For this project, you are going to create a program that asks the user for a list of ingredients. As the user enters the ingredients, you should store them in a list. Once the user is done entering their list, you need to pass this list to a function that will compare the ingredients to an already existing list of pantry items. Your Task The Shopping List For this problem, you are going to create a program that asks the user for a list of ingredients. As the user enters the ingredients, you should store them in a list. Once the user is done entering their list, you need to pass this list to a function that will compare the ingredients to an already existing list of pantry items. If all items are available in the pantry, print out that you don’t need to go shopping. If any item is missing, print out that you need to go shopping and list the ingredients. While there is more than one way to complete this assignment, your answer must include the following: 1. A pre-created list for pantry items 2. User input into an ingredient list 3. Pass the ingredient list to a method 4. Use a conditional and loop in the method 5. Print out the results of whether the user needs to go shopping based on the items in the ingredient list that are not in the pantry.

Answers

Answer 1

In this implementation, we start by making a list of the supplies we keep in the pantry. The function check shopping list that accepts an ingredient list and compares it to the pantry items is then defined.

How do you evaluate your pantry?

Choose a pantry zone, such as the freezer, before conducting an inventory. Then take everything out of the zone and spread it out on your kitchen counter or table. Write down the food items and the quantity of each on paper or on your phone.

# pre-made list of pantry essentials

Items in the pantry include ["eggs," "milk," "bread," "butter," "cheese," "yoghurt," "chicken," "beef," "pasta," "rice," "potatoes," and "onions."

Define the function check shopping list(ingredients) to compare ingredients to pantry items.

grocery list = []

for the substance listed:

If an item isn't in the pantry items, add it to the shopping list (item)

if len(shopping list) >= 0, then

You don't need to go shopping, print

else:

For item in shopping list, print ("You need to go shopping for the following items:")

print(item)

a user-submitted ingredient list

component list = []

ingredient = input("Enter an ingredient (or 'done' to finish):") while True

If an ingredient equals "done"

ingredient list break. append (ingredient)

# Call the check shopping list function with the ingredient list in the argument.

To know more about function visit:-

https://brainly.com/question/28939774

#SPJ1


Related Questions

Which user has access to the voided deleted transactions tool?
a. Primary admin user
b. standard user
c. accountant admin user
d. company admin user

Answers

Answer: The answer is an Accountant admin user

Hope this helps

Answer:

Accountant admin user

Explanation:

I got it in the test

_____ merges each of the rows in the selected range across the columns in the range.

Answers

Answer:

Merge and Center

Explanation:

It is correct trust me

what’s the base case for a recursive version of binary search (where we want the recursion to stop)?

Answers

The base case for a recursive version of binary search is when the search range becomes empty or invalid. This occurs when the lower bound exceeds the upper bound of the search range.

In binary search, the search range is repeatedly divided in half until the target element is found or until the search range becomes empty. Initially, the search range includes the entire array. During each recursive step, the algorithm compares the target element with the middle element of the current search range. If they are equal, the search is successful and the index of the target element is returned. If the target element is smaller than the middle element, the search continues in the lower half of the search range. If the target element is larger, the search continues in the upper half. This process is repeated until the base case is reached.

The base case is necessary to terminate the recursion and prevent an infinite loop. When the search range becomes empty or invalid, it means that the target element is not present in the array. By defining the base case as an empty or invalid search range, the recursive function can stop and return an appropriate value, indicating that the target element was not found.

Learn more about binary search

brainly.com/question/13152677

#SPJ11

you are a hacker about to conduct a network impersonation attack. your goal is to impersonate an access point (ap). as a first step, you increase the radio power. you wait for clients to connect to the ap, but they do not. what is the next step you should take?

Answers

Increase the radio power, and if clients do not connect to the access point (AP), the next step would be to check for interference or signal obstructions.

How can interference or signal obstructions affect clients' ability to connect to the access point?

Interference or signal obstructions can disrupt the communication between the access point and the clients, preventing them from connecting.

Interference can occur due to other wireless devices operating on the same frequency or neighboring access points causing interference. Signal obstructions, such as walls or physical barriers, can weaken the signal strength and make it difficult for clients to establish a connection.

To address this, the hacker could scan for other access points operating on the same frequency, identify any potential sources of interference, and consider adjusting the AP's channel or positioning to mitigate the interference.

Learn more about interference

brainly.com/question/31857527

#SPJ11

what do you mean by HDML coding ​

Answers

Answer:

hdml coding is a standard markup language for documents designed to be displayed in a web browser.

