Python uses sequencing to
A) allow the code to run faster
B) carryt out a series of steps
C) let the computer pick the order of the steps
D) make the code easier to read
plz help this is exammmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm

Answers

Answer 1

Answer:

B: Carry out a series of steps

Explanation:

Sequences is a general term for ordered sets. It tells in a set order what the program needs to do

PogChamp

Answer 2

Answer:

b

Explanation:


Related Questions

define operating system

Answers

Answer:

the software that supports a computer's basic scheduling tasks.

Answer:

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Explanation:

In Python
Write a constructor with parameters self, num_mins and num_messages. num_mins and num_messages should have a default value of 0.

Sample output with one plan created with input: 200 300, one plan created with no input, and one plan created with input: 500
My plan... Mins: 200 Messages: 300
Dad's plan... Mins: 0 Messages: 0
Mom's plan... Mins: 500 Messages: 0

Answers

class Messaging:

   txt = ""

   first = 0

   second = 0

   def __init__(self, num_mins=0, num_messages=0):

       self.txt = input("Who's plan is this? ")

       self.first = num_mins

       self.second = num_messages

   def print_Something(self):

       print(f"{self.txt} Mins: {self.first} Messages: {self.second}")

obj = Messaging(100, 100)

obj.print_Something()

If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.

Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack.

Answers

Normally, the attack comes from an intruder who already studied the victim's behavior.

> The attacker can create a database from the history of browsing of the possible victim and then create an attack based on the victim's behavior of browsing.

> If the attacker has access to the user directory he can put the executables files in those folders.

> If the wi-fi is not secured, the attacker can check the network in order to spread a possible worm.

It is possible to see that are several ways which the attacker can use in order to obtain more information from the victims. But that depends on how deeply the attacker studied the victim.

If an  attacker had watched the behaviors of the users on the computer and has plans to attack, they can:

What is an intruder in cyber security?

The person called an Intruder is known to be a kind of online vulnerability scanner that is said to be a form of cyber security weaknesses that a person may have an exposed systems and  data breaches.

Learn more about attacker from

https://brainly.com/question/24956493

Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (knowledge)

Answers

Answer:

In the clarification section following, the definition of the query is mentioned.

Explanation:

I acknowledge with maybe some opponents that patent security has gone too far. As tech manufacturers say, they already lost a lot of money in future sales in developed countries owing to software piracy. In reality, most consumers living in developed countries also couldn't manage to spend the rates set by certain tech firms, so firms did not lose any actual sales because, even in some developing countries, their pricey tech would essentially not sell mostly on the free market.So then, due to the extremely insufficient need for individuals, the consequences for creativity and competitiveness in the computing industry are restricted. Only the owners of copyright as well as the users with the resources to manage to offer for the pricey software have the opportunity to use it, as both a consequence of increasingly innovating, the market is restricted and weak.We ought to defined as the tendency doctrines: equal use as well as the first sale, to reach an acceptable compromise between someone who has legitimate rights to confidential information against common people who want to view, distribute, and interact the information. The first selling happens after the artist's concept has indeed been purchased out during the first occasion, during which stage the rightful owner loses ownership of the act's work.

In recent times, innovators including adversaries have focused on the use of reverse engineering, supported either by the reasonable-use doctrine of both the copyright Act.

write a function that will prompt the user for his/her age, // weight, and midicholrean count. Then calculate and return their // jedi level (returns a double). Remember to assign the retuned value // to the variable 'jedi_level'.

Answers

Answer:

Explanation:

Assuming that the jedi_level is calculated by adding the age and weight of the individual and then dividing by the midicholrean count we can use the following Java function to grab all the required info from the user and calculate and return the jedi_level.

public static double JediLevel () {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter age: ");

           double age = in.nextDouble();

           System.out.println("Enter weight: ");

           double weight = in.nextDouble();

           System.out.println("Enter midicholrean count: ");

           double midi = in.nextDouble();

           double jedi_level = (age + weight) / midi;

           return jedi_level;

       }

Question 3 (1 point)
What function would you use to find the average rating I gave a video?
Count
Max
Sum
Min
Average
I think it's average but I want to double check

Answers

It says average in the question so it’s most likely not that, and is probably min.

