What needs changing to make the following code work?

age = 15
print("The user's age is: " + age)

Group of answer choices

Change the print statement to read:
print("The user's age is: " + str(age))

Omit the apostrophe (')

Nothing, the code works as-is

Change the print statement to read:
print("The user's age is: " + int(age))

Answers

Answer 1

Answer:

print("The user/'s age is:" + age)

Explanation:

You can not use apostrophes in strings.


Related Questions

I WILL GIVE BRAINLIEST!!
What process locates a specific set of characters in a data set?
iteration
data analysis
pattern matching
data collection

What is an example of a branching control structure?
if...then
while loop
for loop
do loop

How do we generally alter the parameter to get to the base case?
incrementing the parameter
adding one to the parameter
decrementing the parameter
setting the parameter to zero

When performing a recursion, how do you describe the act of a function calling itself?
recursive case
backward phrase
base case
forward phrase

The following code is for a Python function to represent a recursive function to find the factorial of an integer

def factorial(x):
if x == 1:
return 1
else:
return (x factorial(x-1))
num = 3

print ("The factorial of", num, is, factorial(num))

(Answers) print("The factorial of", num, "is", factorial(num))
else:
return (x * factorial(x - 1))
if x == 1:
return 1
num = 3

Answers

What process locates a specific set of characters in a data set?

Pattern matching

An example of a branching control structure?

if...then

How do we generally alter the parameter to get to the base case?

setting the parameter to zero

When performing a recursion, how do you describe the act of a function?

recursive case

What is Programming?

This refers to the sequence of steps and commands that are given to a computer system to execute a certain task.

Hence, we can see that the following code is for a Python function to represent a recursive function to find the factorial of an integer

def factorial(x):

if x == 1:

return 1

else:

return (x factorial(x-1))

num = 3

print ("The factorial of", num, is, factorial(num))

(Answers) print("The factorial of", num, "is", factorial(num))

else:

return (x * factorial(x - 1))

if x == 1:

return 1

num = 3

Read more about recursive functions here:

https://brainly.com/question/489759

#SPJ1

his primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. what does he do?

Answers

Since his primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires, Lincoln should: C. Enables a 30-day password change policy.

What is a password?

A password can be defined as a string of characters, phrase or word that is designed and developed to distinguish an unauthorized user from an authorized user, especially through an identification and authentication process.

What is a password policy?

A password policy can be defined as a set of rules and standard that are designed and developed by the data security or networking team of an organization, so as to enhance computer security and ensure all password meet the minimum requirements such as:

Password minimum length.Password maximum age.Password combination.

In this scenario, we can reasonably infer and logically deduce that Lincoln should enable a 30-day password change policy for his organization.

Read more on password here: brainly.com/question/19116554

#SPJ1

Complete Question:

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Requires all passwords to contain at least eight alphanumeric characters

Mandates that no password includes words common in an English dictionary

Enables a 30-day password change policy

Forbids a password being changed to any of the previous 10 passwords listed in the password history

Read the following scenario, and then decide if you should upgrade the computer.

You have a desktop that you use primarily for writing essays for school and browsing the web at home. The computer is slowing down some, so you check the date on it. Your computer is six years old. It is amazing that it lasted this long. You probably need a better CPU and more RAM. What should you do?

Do not upgrade.

Upgrade.

Answers

Answer:

Upgrade

Explanation:

Answer:

upgrade.

Explanation:

Which two wildcard characters are supported by the find and replace dialog box in an excel worksheet?.

Answers

Answer:

? , *

Explanation:

you manage a network that has multiple internal subnets. you connect a workstation to the 192.168.1.0/24 subnet. this workstation cannot communicate with any other host on the network. you run ipconfig /all and see the following:

Answers

Based on the configuration written below, the most likely cause of the problem is Incorrect subnet mask.

What is an Incorrect Subnet Mask?

The issue of an Incorrect Subnet Mask will take place if a network uses a subnet mask that is not theirs for its address class, and a client is still said to be configured with the same default subnet mask for the address class, and thus communication tend to fail to some closeby networks.

Therefore, Based on the configuration written below, the most likely cause of the problem is Incorrect subnet mask.

