Sentence Deobfuscate Name this file deobfuscate.cpp Hints: Don’t overthink this problem. Prompt the user to enter a collection of sentence words (i.e., words in the sentence), with the spaces removed (i.e., the obfuscated sentence) and with words that are less than ten (10) letters each. Then prompt the user to enter a sequence of numbers that represent the length of each corresponding sentence word (i.e. the deobfuscated details). Output the deobfuscated sentence. Convert char c to int by subtracting 48 (‘0’) from c.
Sample Execution:
Please enter obfuscated sentence: Thisisasentence
Please enter deobfuscation details: 4218
Deobfuscated sentence: This is a sentence

Answers

Answer 1

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   string text,lengt;

   cout<<"Please enter obfuscated sentence: ";    cin>>text;

   cout<<"Please enter deobfuscation details: ";    cin>>lengt;

   string t1, t2;

   int kount = 0;

   for(int i = 0;i<lengt.length();i++){

   kount+=(int)(lengt[i]-'0');

   t1 = text.substr(0, kount);

   t2 = text.substr(kount, text.length()-1);

   text = t1 +" "+ t2;

   kount++;   }

   cout<<"Deobfuscated sentence: "<<text;

   return 0; }

Explanation:

This declares the text and the deobfuscation details as string

   string text,lengt;

This prompts for the sentence

   cout<<"Please enter obfuscated sentence: ";     cin>>text;

This prompts for the details

   cout<<"Please enter deobfuscation details: ";     cin>>lengt;

t1 and t2 are declared as string. They are used to split the texts into 2 parts

   string t1, t2;

This declares and initializes a count variable to 0  

   int kount = 0;

This iterates through the deobfuscation details

for(int i = 0;i<lengt.length();i++){

This gets each deobfuscation character

   kount+=(int)(lengt[i]-'0');

The next two instructions splits the text into 2

This gets from 0 to kount.

   t1 = text.substr(0, kount);

This gets from kount to the last index

   t2 = text.substr(kount, text.length()-1);

The new string or sentence is calculated here

   text = t1 +" "+ t2;

The kount variable is incremented by 1

   kount++;   } The loop ends here

This prints the new sentence

   cout<<"Deobfuscated sentence: "<<text;

See attachment for program file


Related Questions

Write a SELECT statement that returns these four columns from the Products table: The list_price column A column that uses the FORMAT function to return the list_price column with 1 digit to the right of the decimal point A column that uses the CONVERT function to return the list_price column as an integer A column that uses the CAST function to return the list_price column as an integer Use column aliases for all columns that contain a function.

Answers

Answer:

See explanation below

Explanation:

SELECT list_price,

            FORMAT(list_price, 1) AS formatted_list_price,

            CONVERT(INT, list_price) AS converted_list_price,

            CAST (list_price AS INT) AS casted_list_price

 FROM products_table;

In SQL, the SELECT statement is used to initiate a query. It lists the variables that will be contained in the output, just like choosing items on a list, with each item being separated by a comma.

The FORMAT, CONVERT, CAST are all functions that are used to change the format of a value. Their formats are;

FORMAT - Format (value, decimal places)CONVERT - Convert (datatype, value)CAST -         Cast ( value AS datatype

In SQL, aliases are used to rename variables (usually those that contain functions) to ones taste. The AS is used after the function and the new name follows right after.

Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2) test, (3) assignment, (4) exam, and (5) practice scores. The program should use variables, cout, cin, getline(), type casting, and output manipulators. The user should enter the name of the student and scores ranging from 0 to 100 (integer) for each grading item. The final score is the sum of all grading items. The average score is the average of all grading items.

