If you have downloaded this book's source code from the companion Web site, you will find a file named text.txt in the Chapter 12 folder. (The companion Web site is at www.pearsonhighered/gaddis.) The text that is in the file is stored as on sen- tence per line. Write a program that reads the file's contents and calculates the average of words per sentence.

Answers

Answer 1

Answer:

Explanation:

The following python code loops through each line within a file called text.txt and counts all the words, then it divides this count by the number of sentences in the text file. Finally, output the average number of words per sentence.

f = open("text.txt", "r")

all_words = 0

sentences = 0

for x in f:

   list = x.split(' ')

   all_words += len(list)

   sentences += 1

average = all_words / sentences

print("There are an average of " + str(average.__round__()) + " words in each sentence.")

If You Have Downloaded This Book's Source Code From The Companion Web Site, You Will Find A File Named

Related Questions

What does it NOT mean for something to be open source?
It’s available for anyone to use
It’s free for all
It’s available for anyone to modify
Free to use but you have to pay a fee to modify

Answers

Answer:

Free to use but you have to pay a fee to modify

Explanation:

You NEVER have to pay for OPEN SOURCE

9.19 LAB: Words in a range (lists) Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds of a search range. The file should be read using the file.readlines() method. The input file contains a list of alphabetical, ten-letter strings, each on a separate line. Your program should output all strings from the list that are within that range (inclusive of the bounds). Ex: If the input is:

Answers

Answer:

9.2. Métodos del Objeto File (Python para principiantes)

Explanation:

What is the output of the following code?

int x = 6, y = 3, z=24, result=0;

result = 2*((z/(x-y))%y+10);

cout<< result<

Answers

Answer:

The output is 24

Explanation:

Given

The above code segment

Required

The output

We have (on the first line):

[tex]x = 6[/tex]

[tex]y = 3[/tex]

[tex]z=24[/tex]

[tex]result=0[/tex]

On the second line:

[tex]result = 2*((z/(x-y))\%y+10)[/tex]

Substitute the value of each variable

[tex]result = 2*((24/(6-3))\%3+10)[/tex]

Solve the inner brackets

[tex]result = 2*((24/3)\%3+10)[/tex]

[tex]result = 2*(8\%3+10)[/tex]

8%3 implies that, the remainder when 8 is divided by 3.

The remainder is 2

So:

[tex]result = 2*(2+10)[/tex]

[tex]result = 2*12[/tex]

[tex]result = 24[/tex]

Hence, the output is 24

Create a C++ program to input a list of positive numbers
from the keyboard and find the average. The list is terminated with the value -99 (Sentinel
input value).​

Answers

Answer:

can you help me please? https://brainly.com/question/23169922

Explanation:

6.22 LAB: Output values below an amount - methods
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value. Assume that the list will always contain less than 20 integers.

Ex: If the input is:

5 50 60 140 200 75 100
the output is:

50 60 75
The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75. For coding simplicity, follow every output value by a space, including the last one.

Such functionality is common on sites like Amazon, where a user can filter results.

Write your code to define and use two methods:
public static void getUserValues(int[] myArr, int arrSize, Scanner scnr)
public static void outputIntsLessThanOrEqualToThreshold(int[] userValues, int userValsSize, int upperThreshold)

Utilizing methods will help to make main() very clean and intuitive.


My Code & Error Message Attached
import java.util.Scanner;

public class LabProgram {

public static void GetUserValues(int[] myArr, int arrSize, Scanner scnr){
int i;
for(i=0;i myArr[i] = scnr.nextInt();
}
}

public static void outputIntsLessThanOrEqualToThreshold(int[] userValues, int userValsSize, int upperThreshold) {
int i;
for(i=0;i if(userValues[i] <= upperThreshold)
System.out.print(userValues[i]+" ");
}

}

public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int[] userValues = new int[20];
int upperThreshold;
int numVals;

numVals = scnr.nextInt();
GetUserValues(userValues, numVals, scnr);

upperThreshold = scnr.nextInt();
outputIntsLessThanOrEqualToThreshold(userValues, numVals, upperThreshold);
System.out.println();

}
}

Answers

Answer:

hope this helps.

