Write a program that uses linear recursion to generate a copy of an original collection in which the copy contains duplicates of every item in the original collection. Using linear recursion, implement a function that takes a list as user-supplied runtime input and returns a copy of it in which every list item has been duplicated. Given an empty list the function returns the base case of an empty list.

Answers

Answer 1

Answer: b

Explanation:

Answer 2

Program using linear recursion to duplicate items in a list:

def duplicate_list(lst):

   if not lst:

       return []

   else:

       return [lst[0], lst[0]] + duplicate_list(lst[1:])

# Example usage

user_input = input("Enter a list of items: ").split()

original_list = [item for item in user_input]

duplicated_list = duplicate_list(original_list)

print("Duplicated list:", duplicated_list)

How can a program use linear recursion to duplicate items in a list?

By implementing a function that utilizes linear recursion, we can create a copy of an original list with duplicated items. The function duplicate_list takes a list lst as input and checks if it is empty. If the list is empty, it returns an empty list as the base case.

Otherwise, it combines the first item of the list with itself and recursively calls the function with the remaining items (lst[1:]). The duplicated items are added to the resulting list. This process continues until all items in the original list have been duplicated and the duplicated list is returned.

Read more about linear recursion

brainly.com/question/31313045

#SPJ2


Related Questions

Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.

Answers

Answer:

Explanation:

In a situation like this, the OS erases the files from its core, and saves the document in its files compartment

The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.

What is a document?

Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.

An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.

Through a specified application program interface, the application programs seek services from the operating system (API)

Therefore, the OS will erase the file from the scratch and save it in a different folder.

To learn more about the document, refer to the below link:

https://brainly.com/question/14980495

#SPJ2

Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution

Answers

Answer:

Explanation:

The following pseudocode for this method using operations of the ADT list would be the following

swap(aList, indexI, indexJ) {

    initialize temp_variable = Retrieve(indexI, aList)

    Insert(Retrieve(indexJ, aList), indexI, aList)

    Insert(Retrieve(indexI, aList), temp_variable, aList)

}

This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.

Which of the following are examples of third party software that banks use? (Select all that apply.)
A -compliance reporting
B -unencrypted Microsoft Suite
C -accounting software
D -customer relationship management

Answers

Answer:

c , it is a correct answer for the question

Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?

Answers

Answer:

x = 1

y = 1

Explanation:

The apply method has the axis argument which enables it to use the applied function either across the rows or columns, by passing the value 1 to the axis argument, the mean of at each index is calculated, (across the column) such that the length of the AVG column is equal to the lengtb of the original dataframe.

The drop method is used in pandas to remove row or column entry from a dataframe. To remove columns from a data table, the value 1 is passed to the axis argument of the drop method. Hence, passing 1 to the axis argument removes all 6 columns leaving only the AVG column in result_df.

Which term refers to the use of expressions to check consistency in relation to other fields in the same record?
O data validation
O record validation
O input mask
O validation text

Answers

This is the answer 3 due to the thought me

The  term validation text refers to the use of expressions to check consistency in relation to other fields in the same record.

What is the use of validation text?

The term Validation text is known to be one that helps a user to be able to have a message that can help them to be able to input data that is said to be not valid.

Conclusively, Validations rules is known to aid one in that one can check data for accuracy and consistency in terms of  data entry.

Learn more about Validation text from

https://brainly.com/question/12069810

#SPJ2

How do l write a program which countdown from 10 to 3​

Answers

Answer:

use loop

for(int i =10;i>2; i--)

{

System.out.println(i+"\n")

}

Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10

Answers

Answer:

int main()

{

int number;

printf("Enter a number: ");

scanf_s("%d", &number, sizeof(number));

for (int i = 1; i <= 2; i++) {

 printf("%d*%d=%d\n", number, i, number * i);

}

}

Explanation:

I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.

A security analyst recommends implementing SSL for an existing web service. A technician installs the SSL certificate and successfully tests the connection on the server. Soon after, the help desk begins receiving calls from users who are unable to log in. After further investigation, it becomes clear that no users have successfully connected to the web server since the certificate installation. Which of the following is MOST likely the issue?
A. DA Incorrect firewall rules are blocking HTTPS traffic.
B. Users are still accessing the IP address and not the HTTPS address.
C. DC Workstations need an updated trusted sites list.
D Users are not using tokens to log on.

Answers

C- I think. I hope this helps you.

How does a computer work? Explain with an example. ​

Answers

Answer:

A computer system works by combining input, storage space, processing, and output. ... For example, when we type something using a keyboard, it is known as an Input provided to the Computer. Storage Space: It is the place where our input gets stored. It is known as Computer Memory that keeps the data into it.

please help!....................