: process that monitors system traffic and adds resources as needed, within set limits


: process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource


: process to determine what volume a system can handle by comparing its performance to standards in the industry

Answers

Process that monitors system traffic and adds resources as needed, within set limits : Auto scaling

Process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource:  Load balancing

Process to determine what volume a system can handle by comparing its performance to standards in the industry : Benchmarking

What is performance?

Performance is the measure of how effectively a particular task is done or in other words maximum output can be obtained from the input.

The process which monitors system traffic and adds resources as needed, within set limits is called as Auto scaling.

Process that allocates tasks to resources to increase efficiency and avoid overloading any one resource is known as Load balancing.

Process to determine what volume a system can handle by comparing its performance to standards in the industry termed as Benchmarking.

Thus, all the terms are defined.

Learn more about performance.

https://brainly.com/question/15466511

#SPJ2

The Apple iPhone includes a settings menu where you can toggle various accessibility options on or off:
Bold Text
oo
Button Shapes
What is the minimum number of bits that can represent those 2 options?

Answers

The minimum amount of bits that can represent these two options is 2 bits.

The minimum amount of bits that can represent the two options is 2 bits.

What are accessibility options?

This is known to be the various accessibility features such as text-to-speech, etc. that can be found on any system or mobile phones.

Conclusively, there is the use of these features in a lot of technologies as it serves as  assistive technology. Note that lowest amount of bits that can represent these two options above is 2 bits as that is the only lowest point it can go.

Learn more about bits from

https://brainly.com/question/19667078

Assistive Technologies: You have just purchased a new computer and, because of a visual impairment, you are having trouble reading the information on the screen. What are your next steps

Answers

Answer:

The definition has been mentioned below and according to the situation described.

Explanation:

If you already have recently purchased a new device and also have a visual disability condition, you increasing considering utilizing a few available assistive resources, such as screen readers, magnifiers, huge-print keyboards, as well as applications and resources for navigating assistance.  These resources are explicitly available for those instances often come pre-installed in a device window throughout today's context.

Question #4
Multiple Select
Which of the following statements are true regarding abstraction? Select 3 options.

O Creating a model must occur before abstraction.

O Refinement is the opposite of abstraction.

O Abstraction provides a way to see a complex situation more clearly.

O The level of abstraction needed depends on the situation and your goals.

O Abstraction is a process where details are added to further define the problem.

Answers

Answer:

B: the level of abstraction needed depends on the situation and your goals

C: refinement is the oppostie of abstraction

E: abstraction provides a way to see a complex situtation more clearly

Explanation:

I just completed the assignemnet and was checking it while I made this answer.

Lauren and her parents reviewed the lesson information on how to stay safe online. When Lauren told her parents that she had been using the password "Computer1” for all of her online accounts, her mother suggested that she change it.

Why did Lauren’s mother suggest she change her password?

It could be easily guessed.
It contained personal information.
It contained only one number.
It contained too many letters.

Answers

it could be easily guessed , the first one

Answer:

A): it could easily be guessed

Explanation:

I got it right thanks to the other person! give them brainiest, please!

(100 Points!)
The ___ search engine is the most common in use today.
A Boolean-based
B Crawler-based
C algorithm-based
D government-based

Answers

Answer:

B

Explanation

just did it on egd 2020

Answer:

Crawler-based

Explanation:

Just took the review

Write a program that computes value of the following arithmetic expression for values of x and y entered by the user: 5.4xy - 12.3y 18.23x - 8.23

Answers

Answer:

Explanation:

The following code is written in Java and first asks the user to enter the values for X and Y, it then saves those values in two different variables and uses them in the arithmetic expression given in the question and solves it. The answer is saved to the variable named result and displayed on the window.

class brainly{

   public static void main(String[] args)

       {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter value for x");

           double valueX = in.nextDouble();