Explanation:

n = int(input())

lst = []

for i in range(n):

lst.append(int(input()))

threshold = int(input())

for x in lst:

if x < threshold:

print(x)

Following are the Java program to find the less number from 100 in 5 number of the array:

Java Program to check array numbers:

please find the code file in the attachment.

Output:

Please find the attached file.

Program Explanation:

import package.Defining class LabProgram Inside the class two methods "GetmyArr, outputIntsLessThanOrEqualToThreshold"  is defined that takes three variable inside the parameters.In the "GetmyArr" method it takes one array and one integer variable and a scanner that inputs the array value "myArr" which limits set into the "arrSize" variable. In the "outputIntsLessThanOrEqualToThreshold" method it takes three parameters "myArr, arrSize, and upperThreshold". In this, it checks array value is less than "upperThreshold", and prints its value.Outside this main method is defined that defines array and variable and class the above method.

Find out more about the java code here:

brainly.com/question/5326314

how can a computer be used by a manager of a shopping mall​

Answers

Answer:

- used to look at security cameras

- used to buy supplies for the mall (maintenance)

- billing

Answer:

With growing square footage of shopping malls, however, comes the challenge of managing these super structures. Shopping mall managers need to take care of all tenant and building services, including physical security hardware of both the individual tenants’ spaces, the general facility and common areas.

What are some of the security and access control challenges unique to shopping centers and malls?

Multiple tenants across multiple buildings. Access for tenants with their own set of employees needs to be managed efficiently.

Tenant turnover.  When a tenant terminates his lease, his ability to access the space should be completely revoked.  Mall management must be able to do this in a timely manner for the security of the shared property and for the safety of the next tenant.

Expansion, reduction and relocation of tenants within facilities.  While this does not entail revocation of access, mall management must be able to provide smooth transition, in terms of access control to the new space, and denial of access to the previously-occupied space where a new tenant will be moving in.

Security for Shared Entrances and Spaces. Managing access privileges for shared facilities like that in a mall can be challenging. For instance, if a tenant in a mall hires or fires an employee, mall management needs to be informed so they can update access privileges to common entrances and shared spaces. This also applies for maintenance workers, cleaning crews and the like. An efficient access control system allows mall management to control access privileges with ease.

Explanation:

Ralph and his team need to work together on a project. If they need a device that will provide shared storage with access to all team members, which of these devices would work best? *

USB Flash Drive
2 TB HDD installed on one of their computers
BD-RW installed on one of their computers
Network attached storage appliance

Answers

You will need a network attached storage appliance

Write an application that uses String method region-Matches to compare two stringsinput by the user. The application should input the number of characters to be compared andthe starting index of the comparison. The application should state whether the comparedcharacters are equal. Ignore the case of the characters when performing the comparison.

Answers

Answer:

Explanation:

The following program creates a function called region_Matches that takes in two strings as arguments as well as an int for starting point and an int for amount of characters to compare. Then it compares those characters in each of the words. If they match (ignoring case) then the function outputs True, else it ouputs False. The test cases compare the words "moving" and "loving", the first test case compares the words starting at point 0 which outputs false because m and l are different. Test case 2 ouputs True since it starts at point 1 which is o and o.

class Brainly {

   public static void main(String[] args) {

       String word1 = "moving";

       String word2 = "loving";

       boolean result = region_Matches(word1, word2, 0, 4);

       boolean result2 = region_Matches(word1, word2, 1, 4);

       System.out.println(result);

       System.out.println(result2);

   }

   public static boolean region_Matches(String word1, String word2, int start, int numberOfChars) {

       boolean same = true;

       for (int x = 0; x < numberOfChars; x++) {

           if (Character.toLowerCase(word1.charAt(start + x)) == Character.toLowerCase(word2.charAt(start + x))) {

               continue;

           } else {

               same = false;

               break;

           }

       }

       return same;

   }

}

Write a program that simulates a fishing game. In this game, a six-sided die is rolled to determine what the user has caught. Each possible item is worth a certain number of fishing points. The points will remain hidden until the user is finished fishing, and then a message is displayed congratulating the user depending on the number of fishing points gained.