Answers

Answer:

Based on what the graph does on the number line, I would say 1100110

Every time the graph spikes up, that is a one, otherwise it is a zero.

Explanation:

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit

Answers

Answer:

C. Trojan

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."

Some of the ways to prevent vulnerability in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sensitive information is stored in one secure place, or a distributed model, where information is spread around in many different places?

Answers


Co-Ordination Difficulty: ...
Waste of Resources: ...
Larger Interests of the Enterprise Neglected: ...
Emergency Decision not Possible: ...
Lack of Qualified Managers: ...
Certain Activities Decentralization not Possible:

Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động

Answers

Answer:

gzvzvzvzbxbxbxb

Explanation:

hshzhszgxgxggdxgvdvsvzvzv

What is system software?

No Spam

Answer quickly

Answers

[tex]\large{\underline{\underline{\pmb{\tt{Answer:}}}}}[/tex]

System software controls a computer's internal functioning, chiefly through an operating system, and also controls such peripherals as monitors, printers, and storage devices.

Answer:

[tex]\large\mathsf{\red{\underline{\underline{\pmb{System~ Software}}}}}[/tex]

[tex]\textsf{It is a set of programs}[/tex] [tex]\textsf{that control and manage the }[/tex] [tex]\textsf{operations of computer hardware.}[/tex]

[tex]\textsf{It also helps application programs}[/tex][tex]\textsf{to execute correctly.}[/tex]

[tex]\textsf{System Software are designed to}[/tex] [tex]\textsf{control the operation and extend}[/tex][tex]\textsf{the processing functionalities of}[/tex][tex]\textsf{ a computer system.}[/tex]

The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion

Answers

Answer:

B. data at rest, data in transit

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.

Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.

Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using

Answers

Answer:

I'll let you make an educated guess off of this info! You always retain info better making an inference on a subject that you are having trouble with!

Explanation:

There are four types of wireless networks -- wireless local area networks, wireless metropolitan area networks, wireless personal area networks and wireless wide area networks -- each with its own function.

wireless local area network

A wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.

wireless metropolitan area network

A metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).

wireless personal area network

A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants. PANs can be used for communication among the personal devices themselves, or for connecting to a higher level network and the Internet where one master device takes up the role as gateway.

wireless wide area network

Wireless wide area network (WWAN), is a form of wireless network. ... WWAN connectivity allows a user with a laptop and a WWAN card to surf the web, check email, or connect to a virtual private network (VPN) from anywhere within the regional boundaries of cellular service.

I hope this helped!!

shania

The network type Genevieve uses is a wireless local area network.

What is a wireless local area network?

A wireless local area network (WLAN) exists as a wireless distribution procedure for two or more devices. WLANs utilize high-frequency radio waves and often contain an access issue to the Internet. A WLAN permits users to move around the coverage area, often a house or small office, while preserving a network connection.

Therefore, the correct answer is option (a) LAN.

Complete questions:

Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using

(a) LAN

(b) MAN

(c) PAN

(d) WAN

To learn more about wireless local area networks refer to:

https://brainly.com/question/8985345

#SPJ2

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the
difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400
Some example leap years are 1600, 1712 and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex If the input is
1712
the output is
1712 13 leap year.
Ex If the nouts
1913
the outoutis
1913 not leap year.
Written is Coral Language

Answers

Answer:

integer userInput

userInput = Get next input

if userInput % 400 == 0

  Put userInput to output

  Put " is a leap year" to output

else

  if userInput % 4 == 0

     Put userInput to output

     Put " is a leap year" to output

  else

     Put userInput to output

     Put " is not a leap year" to output

Explanation:

I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.

Hope this helped :)  If it didn't let me know and I do my best to find out what went wrong.

Have a good day :)

1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.

Answers

Answer:

1)Pseudocode:-

Prompt user to enter string

Pass it to combination function which can calculate the entire combination and can return it in an array

In combination method -

Check if the string is length 2 size ie of 0 or 1 length then return string itself

Else iterate through string user entered

Get the present character within the variable and check if the variable is already used then skip

Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array

For each recursive call push character + sub permutation in total arrangement array.

