more recent data points receiving higher weights, and replace each data point with a weighted average of itself and the previous smoothed value.

Thus, this way, determine outliers in the data.

For more details regarding smoothing by bin, visit:

https://brainly.com/question/12982171

#SPJ2


Related Questions

What game is this?????? ?

Answers

Answer:

name the emoji

Explanation:

Answer:

Stop wasting points

Explanation:

Question #2
Multiple Choice
What is the next line?
>>> my Tuple = [10, 20, 50, 20, 20, 60]
>>> my Tuple.index(50)
O 4
O 2
O 3
O 1

Answers

Answer:

The index of 50 is 2.

Explanation:

Index method is sued to return the index of a number or element in a list.

The syntax of using the index method when we have to find the index of a specific element is:

>>>ListName.Index(element)

It has to be remembered that the indexes of a list start from zero.

In the given statements, first a list is created with elements and the second statement will get the index of 50 in the list.

Hence,

The index of 50 is 2.

The next line can be written to display the index of 50 as:

print("The index of 50 is:",my Tuple.index(50))

How does entering search terms in quotation marks affect search results?

Answers

if it is in quotations someone said or wrote those words, so when you search in quotation those are someone’s words and it might show who’s words they are.

Lucy completed her PowerPoint presentation and showed it to her teacher to review. Lucy's teacher said it needed to be more engaging for the audience. The teacher suggested making the slides push in. What feature is Lucy's teacher referring to?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Lucy completed her PowerPoint presentation and showed it to her teacher to review. Lucy's teacher said it needed to be more engaging for the audience. The teacher suggested making the slides push in.

The teacher referring to the Transitions effect that is push while making the slides.

You can insert different Transition effect on your slides while going through the Transitions tab on the ribbon, and then select your desired effect on the selected/active slide. There are tens of transitions effect, you can search for your desired effect on your slide, such as Lucy's teacher suggested to her to add a push-in effect.

Answer: Transition, I just finished my test for this lesson! I got an 100% on it!

Explanation: When you go and read through the lesson, there's a page telling you about each tab. When you go to "Transitions", there is an image that shows the features for transitioning your slides. The options shown in the picture is "existing", "none", "morph", "cut", "fade", "wipe", and "push".

Jerry can use an
program to restrict information from going out without his permission.

Answers

The answer is predictions

Answer:

ok but what do you want?

Explanation:

ANTIVIRUS or anti cookie software

is what it is i think

Write a function gcd(x, y) that returns the greatest common divisor of the parameters x and y. Use the Euclidean algorithm to do this. Return None if the gcd does not exist(i.e., if both parameters are 0)

Answers

Answer:

function gcd(x,y) {

if (!y && !x) return 'None';

if (!y) return x;

return gcd(y, x%y);

}

console.log(gcd(462, 910));

console.log(gcd(0, 0));

console.log(gcd(32, 40));

Explanation:

This example is in javascript.

what must be the same for each variable in an array in compiled languages?

Answers

The data type must be the same for each item in the array.

Which of the following file formats cannot be imported using Get & Transform?
A.) Access Data table
B.)CVS
C.)HTML
D.)MP3

Answers

Answer:

The correct option is D) MP3

Explanation:

According to the given scenario, The data that can be imported using get and transform is as follows:

a. CVS

b. Hypertext markup language (HTML)

c, Access data table

The Get and transform means first get the data and then modify according to your needs.

So as per given options, the option D i.e MPC i.e. file format this cannot be imported using Get & transform

Therefore the correct option is D) MP3

Drawing a line to follow the direction of the notes will help you determine what aspect of the music?
A. the key signature
B. the instrumentation
C. the contour
D. the accidentals

subject is music

Answers

Answer:

A. the key signature

Explanation:

When drawing a line to follow the direction of the notes, THE KEY SIGNATURE will help determine the aspect of the music.

Key signature are simply sets of symbols on the musical stave that are written after the clef in a musical notation. They help to determine the aspect of the music because they indicate the direction of the notes.

A file named numbers.txt contains an unknown number of lines, each consisting of a single integer. Write some code that computes the sum of all these integers, and stores this sum in a variable name sum. *PYTHON*

Answers

f = open("numbers.txt", "r")

lst = [int(x) for x in f.read().splitlines()]

sum = 0

for x in lst:

----sum += x

I had to add the four dashes to maintain the structure of my code. You can replace them with spaces. Also, I wouldnt recommend having a variable named sum because python has a built in function named sum. You can test this code by putting print(sum) at the end of the code.