Answers

Answer:

Answered below

Explanation:

//Python code

numberOfCasts = 3

j = 0

fishingPoints = 0

sum = 0

while j < numberOfCasts:

dieNum = randint(1 , 6)

if dieNum ==1:

fishingPoints = 2

elif dieNum == 2:

fishingPoints = 4

elif dieNum == 3:

fishingPoints = 6

elif dieNum == 4:

fishingPoints = 8

elif dieNum == 5:

fishingPoints = 10

elif dieNum ==6:

fishingPoints = 12

sum += fishingPoints

j++

if sum > 30:

print ("Great catch")

elif sum > 10 and sum <= 30:

print("Good catch")

else:

print ("Bad day")

Which statement best describes network security?
Network security means all information is open to the public, the network is not compromised, and everyone has access to the network.
Network security means personal information is kept safe, the network is not compromised, and only authorized users have access.
Network security means everyone has access to the network, the network is not compromised, and no one has authorization to use it.
Network security means everyone has access to the information, the network is not compromised, and only a handful of people are authorized users.

Answers

Answer:

B). Network security means personal information is kept safe, the network is not compromised, and only authorized users have access.

Explanation:

I just did the Assignment on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

FREE YOU KNOW WHAT DIG IN

Answers

Answer:

Thank you so much!!!!!!

Have a great day!

Explanation:

tnx for ponits .........

Create a public class called Catcher that defines a single class method named catcher. catcher takes, as a single parameter, a Faulter that has a fault method. You should call that fault method. If it generates no exception, you should return 0. If it generates a null pointer exception, you should return 1. If it throws an illegal argument exception, you should return 2. If it creates an illegal state exception, you should return 3. If it generates an array index out of bounds exception, you should return 4.

Answers

Answer:

Sorry mate I tried but I got it wrong

Explanation:

Sorry again

what is the full from of CPU?​

Answers

Answer:

CPU is known as Central Processing Unit.

Full form? Like CPU meaning central processing unit?

Which Save As element allows a user to save a presentation on a computer?
Add a Place
OneDrive
Recent
This PC

Answers

Answer:

Option D, This PC allows a user to save a presentation on a computer

Explanation:

If one choses the option C, the file will be saved in the folder in which the user is working. Hence, option C is incorrect.

Like wise option A is also incorrect as it will require user to provide a location as option for saving the file

Option B is also incorrect as it will allow the user to save files in the C drive/D drive or one drive

Option D is correct because if the user choses this option file will be saved on the computer.

Hence option D is correct

Answer:

Option D : This PC allows a user to save a presentation on a computer

Explanation:

Edg 2021

How SPARQL 1.1 has advantage over SPARQL 1.0??​

Answers

SPARQL 1.0 became an official W3C Recommendation on 15 January 2008. On 26 March 2013, the SPARQL Working Group has produced a new W3C Recommendation SPARQL 1.1 that introduces more features to 2008 version. SPARQL is emerging as the de facto RDF query language. Prior to SPARQL, there were some other popular RDF query languages, such as RQL, SeRQL, TRIPLE, RDQL, and so on. The comprehensive...

A large computer repair company with several branches around Texas, TexTech Inc. (TTi), is looking to expand their business into retail. TTi plans to buy parts, assemble and sell computer equipment that includes desktops, monitors/displays, laptops, mobile phones and tablets. It also plans to sell maintenance plans for the equipment it sells that includes 90-day money back guarantee, 12-month cost-free repairs for any manufacturing defects, and annual subscription for repairs afterwards at $100 dollars per year. As part of a sales & marketing campaign to generate interest, TTi is looking to sell equipment in 5 different packages: 1. Desktop computer, monitor and printer 2. Laptop and printer 3. Phone and tablet 4. Laptop and Phone 5. Desktop computer, monitor and tablet TTi plans to sell these packages to consumers and to small-and-medium businesses (SMB). It also plans to offer 3-year lease terms to SMB customers wherein they can return all equipment to the company at the end of 3 years at no cost as long as they agree to enter into a new 3-year lease agreement. TTi has rented a warehouse to hold its inventory and entered into contracts with several manufacturers in China and Taiwan to obtain high-quality parts at a reasonable price. It has also hired 5 sales people and doubled its repair workforce to meet the anticipated increase in business. TTi has realized that it can no longer use Excel spreadsheets to meet their data and information needs. It is looking to use open source and has decided to develop an application using Python and MySQL. Your team has been brought in to design a database that can meet all of its data needs. Create a report that contains the following:

Required:
a. Data requirements of TTi: What are the critical data requirements based on your understanding of TTI business scenario described above.
b. Key Entities and their relationships
c. A conceptual data model in MySQL

Answers

Answer:

hecks

Explanation:

nah

There are 2.54 centimeters in an inch, and there are 3.7854 liters in a U.S. gallon. Create a program named MetricConversion. Its main() method accepts an integer value from a user at the keyboard, and in turn passes the entered value to two methods. One converts the value from inches to centimeters and the other converts the same value from gallons to liters.

