Susan was recently fired from her executive IT position. You have concerns that she has enough knowledge and expertise to sabotage company documents—and you need to delete her access. However, upon beginning, you find information that should be retained in her user directory for future company needs. Consider the process you would take to ensure that Susan no longer has access and that data is retained. In situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not?

Answers

Answer 1

Answer:

The answer is No, the gains or benefit do not exceed the risk because, even if the data of the user seem very vital, the damage it would have on the long will affect the organisation in a negative way.

Explanation:

From the example given, stating that in situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not

I would say that  NO, the benefits do not outweigh the risk that will be enough to keep the user information because, just as the user data is important, but the damage it would yield or have could affect the organization on the long run.


Related Questions

1. Your task is to process a file containing the text of a book available as a file as follows:A function GetGoing(filename) that will take a file name as a parameter. The function will read the contents of the file into a string. Then it prints the number of characters and the number of words in the file. The function also returns the content of the file as a Python list of words in the text file.A function FindMatches(keywordlist, textlist): The parameter keywordlist contains a list of words. The parameter textlist contains text from a book as a list of words. For each word in keywordlist, the function will print the number of times it occurs in textlist. Nothing is returned.If you implemented the functions correctly then the following program:booktext = GetGoing('constitution.txt') FindMatches (['War', 'Peace', 'Power'], booktext) Will read the file "constitution.txt" and print something like the following:The number of characters is: 42761The number of words is: 7078The number of occurrences of War is: 4The number of occurrences of Peace is: 2The number of occurrences of Power is: 11

Answers

Answer:

See explaination

Explanation:

#function to count number of characters, words in a given file and returns a list of words

def GetGoing(filename):

file = open(filename)

numbrOfCharacters =0

numberOfWords = 0

WordList = []

#iterate over file line by line

for line in file:

#split the line into words

words = line.strip().split()

#add counn of words to numberOfWords

numberOfWords = numberOfWords + len(words)

#find number of characters in each word and add it to numbrOfCharacters

numbrOfCharacters = numbrOfCharacters + sum(len(word) for word in words)

#append each word from a line to WordList

for word in words:

WordList.append(word)

#display the result

print("The number of characters: ", numbrOfCharacters)

print("The number of Words: ", numberOfWords)

#return the list of words

return WordList

#find matches for keywords given in textlist

def FindMatches(keywordlist, textlist):

for keyword in keywordlist:

keyword = keyword.lower()

print ("The number of occurrences of {} is: {}".format(keyword,len([i for i, s in enumerate(textlist) if s == keyword])))

#main

booktext = GetGoing("constitution.txt")

FindMatches (['War', 'Peace', 'Power'], booktext)

g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a large datagram is fragmented into multiple smaller datagrams, where are these smaller datagrams reassembled into a single larger datagram? Do routers have IP addresses? If so, how many? How many bits do we have in an IPv6 address? We use hexadecimal digits (each with 4 bits) to represent an IPv6 address. How many hexadecimal digits do we need to represent an IPv6 address?

Answers

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

The TCP/IP concepts of packet forwarding, fragmentation, and reassembly along with IPv4 and IPv6 addressing schemes are explained.

TTL (Time To Live) field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers. When a large datagram is fragmented into multiple smaller datagrams, these smaller datagrams are reassembled into a single larger datagram at the destination host. Routers do have IP addresses, typically one per interface, so the number varies. IPv6 addresses consist of 128 bits; represented using hexadecimal digits (each 4 bits), hence we need 32 hexadecimal digits to represent an IPv6 address.

Create a SavingsAccount class. Use a static data member annualInterestRate to store the annual interest rate for each of the savers. Each member of the class contains a private data member savingsBalance indicating the amount the saver currently has on deposit. Provide member function calculateMonthlyInterest that calculates the monthly interest by multiplying the savingsBalance by annualInterestRate divided by 12; this interest should be added to savingsBalance. Provide a static member function modifyInterestRate that sets the static annualInterestRate to a new value.