Answers

Answer:

#include <iomanip>

#include<iostream>

using namespace std;

int main(){

char name[100];

float classp, test, assgn, exam, prctscore,ave;

cout<<"Student Name: ";

cin.getline(name,100);

cout<<"Class Participation: "; cin>>classp;

while(classp <0 || classp > 100){  cout<<"Class Participation: "; cin>>classp; }

cout<<"Test: "; cin>>test;

while(test <0 || test > 100){  cout<<"Test: "; cin>>test; }

cout<<"Assignment: "; cin>>assgn;

while(assgn <0 || assgn > 100){  cout<<"Assignment: "; cin>>assgn; }

cout<<"Examination: "; cin>>exam;

while(exam <0 || exam > 100){  cout<<"Examination: "; cin>>exam; }

cout<<"Practice Score: "; cin>>prctscore;

while(prctscore <0 || prctscore > 100){  cout<<"Practice Score: "; cin>>prctscore; }

ave = (int)(classp + test + assgn + exam + prctscore)/5;

cout <<setprecision(1)<<fixed<<"The average score is "<<ave;  

return 0;}

Explanation:

The required parameters such as cin, cout, etc. implies that the program is to be written in C++ (not C).

So, I answered the program using C++.

Line by line explanation is as follows;

This declares name as character of maximum size of 100 characters

char name[100];

This declares the grading items as float

float classp, test, assgn, exam, prctscore,ave;

This prompts the user for student name

cout<<"Student Name: ";

This gets the student name using getline

cin.getline(name,100);

This prompts the user for class participation. The corresponding while loop ensures that the score s between 0 and 100 (inclusive)

cout<<"Class Participation: "; cin>>classp;

while(classp <0 || classp > 100){  cout<<"Class Participation: "; cin>>classp; }

This prompts the user for test. The corresponding while loop ensures that the score s between 0 and 100 (inclusive)

cout<<"Test: "; cin>>test;

while(test <0 || test > 100){  cout<<"Test: "; cin>>test; }

This prompts the user for assignment. The corresponding while loop ensures that the score s between 0 and 100 (inclusive)

cout<<"Assignment: "; cin>>assgn;

while(assgn <0 || assgn > 100){  cout<<"Assignment: "; cin>>assgn; }

This prompts the user for examination. The corresponding while loop ensures that the score s between 0 and 100 (inclusive)

cout<<"Examination: "; cin>>exam;

while(exam <0 || exam > 100){  cout<<"Examination: "; cin>>exam; }

This prompts the user for practice score. The corresponding while loop ensures that the score s between 0 and 100 (inclusive)

cout<<"Practice Score: "; cin>>prctscore;

while(prctscore <0 || prctscore > 100){  cout<<"Practice Score: "; cin>>prctscore; }

This calculates the average of the grading items

ave = (int)(classp + test + assgn + exam + prctscore)/5;

This prints the calculated average

cout <<setprecision(1)<<fixed<<"The average score is "<<ave;  

Which of the following terms is associated with instant messaging?
A. buddy list
B.subject heading
C.Save As
D.texting

Answers

D.

Texting is associated with instant messaging

Answer: A buddy list is a term that is associated with instant messaging (IM)

Have a wonderful day :D

Explanation:

What is the value of: 1 + int(3.5) / 2?
Select one:
a. 2
b. 2.25
C. 2.5
d. 3

Answers

Answer:

C (2.5)

Explanation:

int(3.5) = 3

So, using order of operations, (3/2)+1=2.5

The value of the expression value of: 1 + int(3.5) / 2 is known to be option C, which is (2.5).

What is the expression about?

In maths, an expression is known to be the composition of numbers, functions such as addition, etc.

Note that int(3.5) = 3

Therefore, using the given order of operations, (3/2)+1

=2.5

Therefore the answer =2.5 is correct.

Learn more about Expression  from

https://brainly.com/question/723406

#SPJ2

You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of this word in a text file. There should be no repetition of letters in permutation (i.e. in our example, bacde is a valid permutation but bbcde is invalid. Use of library functions for generation of permutations is NOT allowed.
The text file containing the output should be named as q3out.txt. Each word of the output must be on a separate line in the text file. The 5-letter input word should be read by your program from the console. Provide comments in your code. Submit your C code, and the q3out.txt file for the following inputs:
(a) parba
(b) arbca

Answers

Answer:

See attachment 1 for code

See attachment 2 for the output of permuting letters of parba

See attachment 3 for the output of permuting letters of arbca

Explanation:

The program was implemented in C

The program uses a recursive function letterpermutation and a swap function to successfully implement the requirement of this question.