Learn more about subnet mask from

https://brainly.com/question/27418272

#SPJ1

See full question below

You manage a network that has multiple internal subnets. You connect a workstation to the 192.168.1.0/24 subnet.

This workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following:

Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description . . . . . . . : Broadcom network adapter Physical Address. . . . . . : 00-AA-BB-CC-74-EF DHCP Enabled . . . . . . . : No Autoconfiguration Enabled. . . : Yes IPv4 Address . . . . . . . : 192.168.1.102(Preferred) Subnet Mask. . . . . . . . : 255.255.0.0 Default Gateway . . . . . . : 192.168.1.1 DNS Servers . . . . . . . : 192.168.1.20 192.168.1.27

What is the most likely cause of the problem?

Write a function called height_range that accepts a list of integers representing heights in inches as an argument and returns the the difference between the tallest height and the shortest height. Assume that all heights are positive values.

Answers

CODE

def height_range(L):

shortest = min(L)

tallest = max(L)

return tallest - shortest

]

Learn more about functions here:

https://brainly.com/question/24846399

#SPJ4

consider the principles of web server hardening and determine which actions a system administrator should take when deploying a new web server in a demilitarized zone (dmz).

Answers

The principles are:

Secure a guest zoneUse SSH for uploading filesUse the configuration templates provided

What is web server hardening?

Web server hardening involves is known  as the act of altering the configuration file to remove  server misconfigurations.

Note that the act of handling SSL/TSL certificates and its settings is one that makes sure that one  do secure communication that exist between the client and server.

Therefore, The principles are:

Secure a guest zoneUse SSH for uploading filesUse the configuration templates provided

Learn more about web server from

https://brainly.com/question/27960093

#SPJ1

in a small town, there are two providers of broadband internet access: a cable company and the phone company. the internet access offered by both providers is of the same speed.

Answers

No, the markets is not competitive because there are not many sellers, and as such, the two providers will be able to dominate the market.

What is competitiveness in the market?

A competitive market is known to be a kind of a structure where there is nothing like a single consumer or producer that has the power to make changes to the market.

Note that the response to supply and demand tend to change with the supply curve.

Therefore, my response is No, the markets is not competitive because there are not many sellers, and as such, the two providers will be able to dominate the market.

Learn more about markets competitiveness from

https://brainly.com/question/25717627
#SPJ1

Are these markets competitive?

1. In a small town, there are two providers of broadband Internet access: a cable company and the phone company. The Internet access offered by both providers is of the same speed.

A cpu converts the data entered through the keyboard into output displayed on the monitor. True or false?.

Answers

A CPU converts the data entered through the keyboard into output displayed on the monitor. True.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data through the central processing unit (CPU) into an output (information) that could be used by an end user.

What is a CPU?

CPU is an abbreviation for central processing unit and it can be defined as the main components of a computer because it acts as the “brain” of a computer and does all the processing, calculations, and logical control of the data entered through the keyboard into output that are displayed on the monitor.

This ultimately implies that, the central processing unit (CPU) performs most of the calculations, which enables a computer to function and is sometimes referred to as the “brain” of the computer.

Read more on CPU here: brainly.com/question/5430107

#SPJ1

Which snippet of code is in XML?​

Answers

Answer:

The top left

Explanation: It uses XML Syntax

Answer: Bottom left '<cd>'

Explanation:

PLAYTO i got it right

which role validates the users identity when using saml for authentication? rp user agent sp idp see all questions back next question

Answers

A role which validates the user's identity when using Security Assertion Markup Language (SAML) for authentication is: D. IDP.

What is IDS?

IDS is an abbreviation for intrusion detection system and it can be defined as a type of information security (IS) system which is designed and developed to monitor network traffic, validates an end user's identity, and notifies the network engineer when there's a malicious activity.

In Cyber security, a role which is saddled with the responsibility of validating an end user's identity when using Security Assertion Markup Language (SAML) for authentication is the intrusion detection system (IDP).

Read more on intrusion detection system here: https://brainly.com/question/14284690

#SPJ1

Complete Question:

Which role validates the user's identity when using SAML for authentication?

1) IdP. 2) SP. 3) User agent. 4) RP.

Which of the following is NOT a computer peripheral?