How are computers connected to one another?

through networks

through printers

through laptops

Answers

Answer:

They are connected through networks

Explanation:

N/A

Answer:

the other guy is correct

Explanation:

write c++ program to get from user the user and print whether it is positive or negative

Answers

Answer:

I think this is positive

Explanation:

a bus is full of passengers. if you count them by either twos, threes, or fives, there is one left. if you count them by seven there will be none left. find the least number of passengers in the bus?​

Answers

Answer:

91

Explanation:

You know that the number must end in 6 or 1 to get a left over of 1 when divided by 5. Six won't work because  2  divides evenly into a number ending into 6.

So the number ends in 1.

21 doesn't work because 3 divides into 21 evenly.

31 doesn't work because 7 does not divide into it.

41 doesn't work. 41 is prime. 7 won't divide into it.

51 is divisible by 3

61 seven does not evenly divide into 61.

71 seven leaves a remainder of  1

81 7 leaves a remainder.

91 Answer

A loop that will output every other name in the names list.
A loop that will output only the positive numbers in the numbers list.
A loop that will output the sum of all the values in the numbers list.
A loop that will output only the numbers that are odd.
A loop that will output only the names that come before "Thor" in the alphabet from the names list.
A loop that will find the maximum or minimum value in the numbers list. This algorithm requires an additional variable that is assigned to the first element in the list. Then, in a loop compare each element to the variable. If the element is > (for max) or < (for min), assign the variable to the element. After the loop, print the variable.
in python
PLEASE HELPPPP

Answers

Answer:

names = ['Peter', 'Bruce', 'Steve', 'Tony', 'Natasha', 'Clint', 'Wanda', 'Hope', 'Danny', 'Carol']

numbers = [100, 50, 10, 1, 2, 7, 11, 17, 53, -8, -4, -9, -72, -64, -80]

for index, element in enumerate(names):

if index % 2 == 0:

 print(element)

for num in numbers:

 if num >= 0:

   print(num, end = " ")

count = 0

for i in numbers:

 count += i

avg = count/len(numbers)

print("sum = ", count)

print("average = ", avg)

for num in numbers:

 if num % 2 != 0:

   print(num, end = " ")

Explanation:

I'm stuck on the last two.. I have to do those too for an assignment.

If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is:_______a. shared content with version management b. shared on Google drive c. shared content with no control d. shared with the public e. shared content with version control

Answers

Answer:

d

Explanation:

Because a decimal number

If a document is stored on a file server but team members can edit the document​ anonymously, the content on the file server is considered to be a: c. shared content with no control.

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.  Thus, it offer or avail individuals and businesses a fast, effective and efficient way of providing services to their clients over the internet.

Generally, cloud computing comprises three (3) service models and these are;

Infrastructure as a Service (IaaS). Software as a Service (SaaS). Platform as a Service (PaaS).

A file server can be defined as a type of computer that centrally stores, manage and fetch all data files (audio, image, text and video) as they are requested over the internet or network by end users (clients).

An access control refers to a security technique that is used to determine whether a user has the minimum requirements (credentials) to access, use or view resources such as documents on a computer by ensuring they are who they claim to be (authentication).

In this context, when a document (content on a computer) is shared on a file server without the implementation of an access control, the file can be anonymously edited by end users because it won't ask or request for authentication.

However, a shared content on a file server with an access control would only grant permission to authorized users while denying other users access to edit or modify its content.

Find more information: https://brainly.com/question/14014672

Write a function that returns a pointer to the maximum value of an array of float ingpoint data: double* maximum(double* a, int size) If size is 0, return NULL.

Answers

Answer:

double * maximum( double arr[], int size){

   int max = 0;

   if ( size == 0){

       return 0;

   } else {

        for (int i = 1; i < size; i++){

           if (arr[i] > arr[0]){

               max = arr[i];

           } else {

               max = arr[0];

           }

         }

         return max;

   }

}

Explanation:

The C++ source code above returns the maximum value of an array as a pointer. The function accepts two parameters, the array in question and the size of the array. The for loop iterates over the items in the array and checks for the largest, which is returned as a pointer since the function "maximum" is defined as a pointer to the floating-point number memory location.

What are three techniques used to generate ideas? O A. Free writing, brainstorming, and concept mapping O B. Free writing, clustering, and detail mapping O c. Free writing, pre-writing, and drafting O D. Pre-writing, drafting and revision​

Answers

freewriting brainstorming and concept mapping

Both pre writing and post reading strategies has been used to enhance comprehension as well as the skill of the learner.

What is Pre-writing or surveying?

Pre-reading or surveying is the process of skimming a text to locate key ideas before carefully reading a text (or a chapter of a text) from start to finish. It provides an overview that can increase reading speed and efficiency.