The letterpermutation function is defined here

void letterpermutation(char *mystring, int index1, int index2) {  

This lets the program writes to a file

  FILE *fptr;

This opens the file in an appending mode

  fptr = fopen("q3out.txt","a");

int i;

This checks for unique strings.

if (index1 == index2) {

If found, this appends the string to the text file

   fprintf(fptr,"%s\n",mystring); }

If otherwise

else{  

This iterates through the string

for (i = index1; i <= index2; i++)   {

The swap function is called to swap the characters of the string

 swap((mystring+index1), (mystring+i));  

This calls the function, recursively

letterpermutation(mystring, index1+1, index2);  

This further swaps the characters of the string

swap((mystring+index1), (mystring+i));  

} } }  

The swap function begins here and what it literally does is that it swaps characters of the input string to create a new string

void swap(char *ch1, char *ch2) {  

char temp;  

temp = *ch1;  *ch1 = *ch2;  *ch2 = temp; }

The main function begins here

int main() {  

This declares and initializes the string

char mystring[] = "ABCd"; // The string here can be changed

This calls the function to permute the string

letterpermutation(mystring, 0, strlen(mystring)-1);  

return 0; }

Which three major objects are built into the JavaScript language?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Document, Object, Model.
B

Canvas, Geolocation and Drag.
C

None, JavaScript is object-based not object-oriented.
D

Document, Navigator, Array.

Answers

Answer:

jddjjddjdjdjjsjsjejejejjejejejjdjdjeje

Pretty sure, the answer is: None, JavaScript is object-based not object-oriented.

The IBM system/370 architecture uses a two-level memory structure and refers to the two levels as segments and pages, although the segmentation approach lacks many of the features described in Chapter 8. For the basic 370 architecture, the page size may be either 2 KB or 4 KB, and the segment size is fixed at either 64 KB or 1 MB. For the 370/XA and 370/ESA architectures, the page size is 4 KB and the segment size is 1 MB. What advantages of segmentation does this scheme lack

Answers

Answer:

Explanation:

Introductory thought:  

Thinking about the architecture for the IBM System/370 that is fit for giving higher preparing force and more stockpiling limit since it utilizes two-level of memory structure which is known as the segments and caches and the given plan is as per the following:  

In division the address space is isolated into quantities of segments of variable sizes and then again in paging the address space is partitioned into quantities of fixed-sized units that are known as pages.It is more helpful for better utilization of memory. The fundamental architecture for the IBM system/370 architecture the size of the page are for the most part either 2KiloBytes (KB) or 4KB and the size of the segments will be changed from 64KiloBytes to 1MegaBytes.   The two dissimilar kinds of architecture that existed are 370/XA that is the Extended Architecture, also the other is 370/ESA known as the Enterprise Systems Architecture.    The page size is 4KB for the Extended variant and 1MB for the Enterprise Systems Architecture (ESA).

Advantages of segmentation that the given scheme needs to incorporate includes:

In the configuration of the architecture for IBM System/370 the segments are of a fixed size which isn't noticeable for the programmer and as such he will know the interior subtleties and subsequently inside architecture is stowed away from outside gentle.  In IBM system/370 the reference bit is zero for the processor hardware as well as at whatever point another page is stacked into the edge, the reference bit is changed to one after referring to a specific area inside the casing.  The quantity of lines of the page outline table is overseen by the Operating System and a page outline table section is moved to start with one line then onto the next depending on the length of the span of the referenced bit from the page outline which is sets to nothing. Whenever there is a need to supplant the page then the page browsed the line of the longest life non referenced edges.

A(n) _____ is a legal right of ownership of intellectual property.

end-user license

agreement

free and software license

proprietary software license

copyright

Answers

Answer:

copyright

Explanation:

Copyright protects intellectual property. If you own a copyright, you own the legal rights to said property.