2)Code -

function combinations(userStr) {

   /* when string length is less than 2 then simply return string */

   if (userStr.length < 2) return userStr;

   /* this array will store number of arrangement that word can be stored */

   var totalArrangements = [];

   /* iterate through string user enter  */

   for (var i = 0; i < userStr.length; i++) {

       /* get the current  character  */

       var character = userStr[i];

       /*check if character is already used than skip  */

       if (userStr.indexOf(character) != i)

           continue;

       /* create a string and concanete it form  0  to i index and i+1 to length of array   */

      var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);

       /* push it to totalArrangments  */

       for (var subPermutation of combinations(str))

           totalArrangements.push(character + subPermutation)

   }

   /* return the total arrangements */

   return totalArrangements;

}

/* ask user to prompt string  */

var userStr = prompt("Enter a string: ");

/* count to count the total number of combinations */

let count = 0;

/* call function the return tolal number of arrangement in array */

totalArrangements = combinations(userStr);

/* print the combination in console  */

for (permutation of totalArrangements) {

   console.log(permutation)

}

/* total combination will be  totalArrangements.length */

count = totalArrangements.length;

/*print it to console  */

console.log("Total combination " + count)

Output:-

How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50

Answers

Answer:

Create boxes with the following content

Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.

The check block has a diamond shape.

At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.

Connect the blocks using arrows.

Indicate the start and the end of the flow using the appropriate symbols.

The block to check if a number is a prime you could further decompose into the steps needed to do such a check.

Part 1 - Write the ingredients list to a file (10 points) Modify the program you developed for Lab 5 to make it output the data in the same format to a text file cake_ingredients_list.txt Note: Writing to a file is easier to code, so let's do that first. Hints: After the file has been opened, call the .write() function to write one line at a time to the file, in almost the exact fashion as calling print

Answers

Answer:

Explanation:

I do not have access to the ingredients list so instead I created the list and added the ingredients needed to make a cake. Then I used a for loop to loop throught the ingredients in the list and the .write() method to write the data to a text file with the same name as in the question. The code was tested and the output to the file can be seen in the attached image below.

ingredients = ['sugar', 'butter', 'eggs', 'vanilla', 'flour', 'baking powder', 'milk']

file = open('cake_ingredients_list.txt', 'w')

for ingredient in ingredients:

   file.write(ingredient + '\n')

e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}​

Answers

Explanation:

double e-d/5.6;is wrong it should return to c

what is IBM 1401 used for? Write your opinion.​

Answers

Explanation:

The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.

The analog computer deals directly with

Answers

continuously variable aspects of physical phenomena such as a electrical, mechanical etc.

The analog computer deals directly with measured values of continuous physical magnitude.

What is an Analog computer?

An analog computer may be defined as a type of computer that is significantly used to process analog data. These computers store data as a continuum of physical quantities and perform calculations using measurements.

It is completely different from digital computers, which use symbolic numbers to represent results. are great for situations that require data to be measured directly without conversion to numbers or codes. Analog computers, although readily available and used in scientific and industrial applications such as control systems and aircraft, have largely been superseded by digital computers due to the many complications involved.

Therefore, the analog computer deals directly with measured values of continuous physical magnitude.

To learn more about Analog computers, refer to the link:

https://brainly.com/question/18943642

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

The analog computer deals directly with:

number or codes.measured values of continuous physical magnitude.signals in the form of 0 or 1.signals in discrete values from 0 to 9

cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]

Answers

Answer:

please translate

Thank you✌️

Outlook 365 can be described as a personal information manager.
True or false

Answers

Answer:

True

Explanation:

The statement is True. The Microsoft Outlook 365 can be described as personal information manager.

What is Microsoft Outlook?

Microsoft Outlook is the software system, that allows the users to manage various personal and official information and data altogether at one place.

The Microsoft Outlook is known as personal information manager because it allows the users to managing task, providing calendar services, helps in emailing. It also manages contact and keeps the record of journal logs and many more.

Therefore, the statement regarding outlook 365 is True.

Learn more about Microsoft Outlook, here:

https://brainly.com/question/17457799

#SPJ5

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Which devices are considered to be central venous access devices (CVADs)? (Select all that apply.) Group of answer choices Heparin locks Peripherally inserted central catheters (PICC lines) Implanted subcutaneous ports Saline locks

Answers

Answer:

The answer is

Peripherally inserted central catheters (PICC lines)

Implanted subcutaneous ports

Explanation:

Central venous access devices are devices which are normally put in the body with the sole aim of aiding the transport of substances into the bloodstream of an individual . Such substance may include drugs, hormones etc.

Examples of such devices include Peripherally inserted central catheters (PICC lines) and Implanted subcutaneous ports

Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.

a. True
b. False

Answers

I’m sure the answer is true

What are some 5 constraints in using multimedia in teaching​

Answers

Answer:

Explanation:

Technological resources, both hardware and software

Technological skills, for both the students and teacher

Time required to plan, design, develop, and evaluate multimedia activities

Production of multimedia is more expensive than others because it is made up of more than one medium.