Answers

Answer:

Explanation:

The following Java code creates the program which calls asks the user for an input and then passes that input into two methods toInches, and toGallons. Then the main method saves the returned values in variables and prints out a statement for each.

import java.util.Scanner;

 

class Brainly {

   static Scanner in = new Scanner(System.in);

   public static void main(String[] args) {

      System.out.println("Enter a value: ");

      int answer = in.nextInt();

      double inches = toInches(answer);

      double gallons = toGallons(answer);

       System.out.println("There are " + inches + " inches in " + answer + " centimeters");

       System.out.println("There are " + gallons + " gallons in " + answer + " liters");

   }

   public static double toInches(int centimeters) {

       return (centimeters / 2.54);

   }

   public static double toGallons(int liters) {

       return (liters / 3.7854);

   }

}

what was original name
whoever answers first gets brainly crown

Answers

Answer:

BackRub

Explanation:

In order to make burger a chef needs at least the following ingredients: • 1 piece of chicken meat • 3 lettuce leaves • 6 tomato slices Write down a formula to figure out how many burgers can be made. Get values of chicken meat, lettuce leaves and tomato slices from user. Hint: use Python’s built-in function

Answers

Answer:

how many burgers would you have to make ?

Explanation:

this is a question ot an answer

how many stages needed to have powerful amplifier?​

Answers

Power amplifier stages in a real circuit. Circuit diagram of a three stage practical audio power amplifier is shown in the figure below. Small signal transistor Q1 and its associated components form the voltage amplification stage.

Answer:

Generally you should pick an amplifier that can deliver power equal to twice the speaker's program/continuous power rating. This means that a speaker with a “nominal impedance” of 8 ohms and a program rating of 350 watts will require an amplifier that can produce 700 watts into an 8 ohm load.

Hubs connect network hosts in which configuration?

Answers

Answer:

A high availability hub is not required to enable or use the self-describing agent. You can optionally configure a high availability hub for improved availability and recovery if the hub fails. Network Layer – The network layer is responsible for creating a routing table, and based on the routing table, forwarding the input request. Some of the Devices used in the Network Layer are, Routers: A router is a switch-like device that routes/forwards data packets based on their IP addresses.

Explanation:

(hope this helps can i plz have brainlist :D hehe)

3. Discuss microprocessor components, chips,
and specialty processors.


5. Define expansion slots, cards,including
graphics cards, network interface cards, wireless
network cards, and SD cards.​

Answers

Answer:

3

Microprocessor Components

Control Unit.

I/O Units.

Arithmetic Logic Unit (ALU)

Registers.

Cache.

The chips capacities express the word size, 16 bits, 32 bits, and 64 bits. The number of bits determined the amount of data it can process at one time

The specialty processors are specifically designed to handle special coprocessor and Graphics Processing Unit (GPU), like displaying 3D images or encrypting data.

5

slot machine, known variously as a fruit machine, puggy, the slots, poker machine/pokies, fruities or slots, is a gambling machine that creates a game of chance for its customers.

A video card (also called a graphics card, display card, graphics adapter, or display adapter) is an expansion card which generates a feed of output images to a display device (such as a computer monitor).

network interface controller is a computer hardware component that connects a computer to a computer network. Early network interface controllers were commonly implemented on expansion cards that plugged into a computer bus.

wireless network interface controller is a network interface controller which connects to a wireless network, such as Wi-Fi or Bluetooth, rather than a wired network, such as a Token Ring or Ethernet.

The standard SD card has dimensions of 32 mm by 24 mm by 2.1 mm, a storage capacity of up to 4 GB. Typical levels of performance are not as high as the other types of SD memory card mentioned below.

good luck!!!

What can a developer do to customize a macro beyond the simple tools of the Macro Design tab?
O Edit the macro in the SQL view.
O Make the macro a security risk.
O Eliminate restricted actions from the macro.
O Edit the macro in the Visual Basic language.