Answer:copyright

Explanation:

true or false with reason :- profit and loss account is a real account​

Answers

Answer:

False

Explanation:

Account of expenses, losses, gains, and incomes is called the Nominal account. Profit and Loss Account contains all indirect expenses and indirect incomes of the firm. Therefore, Profit and Loss Account is a Nominal Account and not a real account.

:)

true or false with reason :- carriage inword is carriage on purchases​

Answers

Answer:

True

Explanation:

Carriage on purchases is carriage inward. Explanation: Carriage inwards refers to the transportation costs required to be paid by the purchaser when it receives merchandise it ordered with terms FOB shipping point. Carriage inwards is also known as freight-in or transportation-in.

:)

The information in DNA Is coded in chemical bases adenosine (A) guanine (G) cytosine (C), and thymine (T) We can represent a DNA strand by stringing together the letters representing the appropriate strand. Imagine we are given a list of DNA strands which have arbitrary lengths. Write a single function strand_counter() which takes a list of DNA strands, counts the lengths of each of the words in the list and then calculates and returns the integer maximum_length integer minimum_length, and float average_length
Then write a program which takes in a user-chosen number of strands of arbitrary length as an input and prints out the calculated information
Example input
5
AT
ATCGTCOGGT
TCGCT
TCGATTCCT
TTCATCG
Example output
The longest strand has length 10.
The shortest strand has length 2.
The average length of the strands is 6.6.

Answers

Answer:

c

Explanation:

i think i leard it out my old shcool

how is what happened to fred hampton similar to what is going on in the news today

Answers

Hampton was shot and killed in his bed during a predawn raid at his Chicago apartment by a tactical unit of the Cook County State's Attorney's Office in conjunction with the Chicago Police Department and the FBI; during the raid, Panther Mark Clark was also killed and several others were seriously .

What are the 3 biggest advancements in computers?

Answers

Answer:

abacus . Mesopotamia or China, possibly several thousand years BCE. ...

binary math . Pingala, India, 3rd century BCE. ...

punched card . Basile Bouchon, France, 1725. ...

Explanation:

:)

Explain how data is represent in the computer system

Answers

Explanation:

Computers use binary - the digits 0 and 1 - to store data. A binary digit, or bit, is the smallest unit of data in computing. It is represented by a 0 or a 1. Binary numbers are made up of binary digits (bits), eg the binary number 1001.

Which of the following is a potential concern with having an online profile (1 point)
on your instant messaging service that contains personal information like
your address or favorite hobbies?
A.Your friends may not agree with what you write there.
B.You might misrepresent yourself.
C.You might become a target of users who wish to make inappropriate contact with you.
D.Your personal information might change.

Answers

Answer:

C. You may become a target of users who wish to make inappropriate contact with you.

Explanation:

"We can't a computer use source code

Answers

Answer:

Explanation:

There are two main reasons why you can't access the source code from applications on your computer: It isn't present on your computer. The source code isn't really needed to run the application, the executable is (.exe) The executable is just a bunch of machine code stuff that isn't human readable.

I this is .exe hope it helps

what is the command used to retrieve the java files along with the string existence "Hello world" in it​

Answers

Answer:

java” xargs grep -i "Hello World”

15 points....How do you get money at home by just playing a vidio game.

Answers

You could become a creator or make an account on twitch

Streaming or you tube!

I personally am starting to stream within the new few years but creating content and streaming can make you money by getting subs, bits, and more :)

Which visual aid best matches each description given?

population clusters within a particular country
✔ map

a cross-section of a cell membrane
✔ line drawing

the changes in cell-phone usage from 2000 to the present
✔ graph

an outline of the order of topics given in the speech
✔ handout

Answers

The changes in cell-phone usage from 2000 to the present

The options given above are all correct about the visual aid that best matches each description given.

What are Visual aids?

These are known to be any kind of thing or an instrument that is often used to portray an item or  one that helps people to know something or to remember something.

Conclusively, population clusters within a particular country can be depicted on a  map as well as the other options are also correct.