           System.out.println("Enter value for y");

           double valueY = in.nextDouble();

           double result = (5.4 * valueX * valueY) - (12.3 * valueY * 18.23 * valueX) - 8.23;

           System.out.println(result);

       }

   }

How many keys are required, if you are to ensure a secret communication for every possible pair of communicating parties

Answers

Answer:

7140 pairs of key

Explanation:

In calculating the number of pairs of keys required, the formula to be used is

n * (n−1) / 2

So for example, if we're to consider 120 users. This means our n is 120, and thus applying it in the formula would yield the calculation

120 * (120-1) / 2 =

120 * 119 / 2 =

14280 / 2 =

7140 key pairs.

Therefore, we boldly state that be number of pairs of key required is 7140

PLEASE HURRY!!!
Look at the image below!

Answers

Answer:

If the user enters 162.5, the output will be 162.5

Explanation:

Please click thanks button hun

A computer program checks to see if the user of a software program has clicked on a photo. This is an example of a requirement that can be evaluated in
a string statement.
a goto statement.
a global statement.
a conditional statement.

Answers

Answer:

A conditional statement

Explanation:

I just took the review and got it right

Answer:

A conditional statement

Explanation:

I took the test

Which type of evidence should victims collect to help officials catch cyber bullies ?

-home addresses
-birthdays
-social media
-usernames user
-passwords

Answers

Answer:

Social media

Explanation:

Social media and usernames user so that they can find them without any problem : D

Write a function convert (int n, int base) that uses stack to convert a positive integer n to any base between 2 and 9. You may use simple iteration continually divides the decimal number by base and keeps track of the remainder by using a stack. Please use the methods from ADT Stack below. Write a program to test your function.

Answers

Answer:

import java.util.*;

public class DemoStack {

  public static void convert(int n, int base) {

      Stack<Integer> st = new Stack<Integer>();

      int temp = n ;

      while(n !=0) {

         st.push(n % base);

         n = n / base ;

      }

      System.out.printf("The number %d in base %d : ", temp, base);

      while(!st.isEmpty()) {

          System.out.print(st.pop());

      }

  }

  public static void main(String{} args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter number : ");

      int n = sc.nextInt();

      System.out.print("Enter base : ");

      int base = sc.nextInt();

      convert(n, base);

  }

}

Explanation:

Code is written in JAVA.

This code displays:

1) Enter number : 'x'

2) Enter base : 'y'

3) The number 'x' in base 'y' : abcdefg

Hexadecimal representation of a code word CAB

Answers

Answer:

(434142)16

Explanation:

8. Write a function that takes a 2D array as an input and outputs all values greater than 20 into a column array. Use logical indexing array

Answers

Answer:

Follows are the code to this question:

#include<stdio.h>//defining header file

int main()//defining main method

{

  int d[2][2];//defining 2D array

  int i, j;//defining integer variable

  printf("Enter values: \n");//print message

  for(i=0; i<2; i++)//defining for loop for input column value

  {

     for(j=0;j<2;j++)//defining for loop for input row value  

     {

        scanf("%d", &d[i][j]);//input values

     }

  }

  printf("value which is greater than 20: \n ");//print message

  for(i=0; i<2; i++)//defining for loop for print  column value  

  {

     for(j=0;j<2;j++)//defining for loop for print row value

     {

         if(d[i][j]>20)//defining if block that check value is greater then 20

         {

              printf("%d ", d[i][j]);//print values

         }

      }

     printf("\n");//use print for line break

  }

  return 0;

}

Output:

Enter values:  

44

12

11

55

value which is greater than 20:  

44  

55  

Explanation:

In the above-given code, a 2D array "d" and two integer variable "i and j" are defined, in which two for loop are used for input value from the user end.

After accepting the value from the user end, and again use the two for loop, in which, if block is defined, that checks array value is greater than 20 and print its values.