Scanner
Keyboard
Printer
Central Processing Unit

Answers

Answer:CPU stands for the central processing unit. CPU is not a peripheral device.

Explanation:

CPU stands for the central processing unit. CPU is not a peripheral device.

The Central Processing Unit (CPU) is NOT a computer peripheral; it is the main processing unit and brain of the computer itself. Therefore, option D is correct.

A computer peripheral, like a devoted entourage, encompasses a diverse array of external devices that extend the capabilities and interactions of the central computer.

Positioned at the periphery of the computer's core, these ingenious companions facilitate input, output, and auxiliary functions with finesse. From the tactile prowess of keyboards and mice to the visual acuity of monitors and scanners, these peripheral partners empower users to engage with the digital realm effortlessly.

Printers give digital creations tangible form, while external storage devices guard precious data. Acting as a united team, computer peripherals enhance the user's experience, orchestrating a harmonious symphony of technology and convenience.

Therefore, option D is correct.

Learn more about computer peripheral here:

https://brainly.com/question/33510040

#SPJ7

Explain the importance of backing up data.

Answers

Answer:

The backup's purpose is to create a copy of the data that can be recovered in the event of a primary data failure. Data backup safeguards against human error, hardware failure, virus attacks, power outages, and natural disasters. If these failures occur, backups can help save time and money. Explanation:

Putting away the duplicate of the information on discrete medium is basic to safeguard against essential information misfortune or defilement. This extra medium can be pretty much as basic as an outer drive or USB stick, or something more significant, like a circle stockpiling framework, distributed storage holder, or tape drive. The substitute medium can be in similar area as the essential information or at a distant area. The chance of climate related occasions might legitimize having duplicates of information at far off areas.

For best outcomes, reinforcement duplicates are made on a reliable, normal premise to limit the sum information lost between reinforcements. The additional time elapses between reinforcement duplicates, the more potential for information misfortune while recuperating from a reinforcement. Holding different duplicates of information gives the protection and adaptability to reestablish to a particular moment not impacted by information defilement or vindictive assaults.

due to advances in high speed communication networks, the information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened.

Answers

True, due to advances in high speed communication networks, the information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened.

The information lag, or the time it takes for information to be disseminated around the world, has been significantly shortened due to advances in high speed communication networks. This has had a number of important implications for businesses and individuals alike.

For businesses, the shorter information lag means that they can react more quickly to changes in the market. They can also take advantage of opportunities more quickly. For individuals, the shorter information lag means that they can stay up-to-date with what is happening in the world more easily.

The shorter information lag is also having an impact on the way we live and work. We are now more connected to the rest of the world than ever before. This is making it easier for us to find information and to communicate with people from all over the globe.

Learn more on high speed communication networks here:

https://brainly.com/question/13216536

#SPJ4

discuss vsphere update manager (vum) and how it simplifies patching, updating, and upgrading virtual machines (vms). discuss how vum creates baselines and how these baselines are utilized.

Answers

vSphere Update Manager (VUM) is a handy tool that can help simplify patching, updating, and upgrading virtual machines (VMs). With VUM, you can create baselines which can be used to track and apply updates and patches to your VMs. This can be a big time saver, especially if you have a lot of VMs to manage.

Creating a baseline is simple. Just select the patch or update you want to apply, and then choose the VMs you want to apply it to. Once the baseline is created, VUM will automatically track and apply any new updates that become available. This way, you can be sure that your VMs are always up-to-date.

VUM can save you a lot of time and hassle when it comes to patching and updating your VMs. If you have a lot of VMs to manage, VUM can be a real lifesaver.

Learn more on here:

https://brainly.com/question/15122335

#SPJ4

a researcher wants to conduct a secondary analysis using a centers for disease control (cdc) database of prostate cancer patients that was collected by the agency. the researcher was not part of the original database creation and the database was originally created to monitor public health and not for research purposes. the database is publicly available. the database does not include any identifiers. consent from the patients is not required because

Answers

Consent from the patients is not required because the database is publicly available.

What is HIPAA?

HIPAA is an abbreviation for Health Insurance Portability and Accountability Act. It was a bill that was enacted by the 104th U.S Congress and signed by President Bill Clinton in 1996, as a federal law to protect sensitive patient health information (PHI) from being disclosed to third-parties without their knowledge, approval (consent) or use and payment of health care insurance for employees.