Explanation:

it can be assisted using things like CSS or JS

FILL IN THE BLANK. how does the information presented by leopold reinforce or change your perspective on the environment — explain and give at least two examples.

Answers

Aldo Leopold's work, particularly his essay "The Land Ethic," provides a strong ethical framework for understanding our relationship with the environment.

Leopold argued that land should be viewed as a community to which humans belong, rather than as a commodity to be used and exploited. This reframes our relationship with the environment, emphasizing the importance of treating it with respect, protecting it, and preserving it for future generations.

Two examples of this idea in practice are the use of sustainable farming practices and the implementation of environmental regulations and standards. Sustainable farming practices help ensure that the land and its resources are used in a way that maintains the health and vitality of the environment, while environmental regulations and standards help to protect the environment from pollution and destruction.

Learn more about The Land Ethic:

brainly.com/question/30860249

#SPJ11

Which of the following statements about recommendation engines is TRUE?A: An online recommendation engine is a set of algorithms.B: Online recommendation engines use past user data and similar content data to make recommendations for a specific user profile.C: Both A and B are trueD: Neither A nor B are true

Answers

Answer:

Explanation:

A

the __________ layout container arranges its contents with columns and rows. A. Gridlayout B. Gridpane. C. Gridd. D. Cell manager

Answers

Answer:

A. GridLayout

Explanation:

i took the quiz

give a situation when program (instruction) execution stops.
a. An interrupthas happened
b. Execule the halt instruction
c. Performed a division by zero

Answers

a. An interrupt has happened: This can οccur when an external device such as a keybοard οr mοuse sends an interrupt signal tο the CPU

b. Execute the halt instructiοn: The halt instructiοn is used tο stοp the CPU and put it in a lοw-pοwer state.

c. Perfοrmed a divisiοn by zerο: Divisiοn by zerο is undefined in mathematics.

What is prοgram executiοn when these situatiοn happened?  

a. An interrupt has happened: This can οccur when an external device such as a keybοard οr mοuse sends an interrupt signal tο the CPU, οr when an internal prοgram errοr such as a segmentatiοn fault οccurs. When an interrupt happens, the CPU stοps the current instructiοn and jumps tο a specific rοutine that handles the interrupt.

b. Execute the halt instructiοn: The halt instructiοn is used tο stοp the CPU and put it in a lοw-pοwer state. When the CPU executes the halt instructiοn, it stοps prοcessing instructiοns and waits fοr an interrupt tο οccur tο resume executiοn.

c. Perfοrmed a divisiοn by zerο: Divisiοn by zerο is undefined in mathematics, and mοst prοgramming languages will thrοw a runtime errοr if a prοgram attempts tο divide by zerο. When this happens, the prοgram executiοn will stοp and an errοr message will be displayed tο the user.

To know more about program execution here

https://brainly.com/question/14547052

#SPJ4

After 4 years of night school and nearly half a year waiting for the results of the bar examination, you have been admitted to practice law in your state. You decide that you have to keep your current government job while, hopefully, establishing your law practice. To do a first class job for the client, you need first class equipment i.e., good computers and printers, fax machines, etc. You stay late at the office each day to complete work on your pleadings, and you create a database on your computer to keep track of your contacts and cases. Is this an acceptable temporary solution

Answers

Answer:

yes

Explanation:

because it will make the lawyer to keep track of all is client cases without any stress

The act of deliberately accessing computer systems and networks without authorization is generally known as

Answers

The act of deliberately accessing computer systems and networks without authorization is generally known as Hacking.

The act of deliberately accessing a computer system and network without authorized access and permission is called as Hacking.

What is hacking?

The hacking is the act that seeks to compromise the digital device data such as a computer or smartphones and can take down even the entire network.

The hackers use malicious software that is designed to attack the core components and can take out relevant information from the users' system in the form of theft.

Find out more information about the computer systems.

brainly.com/question/13603602

on average how many users are active simultaneously? (3 pts.) if each user transmits 10 percent of the time. will the answer in part (d) increase or decrease? why?

Answers

Consider that there are 120 users. Find the likelihood that exactly n users are broadcasting simultaneously at any given time.

How many concurrent users can a circuit switched network support on a single link?

100 Kbps must always be set aside for each user with circuit-switching. Therefore, the link can only handle ten people at once. With packet switching, the likelihood that 10 or more users are active at once is less than.0004 if there are 35 users.