Within the the Assignment05.java file, you must define the following static methods. In the main method, you may program any code that wish to test the methods you have been asked to define.
1) Write (define) a static method named displayGreeting, that takes no arguments and returns no value. When this function is called, it should print the text "Hello, and welcome!".
Example:
displayGreeting() will print Hello, and welcome!
2) Write (define) a static method named displayText, that takes a single String argument and returns no value. When this function is called, it should print the value of the argument that was passed to it.
Examples:
displayText("Hello") will print Hello
displayText("123") will print 123
displayText("abc" + "123") will print abc123
3) Write (define) a static method named printTotal, that takes three int arguments. When this function is called, it should print the sum of the three arguments passed to it. This function should return no value.
Examples:
printTotal(0, 0, 0) will print 0
printTotal(0, 1, 3) will print 4
printTotal(100, 23, 2) will print 125
4) Write (define) a static method named getTotal, that takes three int arguments. When this function is called, it should return the sum of the three arguments passed to it as an int.
Examples:
getTotal(0, 0, 0) will return 0
getTotal(0, 1, 3) will return 4
getTotal(100, 23, 2) will return 125
5) Write (define) a static method named getAverage, that takes three int arguments. When this function is called, it should return the average of the three arguments passed to it as a double.
Examples:
getAverage(0, 0, 0) will return 0.0
getAverage(0, 1, 3) will return 1.33333...
getAverage(100, 13, 7) will return 40.0
6) Write (define) a static method named averageLength, that takes three String arguments. When this function is called, it should return the average length (number of characters) of the String arguments passed to it as a double.
Examples:
averageLength("a", "abc", "ab") will return 2.0
averageLength("hello", "goodbye", "monday") will return 6.0
averageLength("wednesday", "tuesday", "monday") will return 7.33
7) Write (define) a static method named lengthOfShortest, that takes two String arguments. When this function is called, it should return the length (number of characters) of the shortest String argument passed to it as an int.
Examples:
lengthOfShortest("abc", "ab") will return 2
lengthOfShortest("hello", "goodbye") will return 5
lengthOfShortest("thursday", "friday") will return 6
8) Write (define) a static method named stringOfStars, that takes one String argument. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument passed to it.
Examples:
stringOfStars("abc") will return "***"
stringOfStars("Hello, world!") will return "*************"
stringOfStars("0123456789") will return "**********"
9) Write (define) a static method named maxStringOfStars, that takes two String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the longest string argument passed to it.
Examples:
maxStringOfStars("a", "abc") will return "***"
maxStringOfStars("hello", "goodbye") will return "*******"
maxStringOfStars("thursday", "friday") will return "********"
10) Write (define) a static method named midStringOfStars, that takes three String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument with the length that would be in the middle if the lengths of the arguments were arranged in ascending order.
Examples:
midStringOfStars("a", "abc", "ab") will return "**"
midStringOfStars("hello", "goodbye", "yes") will return "*****"
midStringOfStars("123456", "12", "1234") will return "****"

Answers

import java.util.Arrays;

public class Assignment05{

   public static void displayGreeting(){

       System.out.println("Hello, and welcome!");

   }

   public static void displayText(String txt){

       System.out.println(txt);

   }

   public static void printTotal(int a, int b, int c){

       System.out.println(a+b+c);

   }

   public static int getTotal(int a, int b, int c){

       return a+b+c;

   }

   public static double averageLength(String a, String b, String c){

       return (a.length() + b.length() + c.length())/3;

   }

   public static double getAverage(int a, int b, int c){

       return (a + b + c)/3;

   }

   public static int lengthOfShortest(String a, String b){

       if (a.length() > b.length()){

           return b.length();

       }

       else{

           return a.length();

       }

   }

   public static String stringOfStars(String txt){

       String newTxt = "";

       while (newTxt.length() < txt.length()){

           newTxt += "*";

       }

       return newTxt;

   }

   public static String maxStringOfStars(String txt, String txt1){

        String newTxt = "";

       if (txt.length() >= txt1.length()){

         

           while (newTxt.length() < txt.length()){

               newTxt += "*";

       }

           return newTxt;