Reading strategies aim to facilitate the understanding of difficult texts. These strategies are very effective and can facilitate not only reading but also the interpretation of the text. Among the reading strategies, we can mention the use of context clues, which facilitate the understanding of difficult and unknown words.

Synthesizing the text is also a very beneficial strategy, as it allows the text to become smaller, more objective, and direct. Reading strategies should be used even by people who find it easy to read texts with different difficulties, as it allows the text to be understood in a deeper and more complete way.

Therefore, Both prereading and post reading strategies has been used to enhance comprehension as well as the skill of the learner.

More information about context clues at the link:

brainly.com/question/8712844

#SPJ2

What missing function will return the index of 7 in the list?

Answers

Answer:

The answer is: index function and it will be used in the following manner:

>>> myList.index(7)

Explanation:

List is one of the 4 built-in data types that are present in Python language. Lists are used to store same type of values. Indexes are used to access elements of lists in Python.

Various operations can be performed on the lists.

In the given question, we have to write the function that can be used to find the index of an element in the list.

Index function is sued for this purpose.

The syntax for index function is:

list_name.index(element)

So for the given list, to find the index of 7, the function will be written as:

>>> myList.index(7)

Hence,

The answer is: index function and it will be used in the following manner:

>>> myList.index(7)

Answer:

Index

Explanation:

Edge 2020

many web browsers include _________ tools to make it easier for designers to locate the source of a style that has been applied to a specific page element.
a. designer
b. planner
c. developer
d. creator

Answers

Answer:

c. developer

Explanation:

DEVELOPER TOOLS are tools that enables designers to easily and quickly edit web page and as well diagnosed issues or problem on a website which will inturn enables them to build a great and better websites without stress reason been that when a designer makes use of DEVELOPER TOOLS they can quicky track down and as well fix the problem that was diagnosed within a minute or seconds thereby saving time when developing a website profile.

how do hardware and software work together to allow a user to perform a function?
jointly, independently, repeatedly or separately?

Answers

Answer:

jointly

Explanation:

Because Hardware and Soft ware have to JOIN together to make something work

I hope i helped!

Hardware and software collaborate to enable a user to perform a function. The physical components of a computer system, such as the central processing unit (CPU) and memory, are referred to as hardware.

What is CPU?

CPU is an abbreviation for Central Processing Unit, which is the main component of a computer system that is in charge of executing instructions and processing data.

The CPU is often referred to as the computer's "brain" because it performs the majority of the calculations.

When a computer user performs a function, the software sends instructions to the hardware, which then executes the instructions and performs the function.

When a user types on a keyboard to create a document, for example, the keyboard sends signals to the CPU, which processes the input and sends the output to the software application to display on the screen.

Thus, in this way, hardware and software are interdependent and work together to enable a user to perform a variety of functions on a computer system.

For more details regarding CPU, visit:

https://brainly.com/question/16254036

#SPJ7

This diagram shows who is responsible in preventing cyberbullying.
A flowchart.
Top box is labeled Cyberbullying can be prevented!
A line leads to two boxes labeled Parents/guardians, Schools.
Lines lead from Schools to boxes labeled Administrators, Teachers, Students.
Based on the diagram, which explains the most effective way to stop cyberbullying?

Answers

Answer:

Parents monitor home computer use, administrators secure school computers, and students report cyberbullying.

Explanation:

this should be right

In cell D15, enter a formula using a counting function to count the number of cells in the Billable? column

Answers

The formula that could be entered as a counting function to count the number of cells would be COUNTA.

What formula can be used in cell D15?

If you want to count the number of cells that are not empty in the Billable column, you can go to cell D15 and type in =COUNTA(.

After that, you highlight the entire Billable column from D2 to D14 and then close the formula and press enter. It will return the number of cells that are not empty.

Find out more on the spreadsheet functions at https://brainly.com/question/1395170.

Maya is preparing a presentation for her science class on how solar panels produce energy. Why would a
diagram be the best choice to represent her information?
O It is the best way to show how something functions.
O It is the easiest way to present complex scientific data.
O It is the best way to show how much energy can be produced.
O It is the easiest way to present large amounts of numerical data.

Answers

A.) it the best way to show how something functions

Answer:

a

Explanation:

Which type of cut extends an audio clip from a preceding video clip to a subsequent video clip?

K-cut

J-cut

L-cut

A-cut



Adobe Premiere Pro cc 2018

Answers

Answer:

L-cut

Explanation:

In the field of cinematography, professional video editors use video editing software application such as Adobe Premiere Pro to create wonderful and remarkable videos with the aid of various video editing techniques such as J-cut, rolling edit, ripping edit, L-cut etc.