What is the simultaneous equation?

Multiple algebraic equations that have the same unknown variables and the same answer are referred to as simultaneous equations. This suggests that there is a single solution to the simultaneous equations. Several illustrations of simultaneous equations.

To know more about simultaneously visit:-

https://brainly.com/question/28325805

#SPJ4

Ceteris paribus, if a student could either earn money tutoring or working as a server in a restaurant, then increases to the wages paid for serving will

Answers

If a student could either earn money tutoring, then increases to the wages paid for serving will Increase the quantity of hours the student would serve.

What is ceteris paribus?

This is a term that connotes when all other things being equal. The word Ceteris paribus is known to be a Latin phrase that totally means "all other things being equal."

In economics, it is known to be a shorthand factor that shows the effect one economic variable is said to have  on another, given that all other variables remain the same as in the case above.

See options below

A. increase the quantity of hours the student would serve.

B. decrease the quantity of hours the student would serve.

C. increase the quantity of hours the student would tutor.

D.not change the quantity of hours the student would serve.

Learn more about Ceteris paribus from

https://brainly.com/question/868746

reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware because they use public cloud computing. reagan recognizes that this demonstrates which key benefit of public cloud computing? group of answer choices decreased redundancy reduced costs increased redundancy flexible capacity

Answers

Since Reagan's firm has not had to make large investments in computer or networking hardware, the  key benefit of public cloud computing is option B:  reduced costs.

What equipment is employed for networking?

There are different kinds of equipment for networks. Hardware for networking is required for computers to communicate with one another. Bridges, hubs, as well as switches, and routers are all networking devices with slightly varied functions.

Therefore, In a public cloud, resources are made available by a third party provider through the internet and shared by businesses and individuals who want to use or buy them and low cost is a good advantage.

Learn more about cloud computing  from

https://brainly.com/question/19057393
#SPJ1

In the current situation, how do you access information as a student? How will you integrate the use of ICT in your daily life and your chosen track?

Answers

Answer:

Explanation:

As a computer science student information is accessed in every possible way. This can be through a local school lan network, mobile devices, e-mail, etc. All of these help information flow to and from various people and makes obtaining this information incredibly simple as a student. Especially in the field of computer science, I need to integrate as many ICT devices with me in my everyday life, to send emails, check calendar updates, research information on the web, check school reports, and even speak with clients.

when a website is using ssl, the site’s url in the location or address bar begins with ____.

Answers

When a website is using SSL, the site's URL in the location or address bar begins with "https" instead of just "http".

The addition of the "s" in the URL indicates that the website is using a secure sockets layer (SSL) protocol to encrypt the data transmitted between the website and the user's browser.

SSL is used to provide a secure and private connection between the user and the website, ensuring that sensitive information such as passwords, credit card details, and other personal data are protected from interception by unauthorized parties.

Users can identify whether a website is using SSL by checking for the padlock icon or "https" in the address bar before sharing any personal information on the site.

Learn more about SSL at https://brainly.com/question/30224533

#SPJ11

what is the main purpose of including a table of contents in a long document

Answers

The main purpose of including a table of contents in a long document is: C. To make it easy to locate a section of the document.

What is a document?

In Computer technology, a document can be defined as a computer resource that is designed and developed to enable end users to easily store data as a single unit on a computer storage device.

In English literature, a document is sometimes referred to as a literary work and it can be defined as a text-based resource that is typically created by an author (writer) with specific information about a subject matter, topic, events, persons, etc.

In conclusion, a table of contents is typically used in long documents to organize and group parts of the documents into a logical and sequential form (order).

Read more on table of contents here: https://brainly.com/question/1493356

#SPJ1

Complete Question:

What is the main purpose of including a table of contents in a long document?

answer choices

To allow the document to be saved faster

To make it easy to print

To make it easy to locate a section of the document

To decrease the file size

Disadvantages and advantages of utp and stp cables

Answers

The disadvantages and advantages of utp  are:

UTP cables are known to be the most used form of networking cables on the global market and are seen as the fastest copper-based medium that is known to be available. They are said to be less expensive than those of STP cables.They are easily dispensable.

What is STP advantages and disadvantages?

The Shield of STP cables are known to be one that need to be properly  grounded so that it can function  as an antenna and carry  unwanted signals.

Note that it is seen as a More expensive kind of cable than the UTP and they are also seen to be very Difficult to keep and maintain. They are said to have thicker diameter and not very flexible.