Learn more about visual aid from

https://brainly.com/question/3610367

I like the impact that the increasing number of social grants may have on the things mothers​

Answers

Answer:

yes. i do too.

Explanation:

What are the short comings of the Napier bones?

Answers

Answer:

Disadvantages of Napier's bone: It became tedious when the multiplication has to be done with big numbers. It was a much elaborate setup. It was made up of 200 rods placed in a special box.

As in previous prelabs, you can enter all the necessary Java code fragments into the DrJava Interactions pane. If you get an error, enter the corrected code. If you get really mixed up, you can reset the interactions pane and try again. Write a while loop that computes the sum of the first 10 positive integers. Write a for loop that computes the sum the first 10 positive integers. For each loop, you should use two variables. One that runs through the first 10 positive integers, and one that stores the result of the computation. To test your code, what is the sum of the first 10 positive integers

Answers

Answer:

public class Main{

public static void main(String[] args) {

 //The While Loop

 int i = 1;

 int sum = 0;

 while(i <=10){

     sum+=i;

     i++;  }

 System.out.println("Sum: "+sum);

 //The for Loop

 int summ = 0;

 for(int j = 1;j<=10;j++){

     summ+=j;  }

 System.out.println("Sum: "+summ); } }

Explanation:

The while loop begins here

 //The While Loop

This initializes the count variable i to 1

 int i = 1;

This initializes sum to 0

 int sum = 0;

This while iteration is repeated until the count variable i reaches 10

 while(i <=10){

This calculates the sum

     sum+=i;

This increments the count variable i by 1

     i++;  }

This prints the calculated sum

 System.out.println("Sum: "+sum);

The for loop begins here

 //The for Loop

This initializes sum to 0

 int summ = 0;

This iterates 1 through 10

 for(int j = 1;j<=10;j++){

This calculates the sum

     summ+=j;  }

This prints the calculated sum

 System.out.println("Sum: "+summ); }

Write a program named Twitter that accepts a user’s message and determines whether it is short enough for a social networking service that does not accept messages of more than 140 characters.

If the message is more than 140 characters, output The message is too long. Otherwise output The message is okay.

Answers

Explanation:

It's a very easy one, Liev:

using System;

class Twitter

{

static void Main()

{

Console.WriteLine("Enter your message");

Console.WriteLine();

string message = Console.ReadLine();

Console.WriteLine();

if (message.Length <= 140)

{

Console.WriteLine("Yes, it's short enough for Twitter");

}

else

{

Console.WriteLine("Sorry, it's too long for Twitter");

}

Console.ReadKey();

}

}

dy
If x2 - y2 = 1, then
dx
1
(a) yx-1
(C) xy-1
(b) -xy-
(d) - yx​

Answers

Answer:

xy-1

Explanation:

Given expression is :

[tex]x^2-y^2=1[/tex] ..(1)

We need to find the value of [tex]\dfrac{dy}{dx}[/tex].

Differentiating equation (1) wrt x.

[tex]\dfrac{d}{dx}(x^2-y^2)=1\\\\2x-2y\times \dfrac{dy}{dx}=0\\\\2y\times \dfrac{dy}{dx}=2x\\\\y\times \dfrac{dy}{dx}=x\\\\\dfrac{dy}{dx}=\dfrac{x}{y}[/tex]

or

[tex]\dfrac{dy}{dx}=xy^{-1}[/tex]

Hence, the correct option is (c) "xy-1".

Implement a class named Rectangle. The class should contain:
1. Two data attributes of type float named width and height that specify the width and the height of the rectangle.
2. A constructor that creates a rectangle with the specified width and height. If no argument is provided, it should use 1.0 for both values. If any input value is negative, the function should raise an exception.
3. Functions get_width and get_height that return the corresponding value
4. The set_width and set_height function that update the values if and only if the input is positive; otherwise do nothing
5. Functions get_area and get_perimeter that return the area and the perimeter of this rectangle respectively.
6. A function rotate that swaps the height and width of a rectangle object.
7. A class variable count that keeps track of the number of rectangles created so far.
8. A class method get_count that returns the above value.
9. An equality operator that returns True if and only if the two rectangles are of the same shape.
10. A __str__ function that returns the information of this rectangle in some readable format.