What is PHI?

PHI is an abbreviation for protected health information and it can be defined as any form of patient health information that mustn't be disclosed without the patient's knowledge, approval (consent) or used for the payment of health care insurance for employees.

In this context, we can reasonably infer and logically deduce that consent or approval from the patients is not required because the database is publicly available.

Read more on PII here: brainly.com/question/24439144

#SPJ1

You are using a button on the ribbon, and you are interested in learning more about its functionality. How can you access tell me more?.

Answers

You access tell me more when you Hover over the button, then select "Tell me more" at the bottom of the information shown.

What is the ribbon functionality?

A ribbon is  known to be a type of a command bar that is known to help put together a program's features into a sequence of tabs and this is one that can be seen the top of a window.

Note that the use of a ribbon helps to boast the discoverability of features and functions, as well as quicker learning.

Therefore, You access tell me more when you Hover over the button, then select "Tell me more" at the bottom of the information shown.

Learn more about ribbon from

https://brainly.com/question/10716629
#SPJ1

forensic lab equipment worksheet directions: explain which piece of laboratory equipment would be most useful for each of the following tasks.

Answers

The following Lab equipment and their uses are indicated below:

Holding 50mL of boiling water: BeakerMoving small parts of organs around during a dissection  - ForcepsMeasuring the length of a piece of evidence - Micro Screw Gauge or Micrometer.Magnifying a small peace of trace evidence  - Magnifying glassHolding a specimen while being viewed under the microscope -  Microscope SlideProtecting the crime scene from contamination  - Disposable gloves and Nose MasksUsed to measure the thickness of evidence - Micro Screw Gauge or Micrometer.Used to collect hair samples at a crime scene - tweezersProtecting your eyes form chemicals - Safety Go.ogleUsed to drop small amounts of chemicals into a substance: - PipetteMeasuring the temperature of boiling glucose mixture - thermometerHolding a set of 5 test tubes while you test the acidity of the solutions: Test Tube.

What are laboratory equipment?

The numerous instruments and equipment used by scientists working in a laboratory are referred to as laboratory equipment:

Classical instruments include Bunsen burners and microscopes, as well as specialized equipment like operant conditioning chambers, spectrophotometers, and calorimeters.

Learn more about laboratory equipment:
https://brainly.com/question/17391361
#SPJ1

a data analyst is working at a small tech startup. they’ve just completed an analysis project, which involved private company information about a new product launch. in order to keep the information safe, the analyst uses secure data-erasure software for the digital files and a shredder for the paper files. which stage of the data life cycle does this describe?

Answers

The stage of the data life cycle which the information provided describes is: destroy.

What is DBLC?

DLC is an abbreviation for data life cycle and it can be defined as a strategic methodology that defines the sequence of stages that a given unit of data goes through from inception (collection) to its eventual deletion (destruction) at the end of its useful life.

In Computer technology, there are six (6) steps in a data life cycle and these include the following:

PlanCaptureManageAnalyzeArchiveDestroy

Based on the information provided, we can reasonably infer and logically deduce that stage of the data life cycle which is being described is destroy because the analyst used a secure data-erasure software for the digital files and a shredder for the paper files.

Read more on data life cycle here: https://brainly.com/question/28039445

#SPJ4

describe one advantage of using QR codes rather than traditional barcodes. Explain how barcodes bring the advantage you have describes

Answers

The advantage of using QR codes rather than traditional barcodes is that QR codes are known to be quiet  smaller.

Bar coding offers a lot of advantages such as the Reduction in errors.

Why are QR codes smaller?

QR codes are known to be quiet smaller  when compared to  traditional barcodes.

Note that the QR code can be about 10 times smaller when compared to a bar code and are known to be still readable.

Therefore, based on the above, one can say that the The advantage of using QR codes rather than traditional barcodes is that QR codes are known to be quiet  smaller. Bar coding offers a lot of advantages such as the Reduction in errors.

Learn more about barcodes from

https://brainly.com/question/13117502

#SPJ1

question 3 options: fill in the blank with the correct text structure. word bank: sequence, problem and solution, description, cause and effect, compare and contrast linux and windows are both operating systems. computers use them to run programs. linux is totally free and open source, so users can improve or otherwise modify the source code. windows is proprietary, so it costs money to use and users are prohibited from altering the source code.