Answers

Answer:

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

#include "SavingsAccount.h"

double SavingsAccount::annualInterestRate = 0.0;

SavingsAccount::SavingsAccount( double bal, double AiR )

{

  savingsBalance = ( bal >= 0.0 ? bal : 0.0 );

  setAnnualInterestRate( AiR ); //AiR = AnnualInterestRate

}

void SavingsAccount::setAnnualInterestRate( double AiR)

{

  annualInterestRate = ( AiR >= 0.0 && AiR <= 1.0) ? AiR : .03;

}

double SavingsAccount::getAnnualInterestRate()

{

  return annualInterestRate;

}

void SavingsAccount::calculateMonthlyInterest()

{

  savingsBalance += savingsBalance * ( annualInterestRate / 12);

}

void SavingsAccount::modifyInterestRate( double interest )

{

  annualInterestRate = (interest >= 0.0 && interest <= 1.0) ? interest : .04;

}  

void &SavingsAccount::print() const  

{

  cout << fixed << setprecision(2) << "$" << savingsBalance;

}

int main()

{

  SavingsAccount saver1( 2000.0, .03 );

  SavingsAccount saver2( 3000.0, .03 );

  cout << "Initial Balance For saver1 Is: " << saver1.print;

  cout << "\nInitial Balance For saver2 Is: " << saver2.print <<  "\n\n";

  cout << "Interest Rate For Both Accounts is " <<       saver1.getAnnualInterestRate << "%";

  saver1.calculateMonthlyInterest();

  saver2.calculateMonthlyInterest();

  cout << "Balance After 3% interest For saver1: " << saver1.print;

  cout << "\nBalance After 3% interest For saver2: " << saver2.print;  

  cout << "\n\nSetting Annual Interest Rate to 4%";

  saver1.modifyInterestRate( .04 );

  saver2.modifyInterestRate( .04 );

  saver1.calculateMonthlyInterest();

  saver2.calculateMonthlyInterest();

  cout << "\nBalance After 4% Interest For saver1: " << saver1.print;

  cout << "\nBalance After 4% Interest For saver2: " << saver2.print;

  cout << endl;

return 0;

}

Write a program with a method that plays the guess a number game. The program should allow the user to pick a number between 1 and 1000 in his head. The method should guess the user's number in a minimal amount of attempts. The method should ask the user "is the number greater than or less than the number " and the program gives a particular number. The user in some way just inputs (higher or lower) or (greater than or less than). There also has to be a way for the user to say the number has just been guessed. Of course, the user cannot answer incorrectly or change the number midstream. Note - if written efficiently, the method should be able to guess any number in 10 or less attempts.

Answers

Answer:

Please check the explanation

Explanation:

That's the code and it is done with the program in c++ according to instructions given in the question using binary search. It can guess the correct number in 10 or fewer attempts and also shows the number of attempts it took to guess the number.

​ #include <iostream> using namespace std; int guess() { string input; int l = 1, h = 1000; int mid = (l + h) / 2, count = 0; while (1) { //count the number of attemts to guess the number ++count; //cout << count << "\n"; cout << "\n"; cout << "Is " << mid << " correct? (y/n): "; cin >> input; //if input is y print the guessed no. and return if (input == "y") { cout << mid << " guessed in " << count << " attempts!\n"; return 1; } //if input is n ask the user if it's higher or lower than current guess if (input == "n") { cout << "Is the number greater than or less than the number ? (h/l): "; cin >> input; } //if input is higher assign mid incremented by 1 to low //else decrement mid by 1 and assign to high if (input == "h") l = mid + 1; else h = mid - 1; //calculate mid again according to input by user again mid = (l + h) / 2; } } int main() { cout << "****WELCOME TO THE GUESS THE NUMBER GAME!****\n"; cout << "Guess any number between 1 to 1000.\n"; cout << "This game depends on user giving correct answers and not changing their number middle of game.\n"; guess(); } ​