Hence, The disadvantages and advantages of utp  are:

UTP cables are known to be the most used form of networking cables on the global market and are seen as the fastest copper-based medium that is known to be available. They are said to be less expensive than those of STP cables.They are easily dispensable.

Learn more about cables from

https://brainly.com/question/16889976

#SPJ1

Complete the statement using the correct term.

is a social media site that allows users to broadcast short text messages to a group of “followers.”

Answers

Answer: Twitter.

Explanation: I personally feel that this question is a bit lame, seeing there are literally mulptiple social media platforms that do the same thing, Insta, FB, so on and so forth.

your network uses the following backup strategy: full backups every sunday night incremental backups monday night through saturday night on a thursday morning, the storage system fails. how many restore operations would you need to perform to recover all of the data? answer 1 2 3 4 5

Answers

Two restore operations would you need to perform to recover all of the data.

Which backup technique enables you to backup the modifications every night since the last thorough backup was finished?

Differential backup involves storing data that has been added to or modified since the last full backup. Simply said, after doing a full backup, additional backups are executed to include all changes made to the files and directories. The three most commonly used backup types are full, incremental, and differential. Other backup formats include mirroring and synthetic complete backups.

The incremental backups reflect daily modifications made to files created by email or software programmes, for example. A safe period of time to preserve the backup files is typically two months for a full system backup.

Learn more about the Differential Backups here: https://brainly.com/question/13025611

#SPJ4

Nvidia's CUDA model comprises a custom programming language for the: CUDA does not use a custom language Host
Both Host and Device Device

Answers

Nvidia's CUDA model comprises a custom programming language for the: Both Host and Device.

Nvidia's CUDA (Compute Unified Device Architecture) model includes a custom programming language that is designed to leverage the parallel processing capabilities of Nvidia GPUs. This programming language, also known as CUDA, allows developers to write code that can be executed on both the host system (typically a CPU) and the device (the Nvidia GPU). CUDA provides a set of extensions to the C programming language, allowing developers to express parallelism and utilize the GPU's computing power effectively.

By using CUDA, developers can offload computationally intensive tasks from the CPU to the GPU, which is specifically designed for parallel processing. The custom programming language provided by CUDA includes a set of directives and APIs (Application Programming Interfaces) that enable developers to control data transfers between the host and device, manage parallel execution, and utilize GPU-specific features. This allows for efficient data processing and accelerates performance in applications such as scientific simulations, deep learning, and image processing.

Learn more about Programming language

brainly.com/question/23959041

#SPJ11

one of the most popular uses of automated clearing houses is the

Answers

One of the most popular uses of automated clearing houses (ACH) is the direct deposit of payroll funds to employees' bank accounts.

Direct deposit is an electronic payment option that allows employers to make deposits directly into employees' bank accounts on paydays.However, there are other popular uses of ACH, including direct debit, e-commerce payments, and government payments (such as social security benefits and tax refunds). Additionally, ACH is used for business-to-business transactions, bill payments, and money transfers between individuals.one of the most popular uses of automated clearing houses is the electronic transfer of funds, including direct deposits, bill payments, and electronic fund transfers between bank accounts.

To learn more about  payroll visit: https://brainly.com/question/541599

#SPJ11

Design thinking is another name for agile manifesto?
True or False?

Answers

Design thinking IS indeed another name for agile manifesto

You are responsible for creating a database with
information about each state in the United States
as well as three cities in each state. You will
include information on population, primary
industry, and area in square miles.
How should you set up the database?
Use one large table containing all information.
Use several interrelated tables.
Use one table for each city and each state.

Answers

Option 2. To set up the database with information about each state in the United States, as well as three cities in each state, the most suitable approach would be to use several interrelated tables.

What is a relational database

A relational database is a type of database management system (DBMS) that organizes data into tables with predefined relationships between them.

The relationships between tables are established through keys, which are unique identifiers that connect related data across different tables.

Read more on database here https://brainly.com/question/518894

#SPJ1

When starbucks sells its coffee and mugs to the public on its website, it is a ________ sale.

Answers

When a business firm such as Starbucks sells its products (coffee and mugs) to the general public on its website, it is a B2C sale.

What is B2C?

B2C is a business model which literally means business to consumer and it can be defined as a market which involves businesses selling their products and services directly to the end consumers for their personal use, usually over a website.

In this context, we can infer and logically deduce that when a business firm such as Starbucks sells its products (coffee and mugs) to the general public on its website, it is a B2C sale.