Answers

Compare and contrast: Linux and Windows are both operating systems. Computers use them to run programs. Linux is totally free and open source, so users can improve or otherwise modify the source code. Windows is proprietary, so it costs money to use and users are prohibited from altering the source code.

What is text structure?

Text structure can be defined as a group of words which are used to describe how a writer organizes the texts in a literary work.

The types of text structure.

In English language, there are five (5) nonfiction text structures and these include the following;

SequenceDescription (list)Cause and EffectProblem and SolutionCompare and Contrast

What is compare and contrast?

Compare and contrast is used for the comparison of two or more things in order to show similarities and differences the exist between them i.e how they are alike and different.

Read more on compare and contrast here: https://brainly.com/question/20362346

#SPJ1

Li Wei uses a mouse, monitor, and keyboard with his computer. What are these devices considered?

A.
peripherals

B.
inputs

C.
outputs

D.
touchpads

Answers

Answer:

A - Peripherals.

Using only html, how would you make sure that 3 words in an html document always appear together on 1 line, even if the text word-wraps because the browser window is too narrow for that text line?

Answers

Before we can wrap text in HTML, we must either type the HTML code in a text editor or access an HTML file that already exists. We must now make advantage of the word-wrap property.

Therefore, we must position the cursor between the head element and the title tag. Then, as seen in the block below, we must declare a class and a div tag section in the style tag. Now that we wish to wrap the text, we must declare that class first. Finally, we must run the file in the browser and save it. The file must then be opened in the browser and saved. Not being a programming language, HTML. A markup language is used. In fact, Hyper Text Markup Language is the name of the technology.

Learn more about HTML here-

https://brainly.com/question/15093505

#SPJ4

networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's: group of answer choices data management environment. culture. networked environment. information technology (it) infrastructure. information system.

Answers

Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization's IT infrastructure.

The Networking and Telecommunications Technology Program's goal is to equip students with the knowledge and abilities necessary to operate, set up, maintain, and fix analogue and digital systems found in local, regional, and global networks.

Data systems are used in network technology to deliver and manage digital resources through a computer network. A wide range of industries require computer hardware and system software to maintain networks, necessitating the management of experts in these fields.

Networking is the process of connecting devices to one primary system, commonly known as the server. Telecommunication is the transport of data or information over a distance in the form of electromagnetic signals to one other receptive end.

Learn more about telecommunication:

https://brainly.com/question/14569823

#SPJ4

reports by what organization brought to the american public the issues and/or opportunities in safer care through the use of computers?

Answers

Reports by the Institute of Medicine organization brought to the American public the issues and/or opportunities in safer care through the use of computers.

With the release of the Institute of Medicine's report on safer care through the use of computers, the American public is now aware of the issues and opportunities that exist in this area. While some may see this as a daunting task, others see it as a way to improve the quality of care for all patients.

By using computers to store and track patient information, we can make sure that all staff members have access to the most up-to-date information. This can help reduce errors and improve communication between all members of the care team. In addition, by using computer-based systems, we can track outcomes and identify areas where improvements can be made.

Ultimately, the goal is to provide safer, more efficient care for all patients. While there may be some challenges to implementing these changes, the potential benefits are clear.

Learn more on Institute of Medicine organization here:

https://brainly.com/question/21285227

#SPJ4

suppose that a javascript application that’s on your computer consists of an html file, a css file, and a javascript file. to run the application, you can

Answers

To be able to run the application, you can option b: find the JavaScript file in your file explorer and double-click on it.

For what is JavaScript used for?

JavaScript is known to be a term that is often used by programmers all over  the world to make   dynamic and interactive web content such as the various  applications and browsers.

Note that the JavaScript is seen as a programming language that is often used as a client-side programming language and as such, To be able to run the application, you can option b: find the JavaScript file in your file explorer and double-click on it.