A L-cut can be defined as a split edit technique which typically allows the audio out point of a clip to be extended beyond the video out point of the clip in order to make the audio from the preceding video clip (scene) to continue playing over the beginning of a subsequent video clip.

Hence, L-cut is a type of cut that extends an audio clip from a preceding video clip to a subsequent video clip.

Assume that the message M has to be transmitted. Given the generator function G for the CRC scheme, calculate CRC. What will be the bit sequence that actually gets transmitted?

Answers

Let the message be M : 1001 0001   and the generator function is G : 1001

Solution :

CRC sender

                                               

1001     | 1001  0001  000

             1001                            

            0000  0001            

                        1000

                       1001            

                        0001  000

                                 1 001  

                                 0001

Here the generator is 4 bit - 1, so we have to take three 0's which will be replaced by reminder before sending to received--

eg    1001  0001  001    

Now CRC receiver

                                                   

1001         | 1001    0001   001

                1001                          

                 0000 0001

                            1001                  

                            1000

                           1001              

                            0001  001

                           0001  001      

                                   0000

No error

what are the characteristics needed in a secure hash function?​

Answers

Cryptographic hash functions are utilized in order to keep data secured by providing three fundamental safety characteristics: pre-image resistance, second pre-image resistance, and collision resistance.

The characteristic needed in a secure hash function is image resistance functions.

What are the characteristics?

Characteristics refer to any feature or trait of any object which provides any information about the concept. These are unique in nature and makes difference with one another.

A group of cryptographic operations called Secure Hash Algorithms is designed to safeguard data. It functions by hashing the data to change it. It applies a severe value to a text before using a private key to encrypt the hash code.

One of a good hash function's essential characteristic include  The data being hashed completely determines the hash result, and the hash function uses all of the input data.

The characteristics necessary for a secure hash function are Avoiding collisions Resistance to the preimage and subsequent resistance to the preimage.

Learn more about the Secure Hash function, here:

https://brainly.com/question/2642496

#SPJ6

Car owners are worried with the fuel consumption obtained by their vehicles. A car owner wants trail of several
tankful (the amount a tank can hold) of fuel by recording kilometers driven and gallons used for each tankful. Write
a program that will take input the kilometers driven and gallons used for each tankful. Your program should compute
and display the kilometers per gallon obtained for each tankful. After processing all input information, the program
should compute and display the combined miles per gallon obtained for all tankful.

Answers

Answer:

Program written in Python:

Please note that -> is used for indentation purpose

count = int(input("Number of vehicles: "))

totaldist = 0; totalgall = 0

for i in range(count):

-> gallon = int(input("Gallons: "))

-> distance = int(input("Kilometers Travelled: "))

-> totaldist = totaldist + distance

-> totalgall = totalgall + gallon

-> rate = distance/gallon

-> print("Kilometer/Gallon: "+str(rate))

print("Miles/Gallon: "+str(totaldist * 1.609/totalgall))

Explanation:

The program uses loop to ask for distance and gallons used by each vehicles.

At the end of the loop, the program divided the total distance by all vehicles in miles by total gallon user by all vehicles

[This line prompts user for number of vehicles]

count = int(input("Number of vehicles: "))

[This line initialised total distance and total gallon to 0]

totaldist = 0; totalgall = 0

[This iterates through number of vehicles]

for i in range(count):

[This prompts user for gallons used]

gallon = int(input("Gallons: "))

[This prompts user for distance traveled]

distance = int(input("Kilometers Travelled: "))

[This calculates total distance]

totaldist = totaldist + distance

[This calculates total gallons]

totalgall = totalgall + gallon

[This calculates the rate by each vehicles: kilometres per gallon]

rate = distance/gallon

[This prints the calculated rate]

print("Kilometer/Gallon: "+str(rate))

[The iteration ends here]

[This calculates and prints the rate of all vehicles. The rate is calculated by dividing total distance in miles by total gallons used]

print("Miles/Gallon: "+str(totaldist * 1.609/totalgall))

Match the AI artist with their creation:

Artists:
David Cope, Brian Foo, Jordan Wirfs Brock, Refik Amarillo, Obvious (with GAN created by Robbie Barrat)

Creations:
Experiments in Music Intelligence (EMI), Portrait of Edmond de Bellamy, Mixed Attraction, Machine Hallucinations, Sounds of a Volatile Stock Market

Answers

Explanation:

Experiments in Music Intelligence (EMI) ⇒ David Cope

Portrait of Edmond de Bellamy  ⇒ Obvious (with GAN created by Robbie Barrat)

Mixed Attraction & Machine Hallucinations ⇒ Refik Amarillo and  Brian Foo

Sounds of a Volatile Stock Market ⇒ Jordan Wirfs Brock

Write bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept odd numbers only. Print invalid input if given input is not valid.