Read more on B2C here: https://brainly.com/question/2829594

#SPJ1

to compress a video stream when a video is stored and then decompress the file when the video is played, you need software called a

Answers

To compress a video stream when a video is stored and then decompress the file when the video is played, you need software called a Codec

A codec is software that compresses and decompresses digital media files such as audio, video, and still images. When a video is stored, a codec is used to compress the video stream, reducing its file size so that it can be stored in less space.

When the video is played, the same codec is used to decompress the file, restoring it to its original size and quality.A codec is often used in conjunction with a container format, which is a standard for storing multimedia data in a file.

Learn more about codec at:

https://brainly.com/question/29761022

#SPJ11

How do you flatten a 2D array to become a 1D array in Java?

Answers

Answer:

With Guava, you can use either

int[] all = Ints.concat(originalArray);

or

int[] all = Ints.concat(a, b, c);

Explanation:

Use GUAVA

Biometric access calls for using a(n) __________ physical characteristic of a person to permit access to a controlled IT resource.

Answers

Answer:

unique

Explanation:

modular theory posits various _____ systems (such as that for language acquisition) seem to have evolved for specific functions.

Answers

Modular theory posits various cognitive systems (such as that for language acquisition) seem to have evolved for specific functions.

According to modular theory, the human mind consists of specialized cognitive modules or systems that are dedicated to processing specific types of information or performing specific functions. These modules are thought to have evolved through natural selection to address specific adaptive challenges faced by our ancestors.

In the context of language acquisition, the modular theory suggests that there is a specialized cognitive module specifically dedicated to language processing and acquisition. This language module is believed to have unique characteristics and operates independently from other cognitive systems.

The modular approach argues that these specialized modules have evolved to efficiently process specific types of information, allowing for specialized functions without interference from other cognitive processes. This specialization is thought to enhance cognitive efficiency and effectiveness in performing specific tasks.

Overall, modular theory suggests that various cognitive systems, including language acquisition, have evolved for specific functions and operate as dedicated modules within the human mind.

To learn more about modular theory visit : https://brainly.com/question/11797076

#SPJ11

User inserts 10 numbers. Write a program that will show if there are more positive or negative numbers among the entered numbers.

Answers

Here is a basic program that I wrote.  This will check how many positive/negative numbers are in the table and then prints the amount..

Using Python

# list of numbers

list1 = [10, -21, 4, -45, 66, -93, 1]

 

pos_count, neg_count = 0, 0

 

# iterating each number in list

for num in list1:

     

   # checking condition

   if num >= 0:

       pos_count += 1

 

   else:

       neg_count += 1

         

print("Positive numbers: ", pos_count)

print("Negative numbers: ", neg_count)