Answers

Answer:

Explanation:

The following code is written in Python and creates a Rectangle class that performs all the necessary functions mentioned in the question...

from itertools import count

class Rectangle():

   _ids = count(0)

   width = 1.0

   height = 1.0

   def __init__(self, width, height):

       if (width < 0) or (height < 0):

           raise Exception("Sorry, no numbers below zero")

       else:

           self.id = next(self._ids)

           self.width = width

           self.height = height

   def get_width(self):

       return self.width

   def get_height(self):

       return self.height

   def set_width(self, width):

       if width > 0:

           self.width = width

   def set_height(self, height):

       if height > 0:

           self.height = height

   def get_area(self):

       return (self.height * self.width)

   def get_perimeter(self):

       return ((self.height * 2) + (self.width * 2))

   def rotate(self):

       temp = self.height

       self.height = self.width

       self.width = temp

   def get_count(self):

       return self._ids

   def equality(self, rectangle1, rectangle2):

       if rectangle1 == rectangle2:

           return True

       else:

           return False

   def __str__(self):

       return 'Rectangle Object with Height: ' + str(self.height) + ' and Width: ' + str(self.width)

Use the drop-down menus to complete each of the following sentences correctly.

To include someone on an e-mail without others knowing, use the
feature.

Use the
feature to send a file.

Use the
feature to send someone else an e-mail you received.

To allow the main recipient of an e-mail to see who is being included in the message, use the
feature.


is a feature that can be used to respond to someone’s e-mail.

Answers

Answer:

Blind carbon copy (abbreviated Bcc)

Click on the menu item with a paperclip icon that says "Attach a file" or something similar (e.g., "Attach Files")

Click Reply and then select Forward

CC

reply

state and explain application areas where computer are applied​

Answers

Answer:

There are at least five areas that are covered by computer applications, and five of those are business, government, military, manufacturing, and music. There are also other areas such as scientific and the role of technology in our society is growing annually.

Computers have now for several decades brought automation to the table in small, medium, and large businesses. There are word processing and spreadsheet applications for small businesses all the way up to enterprise-wide applications that cover every aspect of a large business such as accounting, inventory, shop floor, management, and feature real-time reporting capability that can give a snapshot glimpse of the financial position of a company at any point in time.

The government has a wide variety of computer applications. Government uses many of the same tools as small to large businesses in desktop type applications and many that are much more advanced that are used in the military.  Manufacturing applications involve computer-aided design and applications that are used to track production from the time a raw material is moved into the warehouse all the way to the production floor and back into the warehouse as a finished good.  

Military only applications include systems that use GPS in missiles to hone in on targets from miles away. There are all kinds of other applications some of which are secret in nature and the public does not become aware of these until a war is underway. Computer applications in music can help to transcribe and compose music as well as provide accompaniment for a musician to practice with.  

Expect the number of computer applications in all of these fields to become more common in the future. Expect many applications to take the place of people to save money in a cash-crunched economy where everyone is looking for more ways to save money and cut costs.

Explanation:

what is digital museum​

Answers

Access hundreds of professional development resources for museum professionals. Museum professionals can benefit at any career stage from student to retiree. Student Membership. Industry Membership. Established Since 1906. Museum Memebership. 501(c)3 Nonprofit Org.

Explanation:

1.Digital museum is a museum exhibition platform that utilizes computer and information technology, on which cultural relics and historical collections can be preserved and displayed in digital format. It is one of the main outcomes of digital curation. Learn more in: The Challenges of Digital Museum

what is falg register​

Answers

Answer:

I dont know the answer

Explanation:

I dont know the answer

If you meant “FLAGS register”, it’s the status register in Intel x86 microprocessors. It contains the current state of the processor.