Learn more about JavaScript from

https://brainly.com/question/16698901

#SPJ1

Suppose that a JavaScript application that’s on your own computer consists of an HTML file, a CSS file, and a JavaScript file. To run the application, you can

Question 6 options:

find the HTML file in your file explorer and double-click on it

find the JavaScript file in your file explorer and double-click on it

use the Open command in your browser to find and open the JavaScript file

enter just the path and filename of the JavaScript file into your browser’s address bar

which two partitions do you typically create at minimum during a fedora linux installation? (choose two answers.)

Answers

a. /

b. /boot

c. swap

d. /home

When you install Fedora Linux, the "/" and "swap" partitions are created by default. However, you can create additional partitions if you want. Here's a look at the minimum partitions you need for a Fedora Linux installation.

The "/" partition is the root partition. This is where the operating system is installed. The minimum size for this partition is 1 GB.

The "swap" partition is used for virtual memory. The minimum size for this partition is 2 GB.

You can create additional partitions for storage, but these are the minimum partitions you need for a Fedora Linux installation.

Learn more Fedora Linux here:

https://brainly.com/question/13287249

#SPJ4

The_____key is used to create spaces between lines within a document A. Enter. B. Tab. C. Shift. D Ctrl

Please answer

Answers

The Ctrl

Explanation:

Ctrl enable other keys on the keyboard to perform secondary functions

how can your knowledge about the different materials and tools in making fashion accessories help you in your daily living during this pandemic time?​

Answers

Answer:

https://brainly.com/question/28492454?utm_source=android&utm_medium=share&utm_campaign=question

Explanation:

please help me

when you work in the enterprise digital group, you test and verify the integrity of standalone workstations and network servers.

Answers

False, When you work in the enterprise digital group, you test and verify the integrity of standalone workstations and network servers.

When you work in the enterprise digital group, you don't just test and verify the integrity of standalone workstations and network servers. You also help design, implement, and manage enterprise-wide digital initiatives. In other words, you're a key part of making sure that an organization's digital transformation is successful.

So what does that mean, exactly? Well, it means that you need to have a pretty broad skillset. You need to understand not only how to test and verify the functionality of digital systems, but also how to design and implement those systems in the first place. And of course, you also need to be able to effectively manage and coordinate digital projects across an entire enterprise.

In short, being part of the enterprise digital group means being a jack-of-all-trades when it comes to digital.

Learn more on enterprise digital group here:

https://brainly.com/question/24944681

#SPJ4

Other Questions
puritan apparels is a clothing retailer. unit costs associated with one of its products, product ahf 130, are as follows:follows: i really need help! please give answerJammu and Kashmir is a small state situated on the northern border of India This state isfamous in the world for its natural beauty Srigarh is the capital of this state Srigarh is just avery beautiful city on both banks of the Jheim River From one coast to ten coasts there arebridges on the Jhem River There is a very large and very beautiful lake in Srigarh This lake is 'D lake' | what would be title television and DVD player cost a total of $1242. The cost of the television is two times the cost of the DVD player. Find the cost of each item. 50,500-35,675 and work for it after restoring a pulse in a cardiac arrest patient, you begin immediate transport. while en route to the hospital, the patient goes back into cardiac arrest. you should: What promise caused theConstitution to be ratified?,A The Antifederalists promised toaccept George Washington aspresident.BCDThe Federalists promised to givestates more reserved powers.The Antifederalists promised to add asystem of checks and balances.The Federalista promised to add a billof rights.Aedo " .8x + 4 = -28solve for x Select the correct answer.Which option should you select to accept a tracked change?O A.AcceptRejectO C. ReviewOB.O D. Delete What does solid benzene do in liquid benzene? "Letters from an American ____" is a series of literary essays about American life and identity.a. Patriotb. Familyc. Travelerd. Farmer I need help with number 1 question which phrase best describes the u.s. constitution? a plan of government a plan of government a code a code a preamble a preamble a treatise on government What city became Kusks third capital? What is measurement ?... 3x+5=29-9xSolve x. Pls show your working Calculate the distance between the points P= (-7, 8) and J =(-3, 1) in the coordinate plane.Give an exact answer (not a decimal approximation).Distance: in which way does poetry today resemble poetry from the 14th century? a. the purpose of poetry is still primarily to criticize wrongs. b. the theme of fortune still resonates with modern audiences. Need help with D pls will give brainly If expansionary taxation policies encourage growth, are they always appropriate to implement?.