       }

       else{

             while (newTxt.length() < txt1.length()){

           newTxt += "*";

       }

           return newTxt;

       }

   }

   public static String midStringOfStars(String a, String b, String c){

       String arr[] = {a, b, c};

       Arrays.sort(arr);

       String txt = "";

       while (txt.length() <  arr[1].length()){

           txt += "*";

       }

       return txt;

   }

   public static void main(String[] args){

       displayGreeting();

       displayText("hello");

       printTotal(1,2,3);

       System.out.println(getTotal(2,2,43));

       System.out.println(getAverage(100,13,7));

       System.out.println(averageLength("a", "abc", "ab"));

       System.out.println(lengthOfShortest("abc", "ab"));

       System.out.println(stringOfStars("abcd"));

       System.out.println(maxStringOfStars("a", "bbbbb"));

       System.out.println(midStringOfStars("aaa","aa", "abcedas"));

       

       

   }

}

I hope this helps!

Question #3
Dropdown
What type of data is the result of each of the following lines of code?

str(2.34)
O float
O this causes an error
O int
O string

int('2')
O float
O this causes an error
O int
O string

float(2)
O float
O this causes an error
O int
O string

Answers

Answer:

string, int, float

Explanation:

just took it. have a good one!

Answer: string, int, float

Explanation: got it right on edgen

Please define identity theft

Answers

the action or crime of stealing.

Answer:

Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss

Explanation:

When Nico di Angelo met Mr. D he talked on and on about what?

Answers

Answer:

his mythologic game

Explanation: idk i think

Answer:

The first time he met Mr. D, he called him "The Wine Dude", which irritated the god, but he forgot about it soon after as Nico complimented him.

Which type of competition features many firms, some variety of goods, low barriers to entry, and little control over prices?

Answers

Answer:

Monopolistic competition

Monopolistic competition is characterized by many firms, some variety in products, few barriers to entry, and little control over prices.

Explanation:

Answer: pure competition

Explanation:

Which arithmetic operation is used by a signed binary comparator to determine if two operands are equal

Answers

Answer:

Equality Operators

Explanation:

The equality operators, which are often written as "equal (==), and not-equal (!=)" are technically used by a signed binary comparator to determine if two operands are equal or not equal. They produce 1 in a situation where both operands have equal value, and 0 if they do not have equal value.

Hence, in this case, the correct answer is Equality Operators.

Suppose your user entered a weight of 115.6. What will be the result of the following code?

strWeight = input("Enter your weight in pounds: ")
weight = int(strWeight)
print (weight)

115

115.6

116

An error occurs.

Answers

The answer is 115.

An integer cannot contain decimals points and it rounds down to the nearest whole number.

Answer:

An error occurs.

Explanation:

Answer on edge 2020

Which programming language hides the complexity of data objects and provides a simplified interface?
A.
machine language
B.
assembly language
C.
procedural language
D.
object-oriented language
E.
RAD

Answers

Answer:

D. Object-Oriented Langauge

Explanation:

Answer:

Your answer is D!

Explanation:

From PLATO!

Write a program that accepts the names of three political parties and the number of votes each received in the last mayoral election. Display the percentage of the vote each party received.

Answers

Answer:

Written in Python

parties = []

votes = []

total = 0

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

    total = total + vote

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Explanation:

This declares an empty list for parties

parties = []

This declares an empty list for votes

votes = []

This initializes total votes to 0

total = 0

The following iteration allows user to enter details for party and corresponding votes

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

This calculates the total vote

    total = total + vote

The following iteration prints the required details

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Write a program that asks the user for a string of lowercase letters and numbers. The program should evaluate the string and report the number of vowels ('a', 'e', 'i', 'o', 'u') and numbers ('0', '1', '2', '3', '4', '5', '6', '7', '8', '9') in the string.