You are creating a Web document on a mobile device and will be out of your Internet Service Provider's coverage range for the remainder of the day. Which HTML5 API will allow you to continue working on the document?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Canvas
B

Offline Web application
C

Drag-and-drop
D

Geolocation

Answers

a, canvas yuh yuh yuh
Other Questions
Factorise1) 9a^2 - 6a Continental drift occurs as a result ofA) hot, drifting material inside EarthB) strong winds on the surface of EarthC) shifting ocean tides What are the two most common sources for rivers and streams? Name this character or no bobux Find the area of the shaded polygons What is the approximate area of this figure? A. 25 cm B. 29 cm C. 38 cm D. 42 cm Brian is mowing his lawn. He and his family have 7.84 acres. Brian mows 1.29 1 acres on Monday, 0.85 acres on Tuesday, and 3.63 acres on Thursday. How many acres does Brian have left to mow? * 0 2.70 0 20.7 02.07 O 0.207 In order to increase the final momentum of a golf ball, we coulda) follow through when hitting the ballb) increase the force acting on itc) increase the time of contact with the balld) swing as hard as possiblef) All of the above Please help me with number 16 its 5th grade math so it should be easy Which graph represents the equation x=2? The results of a national survey showed that on average, adults sleep 6.3 hours per night. Suppose that the standard deviation is 1.6 hours. (a) Use Chebyshev's theorem to calculate the minimum percentage of individuals who sleep between 3.1 and 9.5 hours. % (b) Use Chebyshev's theorem to calculate the minimum percentage of individuals who sleep between 2.3 and 10.3 hours. % (c) Assume that the number of hours of sleep follows a bell-shaped distribution. Use the empirical rule to calculate the percentage of individuals who sleep between 3.1 and 9.5 hours per day. % How does this result compare to the value that you obtained using Chebyshev's theorem in part (a) Cite evidence from paragraph to answer the reason why whale sharks dont bite or chew. How many digits will be in the quotient?39) 4,6411 digit3 digits2 digits4 digits Consider an ideal gas enclosed in a 1.00 L container at an internal pressure of 18.0 atm. If the gas expands against a constant external pressure of 1.00 atm to a final volume of 10.0 L, what is the work done?Now calculate the work done if this process is carried out in two steps. 1. First, let the gas expand against a constant external pressure of 5.00 atm to a volume of 2.00 L. 2. From there, let the gas expand to 10.0 L against a constant external pressure of 1.00 atm. What is Anti-Slavery? PLS HELP!!! WILL GIVE POINTS & BRAINLIEST!!!!The equilibrium price in the market is $____ per calendar, and the equilibrium quantity is ___ calendars brought and sold per month. Complete the ff table by indicating at each price whether there is a shortage or surplus in the market, the amount of that shortage or surplus, and whether this places upward or downward. Price48 (shortage/surplus) amount ____ Pressure (upward/downward) 32 (shortage/surplus) amount ____ Pressure (upward/downward) In a separate study, 68 rock pocket mice were collected from four different, widely separated areas of dark lava rock. One collecting site was in Sonora, Mexico. The other three were in Chihuahua, Mexico. Dr. Nachman and colleagues observed no significant differences in the color of the rocks in the four locations sampled. However, the dark-colored mice from the three Chihuahua locations were slightly darker than the dark-colored mice from the Sonora population. The entire Mc1r gene was sequenced in all 68 of the mice collected. The mutations responsible for the dark fur color in the Sonora mice were absent from the three different populations of Chihuahua mice. No Mc1r mutations were associated with dark fur color in the Chihuahua populations. These findings suggest that adaptive dark coloration has occurred at least twice in the rock pocket mouse and that these similar phenotypic changes have different genetic bases. 3x < 15Whats the answer? PLEASE HELP WILL GIVE BRAINLIEST IF CORRECT review bernards research plan. then choose the correct way to complete the sentences. Bernard's a. summary b. presentation plan c. research question d. research text list needs to be improved. she can improve it by a. preparing a more effective presentationb. broadening his research question c. finding more legitimate research texts d. shortening his summary What is the best summary of the excerpt?