Other Questions
When ice melts at its normal melting point; 273.16 K and 1 atmosphere; which of the following is true for the process shown? A) AH < 0, AS > 0, AV >0 8) AH < 0, 4s 0,Av > 0 C) AH > 0, As < 0, AV < 0 D) AH > 0, 4S > 0,Av > 0 E) AH > 0, 4s > 0, AV < 0 The circle graph below represents the favorite fruit of 300 people How many prefer oranges? b. How many prefer pineapples? c. How many prefer blueberries? d. How many prefer apples? e. How many prefer strawberries? which of the following best describes bedded gypsum and halite? a. varieties of coal b. varieties of calcium carbonate evaporites; c. chemical sedimentary rocks d. detrital sedimentary rocks a rhetorical Analysis Essay on Lincoln's speech.speech-Fellow-Countrymen: At this second appearing to take the oath of the Presidential office there is less occasion for an extended address than there was at the first. Then a statement somewhat in detail of a course to be pursued seemed fitting and proper. Now, at the expiration of four years, during which public declarations have been constantly called forth on every point and phase of the great contest which still absorbs the attention and engrosses the energies of the nation, little that is new could be presented. The progress of our arms, upon which all else chiefly depends, is as well known to the public as to myself, and it is, I trust, reasonably satisfactory and encouraging to all. With high hope for the future, no prediction in regard to it is ventured.On the occasion corresponding to this four years ago all thoughts were anxiously directed to an impending civil war. All dreaded it, all sought to avert it. While the inaugural address was being delivered from this place, devoted altogether to saving the Union without war, insurgent agents were in the city seeking to destroy it without war seeking to dissolve the Union and divide effects by negotiation. Both parties deprecated war, but one of them would make war rather than let the nation survive, and the other would accept war rather than let it perish, and the war came.One-eighth of the whole population were colored slaves, not distributed generally over the Union, but localized in the southern part of it. These slaves constituted a peculiar and powerful interest. All knew that this interest was somehow the cause of the war. To strengthen, perpetuate, and extend this interest was the object for which the insurgents would rend the Union even by war, while the Government claimed no right to do more than to restrict the territorial enlargement of it. Neither party expected for the war the magnitude or the duration which it has already attained. Neither anticipated that the cause of the conflict might cease with or even before the conflict itself should cease. Each looked for an easier triumph, and a result less fundamental and astounding. Both read the same Bible and pray to the same God, and each invokes His aid against the other. It may seem strange that any men should dare to ask a just God's assistance in wringing their bread from the sweat of other men's faces, but let us judge not, that we be not judged. The prayers of both could not be answered. That of neither has been answered fully. The Almighty has His own purposes."Woe unto the world because of offenses; for it must needs be that offenses come, but woe to that man by whom the offense cometh." If we shall suppose that American slavery is one of those offenses which, in the providence of God, must needs come, but which, having continued through His appointed time, He now wills to remove, and that He gives to both North and South this terrible war as the woe due to those by whom the offense came, shall we discern therein any departure from those divine attributes which the believers in a living God always ascribe to Him? Fondly do we hope, fervently do we pray, that this mighty scourge of war may speedily pass away. Yet, if God wills that it continue until all the wealth piled by the bondsman's two hundred and fifty years of unrequited toil shall be sunk, and until every drop of blood drawn with the lash shall be paid by another drawn with the sword, as was said three thousand years ago, so still it must be said "the judgments of the Lord are true and righteous altogether."With malice toward none, with charity for all, with firmness in the right as God gives us to see the right, let us strive on to finish the work we are in, to bind up the nation's wounds, to care for him who shall have borne the battle and for his widow and his orphan, to do all which may achieve and cherish a just and lasting peace among ourselves and with all nations. 1. deals with a serious subject2. often amuses an audience3. the sequence of actions in a play4. the part of a play that presents necessary introductory information5. the message or underlying meaning of a play6. the main character in a play7. the unique way in which an author expresses himself8. the responsibility of the stage designer9. the design or pattern of a play10. used by the playwright to explain the way something is to be done11. a speech given by a character alone or on stage12. the words spoken by the actorsA. dialogueB. styleC. protagonistD. settingE. stage directionsF.monologueG. structureH. themeI. tragedyJ. expositionK. comedyL. plot multiple linear regression with coefficient standard deviation and mean to get new multiple regression Find the average rate of change of the area of a circle withrespect to its radius r as r changes from2 to each of the following.(i) 2 to 3 (ii) 2 to 2.5 (iii) 2 to 2.1 Who is the fictional character that you identify most with, and why? If breaking bonds requires energy IN, or takes energy, what mathematical function (+, , , ) should we use to represent this process in a computational model? Given the equation x + 4x + y-2y = 20: (HINT: Type in the equation is the desmos calculator and get the answers from the graph.)What is the radius of the circle?What is the center of the circle? TRUE OR FALSE a key difference between type-1 diabetes and type-2 diabetes is that with type-2, insulin replacement is not used. Which of the following specifies the authorization classification of information asset an individual user is permitted to access, subject to the need-to-know principle?A) Discretionary access controlsB) Task-based access controlsC) Security clearancesD) Sensitivity levels Metamorphism can transform a shale composed of clay (Diagram A) into a metamorphic rock containing many different minerals (Diagram B). The metamorphism of a pure quartz sandstone, however, yields a metamorphic rock containing only quartz. Why? Choose one: A. Quartz in a shale is different than quartz in a sandstone, so it will behave differently under metamorphic conditions. B. The sandstone is made up only of quartz (silicon and oxygen), and there are no other combinations these elements can be arranged into except polymorphs. C. Quartz is a very resistant mineral and does not undergo any metamorphic processes when subjected to intense heat and pressure. imagine a disease in which blood osmolarity is constantly too high. adding adh to the bloodstream does not treat the disorder. there must be a disruption at the level of the A triangle has vertices at (-4, 0), (2, 8), and (8, 0). Complete the table. Write answers as decimalsrounded to the nearest hundredth, when necessary. puberty occurs much earlier now than it did 20 years ago. which statement does not present a reason this might be happening? At cheap more super market,1 litre of fruit juice costs R25 and 1,5 litres cost R34 Which juice is cheaper. Show your calculation