Production of multimedia requires an electronic device, which may be relatively expensive.

Multimedia requires electricity to run, which adds to the cost of its use

There are constraints in using multimedia in teaching​; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher

What is a characteristic of multimedia?

A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.

The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.

There are constraints in using multimedia in teaching​;

The Technological resources, both hardware and software

Also, Technological skills, for both the students and teacher

Since Time required to plan, design, develop, and evaluate multimedia activities

The Production of multimedia is more expensive than others because it is made up of more than one medium.

The Production of multimedia requires an electronic device, which may be relatively expensive.

The Multimedia requires electricity to run, which adds to the cost of its use.

Learn more about multimedia here;

https://brainly.com/question/9774236

#SPJ2

Other Questions
Please answer before 2:30!!!There are 189 apples in a basket. How many children can share them equally?List all numbers that apply. Frank is a 60- year-old man who is well-loved in his community since he was a boy. He is someone who is outgoing, a party lover, and love to have fun hanging out with peers. Frank is confident about life. From an early age he knew exactly what he wanted to become, and now as a man, he is confident about his career and family and want to leave them a good life when he departs this life. Frank express that he is not afraid of dying but he wants them to be ok when he is gone. At work Frank is helpful to his colleagues, and even in his community he is well-known among the elderly since he is always putting on Christmas treats for them. Imagine that Frank is your colleague, and that your boss asks you to write a character reference for Frank. Using Jungs personality theory to guide your writing, present a minimum one- page character reference in which you spell out Franks behaviour, his outlook on life, his philosophy about people and all the other important things you know about him. Ensure you point out how these different parts of Franks life fits into Jungs theory and overall what Jungs theoretical concept says about him. (20 mks) Temperature (C) 5Heating Curve for Water1601402 120100806040200-201 2 3 4 5 6 7Time (min)8910At what temperature does the solid start melting?0 -20C0C20C80C Write two ratios equivalent to 24 : 9. HELP ASAP!!!What size object (impactor) may create such a crater? identify an equation in point slope form for the line perpendicular to the y=-1/2x+11 that passes through (4,-8). a. y+8=1/2(x-4) b. y-4=2(x+8) c. y-8=1/2(x+4) d. y+8=2(x-4) What is an internal resistance? Please Help!Function: y=x^2+5x-7Vertex: (___,___)Solutions: (___,___) and (___,___)* i thought the vertex was (-5/2,-53,4) but apparently im wrong since it keeps saying it* i need answers please help me with this question math please Why did the White House experience water damage ?1. It is made of granite which is strong. 2. It is made of sandstone which is very porous and is easily penetrated by rainwater3. It is made of non-porous sedimentary rock Draw a line through the origin that has a slope of 1/2 find quotient in exponential forms 9power5 divided by 3 power 6 answer in detail Kraus Steel Company has two departments, Casting and Rolling. In the Rolling Department, ingots from the Casting Department are rolled into steel sheet. The Rolling Department received 46,300 tons from the Casting Department in October. During October, the Rolling Department completed 54,000 tons, including 11,900 tons of work in process on October 1. The ending work in process inventory on October 31 was 4,200 tons.Required:How many tons were started and completed during October? A system must include _______.A.an input, an output and a process.B.something to do with a form of transport.C.a microprocessor.D.fuel, water and electricity. Sandy's Soda Co. is planning to purchase new equipment that costs $56,000 and will save on operating costs for the next 5 years as follows: $21,500 in year 1; $23,100 in year 2; $19,000 in year 3; $13,900 in year 4; and $15,200 in year 5. The payback period for the cooling equipment is ______ years. Using the following information, what is the amount of gross profit?Purchases $37,000Merchandise inventory, September 1 6,100Selling expense 1,050Merchandise inventory, September 30 6,800Sales 91,000Interest expense 1,040Administrative expense 1,010Rent revenue 1,700 The difference between one half of a number and one fifth of it is 561. Find the number.A. 2805B. 1870C. 5610D. None of these answers What was an achievement of the women's movement during the 1960s and 1970s?the ratification of the Equal Rights Amendment to the Constitutionuniting women in groups such as the National Organization for Womenpassage of legislation requiring equal pay for men and women in the workplace help help help help Determine, to one decimal place, the length, width & height of the rectangular prism that would have the greatest volume, with a surface area of 200 cm^2.