Answers

Answer: D is the answer I did the assignment.

Explanation:

The bag class in Chapter 5 has a new grab member function that returns a randomly selected item from a bag (using a pseudorandom number generator). Suppose that you create a bag, insert the numbers 1, 2, and 3, and then use the grab function to select an item. Which of these situations is most likely to occur if you run your program 300 times (from the beginning): A. Each of the three numbers will be selected about 100 times. B. One of the numbers will be selected about 200 times; another number will be selected about 66 times; the remaining number will be selected the rest of the time. C. One of the numbers will be selected 300 times; the other two won't be selected at all.

Answers

You have to use the 300 added inversatile

When the function below is called with 1 dependent and $400 as grossPay, what value is returned?

double computeWithholding (int dependents, double grossPay)

{
double withheldAmount;
if (dependents > 2)
withheldAmount = 0.15;
else if (dependents == 2)
withheldAmount = 0.18;
else if (dependnets == 1)
withheldAmount = 0.2;
else // no dependents
withheldAmount = 0.28;
withheldAmount = grossPay * withheldAmount;
return (withheldAmount);
}

a. 60.0
b. 80.0
c. 720.0
d. None of these

Answers

Answer:

b. 80.0

Explanation:

Given

[tex]dependent = 1[/tex]

[tex]grossPay = \$400[/tex]

Required

Determine the returned value

The following condition is true for: dependent = 1

else if (dependnets == 1)

withheldAmount = 0.2;

The returned value is calculated as:

[tex]withheldAmount = grossPay * withheldAmount;[/tex]

This gives:

[tex]withheldAmount = 400 * 0.2[/tex]

[tex]withheldAmount = 80.0[/tex]

Hence, the returned value is 80.0

Find the reference angle of the angle = 850°​

Answers

Answer:

magine a coordinate plane. Let’s say we want to draw an angle that’s 144° on our plane. We start on the right side of the x-axis, where three o’clock is on a clock. We rotate counterclockwise, which starts by moving up. We keep going past the 90° point (the top part of the y-axis) until we get to 144°. We draw a ray from the origin, which is the center of the plane, to that point. Now we have a ray that we call the terminal side. But we need to draw one more ray to make an angle. We have a choice at this point. Our second ray needs to be on the x-axis. If we draw it from the origin to the right side, we’ll have drawn an angle that measures 144°. If we draw it to the left, we’ll have drawn an angle that measures 36°. This second angle is the reference angle. It’s always the smaller of the two angles, will always be less than or equal to 90°, and it will always be positive. Here’s an animation that shows a reference angle for four different angles, each of which is in a different quadrant. Notice how the second ray is always on the x-axis.

Explanation:

Create a class called Dot for storing information about a colored dot that appears on a flat grid. The class Dot will need to store information about its position (an x-coordinate and a y-coordinate, which should both be integers) and its color (which should be a string for now). You can choose what to call your attributes, but be sure to document them properly in the class's docstring.

Don't forget that every function definition, including method definitions, must have a docstring with a purpose statement and signature.

Answers

Answer:

Explanation:

The following class is written in Python, it has the three instance variables that were requested. It also contains a constructor that takes in those variables as arguments. Then it has functions to update the positions of the Dot and change its color. The class also has functions to output current position and color.

class Dot:

   """Class Dot"""

   x_coordinate = 0

   y_coordinate = 0

   color = ""

   def __init__(self, x_coordinate, y_coordinate, color):

       """Constructor that takes x and y coordinates as integers and a string for color. It ouputs nothing but saves these argument values into the corresponding instance variables."""

       self.x_coordinate = x_coordinate

       self.y_coordinate = y_coordinate

       self.color = color

   def moveUp(self, number_of_spaces):

       """Moves the Dot up a specific number of spaces that is passed as a parameter. Updates y_position"""

       self.y_coordinate += number_of_spaces

       return ""

   def moveDown(self, number_of_spaces):

       """Moves the Dot down a specific number of spaces that is passed as a parameter. Updates y_position"""

       self.y_coordinate -= number_of_spaces

       return ""

   def moveLeft(self, number_of_spaces):

       """Moves the Dot left a specific number of spaces that is passed as a parameter. Updates x_position"""

       self.x_coordinate -= number_of_spaces

       return ""

   def moveRight(self, number_of_spaces):