Answers

Answer:

Follows are the code to this question:

def vowel(x):#defining a method vowel that accept a parameter

   return(x=='a' or x=='e' or x=='i' or x=='o' or x=='u')#return char value

def number(x):#defining a method number that accept a parameter

   return(x=='0' or x=='1' or x=='2' or x=='3' or x=='4' or x=='5' or x=='6' or x=='7' or x=='8' or x=='9')#return number value

def main():#defining main method

   s=input("Enter a string: ")#defining string variable

   v=0#defining integer variable

   n=0#defining integer variable

   for f in s:#defining for loop for count value

       if vowel(f):#defining if to check vowel

           v=v+1#count vowel value

       elif number(f):#defining elif for count number

           n=n+1#count number value

   print("Total vowels: ",v)#print vowels value

   print("Total numbers: ",n)#print numbers value

main()

Output:

Enter a string: 678qeaft

Total vowels:  2

Total numbers:  3

Explanation:

In the above program code, three methods, "vowel, number and main" is defined, in which "vowel and number" accept an x variable in its parameter and return a value with their respective name.

Inside the main method a string variable "s" is defined that accepts a string value and defines an "n and v" integer variable, and in the for loop, it calls the above methods to use the integer variable to count string and number value and print its calculated value.

Other Questions
A rabbit's fur grows at the rate of 5 over 2 inches per month. How many months will it take the rabbit's fur to grow 15 over 4 inches? Please show your. What is a characteristic of the house of Burgesses Which equation represents the line that passes through the point (2,2) and is parallel to y - 8= 12x ? what is the tone and mood conveyed of the story the crow & the pitcher (ill give brainliest) Choose the correct past tense for these two sentences.Dhabitude les enfants ______(jouer) en dehors.Mais un jour ils _______ (dcider) de jouer dans la maison Write the words for the objects in the drawing.Please help?! In "A Warning Against Passion," what does Bront believe is a good reason to immediately reject the idea of marriage to someone?a.lack of lovec.a feeling of passion for the personb.actual dislike for the persond.a belief that the person has a bad character PLEASE HELPPPP!!! I'VE BEEN STUCK ON THIS PROBLEM FOR A WHILE!!!!A hiker walks due east for a distance of 25.5 km from her base camp. On the second day, she walks 41.0 km North Westtill she discovers the cave she wanted to see. Determine the magnitude and direction of her resultant displacement between the base camp and the cave. For Gods sake, Rose. Leave him alone. Youve got him terrified. You always do this, and the poor kid Who said this? 45 POINTS PLEASE ASAPWrite a three hundred-word essay in which you assess the impact that religion has on a society. Support your conclusions with examples. Here are a few questions to help you get started: Does religion unite people or drive people apart? How do people of different religions interact? Does religion influence political life? How does one's religion influence his or her behavior? Has the impact of religion on society changed over time What inference does the passage support regarding blind spots? A) Blind spots are larger in small, compact automobiles. B) The vehicle driver is to blame for backover accidents. C) Blind spots have only recently become a widespread problem. D) Some readers may be unfamiliar with the phrase blind spots. Why were Georgians less angered by the terms of the Proclamation of 1763 than other colonists? 4. Andy puts $4,000 into an account that offers 3% interest compounded annually. If no additional deposits or withdrawals are made, how much interest will he earn at the end of 6 years? Which equation represents a line that is parallel to y = -2x - 5?A. -2x + y = -5B. x - 2y = -5c. 2x - y = 0D. 2x + y = 7 y + 10x = 3function form explain how the Americans were able to defeat the British Army during the American Revolution. A company's beginning inventory is $160,000, its net purchases are $260,000, and its net sales total $430,000. Its normal gross profit percentage is 35% of sales. Using the gross profit method, how much is ending inventory? Ians hourly wage is $13.25. If he regularly works 40 hours per week, what is his regular weekly pay? Marcelo had $49.13 in his bank account. He paid two fees of $32.50 each, and then he made two deposits of $74.25 each. What is the balance in dollars in Marcelos account now? Which of the following are equivalent expressions? SELECT ALL THAT APPLY.A (x2)5= x7B x9 x4 = x13C x-2 = 1x2D (2x2y5 )3 = 2x5y8E (2x2y5)3 = 8x6y15