Answers

Answer:

Bash script which takes array as an input of size 10 bind its even indexes to accept even values and odd indexes to accept odd numbers only is explained below in detail.

Explanation:

Even digits at an even table and odd digits at an odd table

Given an array of size n comprising an equal number of odd and even digits. The difficulty is to manage the numbers in such an approach that all the even digits get the even table and odd digits get the odd table. The necessitated auxiliary space is O(1).

Examples :

Input : arr[] = {8, 5, 1, 12, 6, 3}

Output : 3 6 1 12 5 8

Input : arr[] = {7, 9, 10, 19, 13, 18, 21, 20, 4, 14}

Output : 18 9 10 19 20 7 14 13 4 21

(Language is in Java)

Write an interactive version of the InchesToFeet class that accepts the inches value from a user.



class InchesToFeetInteractive
{
public static void main(String[] args) {
// Modify the code below
final int INCHES_IN_FOOT = 12;
int inches = 86;
int feet;
int inchesLeft;
feet = inches / INCHES_IN_FOOT;
inchesLeft = inches % INCHES_IN_FOOT;
System.out.println(inches + " inches is " +
feet + " feet and " + inchesLeft + " inches");
}
}​

Answers

import java.util.Scanner;

public class InchesToFeetInteractive

{

public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   final int INCHES_IN_FOOT = 12;

   int inches = scan.nextInt();

   int feet;

   int inchesLeft;

   feet = inches / INCHES_IN_FOOT;

   inchesLeft = inches % INCHES_IN_FOOT;

   System.out.println(inches + " inches is " +

   feet + " feet and " + inchesLeft + " inches");

   }

}

We import the Scanner class and then initialize a new Scanner named scan. We then get an integer representation of inches from the user and calculate the feet and inches from the value entered by the user.

Other Questions
Which of the following landforms (physical features) was formed when two landmasses collided?Hawaiian IslandsMariana TrenchHimalayan Mountains Is Nuclear Energy renewable? Why or why not? Use in your own words. Multiple Choice: Choose the correct answer for questions 1 and 2.1. The height of Trisha, a 17-year-old female student, is in the lower quartile for height for girls aged 16 to 18. This statement means:A. Trisha's height is average for her age.B. Trisha is shorter than 25% of girls aged 16 to 18.C. Trisha is shorter than 75% of girls aged 16 to 18.D. Trisha is taller than 75% of girls aged 16 to 18.What is the answer Gene therapy has been used to treat and cure cystic fibrosis. Cystic fibrosis is caused by a in a single gene. Surface waves travel faster than body waves. O True O False Identify three examples of Enlightenment Ideas in the information and sources about the British Abeltiin Movement in the 18th and 19th centuries. C. Cerebral cortex if you cant see it why do some countries have absolute advantages over others when producing certain products?A) they practiced specialization and automobiles and textiles B) they have a technological advantage in the computer industry C) they have higher salaries for offer skilled workers D) they can produce a large quantity of a good and lower cost What is the best equation for the line of best fit for the following graph?Use points (3, 67) and (7.5, 49).PLS WILL MARK Brainliest Help! Asap! 25 Points!If someone you love and care about became HIV positive, would you feel differently about him/her? Explain. 2) Juan had $622 in his checking account. He deposited a check for $180, and $100cash. However, he recently had an overdraft on his debit card and had a $35 overdraftfee. What is his new account balance after the deposits and the fee? Fill in the blank with the Spanish equivalent of the word in parentheses.El libro est (on top of) el escritorio.A. porB. sobreC. entreD.en The sum of two numbers is 59. The smaller number is 5 less than the larger number. What are the numbers?Help please evaluate 2/3 times -4 times 9 divided by -2 divided by 1/2 what is 2x=9 I need help asap plzzzzz Please help ACTUALLY ANSWER i dont understand CER writing?this is an example:Claim: cookies are good because they are goodevidence : cookies have 1 billion protien- the new york timesreasoning: (what would i put here???)PLEASE HELP AND ACTUALLUY ANSWER A cell turns glucose from thefood we eat into energy for ourbody to use. What cell functiondoes this describe? Please help thank you!!! what the elements of arts and principles of design of Balik (Indonesia) Loi kratong (Thailand)Merlion (Singapore)Angkor Wat (Combodia)Way kite (Malysia)paki sagot what is NAICS and its importance?