       """Moves the Dot right a specific number of spaces that is passed as a parameter. Updates x_position"""

       self.x_coordinate += number_of_spaces

       return ""

   def dot_position(self):

       """Print Dot Position"""

       print("Dot is in position: " + str(self.x_coordinate) + ", " + str(self.y_coordinate))

       return ""

   def dot_color(self):

       """Print Current Dot Color"""

       print("Dot color is: " + self.color)

Which file helps web administrators detect any issues that affect the smooth running of the web server?
A. log
B. cache
C. server
D. client

Answers

Answer:

Server

Explanation:

A web server is computer software and underlying hardware that accepts requests via HTTP, the network protocol created to distribute web pages.

The file helps web administrators detect any issues that affect the smooth running of the web server.

What is net server is a software program ?

A net server is a pc software program and underlying hardware that accepts requests thru HTTP, the community protocol created to distribute net pages.

It is hardware that makes use of HTTP (Hypertext Transfer Protocol) and different protocols to reply to customer requests revamped the World Wide Web. The primary process of an internet server is to show internet site content material via storing, processing and turning in webpages to users.

Read more about the administrators :

https://brainly.com/question/26096799

#SPJ2

The function leap n, which takes an integer n as input, and returns True if the year n is a leap year, and False otherwise. NOTE: Please provide function declaration [2 marks]. Leap years are those that are evenly divisible by 4, except any year that is also evenly divisible by 100 unless that year is also evenly divisible by 400. So, for example, 1996, 2012, and 2020 are all leap years, but 2100, 2200, and 2300 are not leap years, because although they are all evenly divisible by 4, they are also evenly divisible by 100. However, 1600, 2000, and 2400 are leap years, because although they are divisible by 100, they are also divisible by 400. The Haskell interaction may look like: > leap 1996 True > leap 2000 True > leap 2100 False

Answers

Answer:

Explanation:

The following code snippet is a leap year checker written in Haskell which checks to see if the year is a leap year and then outputs a boolean value.

isDivisibleBy :: Integral n => n -> n -> Bool

isDivisibleBy x n = x `rem` n == 0

leap_n :: Integer -> Bool

leap_n year

 | divBy 400 = True

 | divBy 100 = False

 | divBy   4 = True

 | otherwise = False

where

  divBy n = year `isDivisibleBy` n

https://acm.cs.nthu.edu.tw/problem/13144/
The website is the problem, and I need to implement the 13144.h(which is function.h in the 13144.cpp) to get the right answer.
Thanks for your help.

Answers

Answer:

Th.. uh... yea... uh.. I don’t know

Explanation:

Other Questions
is y = 5x + 2 greater than y = 3x + 15 what is the probability that someone will reply to this?A. Oneb. Twoc. Three Help please 10 pointssss On a microscopic scale, the energy change in a system is described by a ___________ a. A change in color or texture b. Measuring the temperature c. A chemical equation d. An odor Which of the following Chinese dynasties was known for having a good government that cared for the people? a. Zhou Dynasty b. Qin Dynasty c. Tang Dynasty d. Han Dynasty How did the keeping your eyes on the prize strategy affect participants? PLEASE HELP !!!!!!! what is the coordinate of the vertex of the following parabola: (x-1)^2=12(y+2)a. (-1, 2)b. (1, 2)c. (1, -2)d. (0, 12) Describe the main conflict in this book (hint: its not bullying)and-What TYPE of conflict is present? Why did the Republic of Texas remain an independent country for nineyears? Why is the gaza strip so important? can somebody please help me out ? middle school math problem help meif i ned hellp what is your reflection about forces and motion? The number of minutes spent talking on the phone, m, and the amount of a cell phone bill, a. What is the independent variable 1. Grammatically speaking, what does parallel structure mean?2. List at least three types of compound elements that should use parallel structure.Write an example of each of the following:3. a comparison in a sentence that uses parallel structure4. a compound element in a sentence that uses parallel structure5. two sentences that use parallel structure find the measure of arc VF. (look at the picture provided) please help Displacement is used to measure A. weight B. mass C. distance D. volume what economy involves mainly farminganswer choicestraditional commandfree-marketmixed Find the length of side x in simplest radical form with a rational denominator.