A small grocery store has one checkout.You have been asked to write a program to simulate the grocery store as it checks out customers.YOU ARE REQURED TO USE A QUEUE TO SOLVE THE PROBLEM.The queue program (qu.py) is located on the Instructor drive.Here are some guidelines:
1. A customer gets to the checkout every 1 – 5 minutes
2. The checker can process one customer every 5 – 15 minutes (depends on how many groceries customer has 10 items or less will take 5 minutes, 11- 20 items will take 6 10 minutes, more than 20 items will take 11-15 minutes- you will need two random numbers)
3. The program should find the average wait time for customers and the number of customers left
4. Use the random number generator to get values for when customers get to the checkout and 5 You are not required to use classes, but it might make things easier than 20 items will take 11 - 15 minutes-you will need two random numbers) in the queue how long the checker will take.

Answers

Answer:

Check the explanation

Explanation:

PYTHON CODE :

#import random function

from random import randint

#class Queue declaration

class Queue:

#declare methods in the Queue

def __init__(self):

self. items = []

def isEmpty(self):

return self. items == []

def enqueue(self, item):

self.items. insert(0, item)

def dequeue(self):

return self. items. pop()

def size(self):

return len(self. items)

def getInnerList(self):

return self.items

#This is customer Queue

class Customer:

#declare methods

def __init__(self,n):

self.numberOfItems=n

def __str__(self):

return str(self. numberOfItems)

def getNumberOfItems(self):

return self. numberOfItems

#This is expresscheker customer queue

class Expresschecker:

def __init__(self,n):

self.numberOfItems=n

def __str__(self):

return str(self. numberOfItems)

def getNumberOfItems(self):

return self. numberOfItems

#Returns random checkout time, based on number of items

def checkOut(Expresschecker):

items = Expresschecker. getNumberOfItems()

if items <= 10:

return randint(2, 5)

if items <= 20:

return randint(6, 9)

return randint(10, 14)

#Initiate queue for the Expresschecker

Expresschecker = Queue()

#declare total customers

totalcheckoutCustomers = 10

#express Customers shopping..

for i in range(totalcheckoutCustomers):

#Each putting Between 1 to 25 items

randomItemsQty = randint(1, 25)

customer = Customer(randomItemsQty)

#Getting into queue for checkout

Expresschecker. enqueue(customer)

#====Now all express Customers having

#random qty of items are in Queue======

#intial time

totalTime=0

#define the size of the queue

totalcheckoutCustomers = Expresschecker. size()

#using for-loop until queue is empty check out

#the items in the express cheker queue

while not(Expresschecker. isEmpty()):

totalTime+=randint(1,5)

#Picking a customer

expresscustomer = Expresschecker. dequeue()

#Processing the customer

timeTaken = checkOut(expresscustomer)

#add the time for each custimer

totalTime+=timeTaken

#compute average waiting time

averageWaitingTime = totalTime/totalcheckoutCustomers

#display the average waiting time

print("Average waiting time for the express customer queue is "

+str(averageWaitingTime)+" minutes ")

print("Remaining Custimers in the express customer Queue is: ",

Expresschecker. size())

#Returns random checkout time, based on number of items

def checkOut(customer):

items = customer. getNumberOfItems()

if items <= 10:

return randint(1, 5)

if items <= 20:

return randint(6, 10)

return randint(11, 15)

#in

customersQueue = Queue()

totalCustomers = 20 #Change number of customers here

#Customers shopping..

for i in range(totalCustomers):

#Each putting Between 1 to 25 items

randomItemsQty = randint(1, 25)

customer = Customer(randomItemsQty)

#Getting into queue for checkout

customersQueue. enqueue(customer)

#====Now all Customers having random qty

#of items are in Queue======

totalTime=0

totalCustomers = customersQueue. size()

while not(customersQueue. isEmpty()):

totalTime+=randint(1,5)

#Picking a customer

customer = customersQueue. dequeue()

#Processing the customer

timeTaken = checkOut(customer)

totalTime+=timeTaken

#Result=============================

averageWaitTime = totalTime/totalCustomers

print("Average wait time for the customer queue is

"+str(averageWaitTime)+" minutes ")

print("Remaining Customers in the customer Queue is:

",customersQueue. size())

// Marian Basting takes in small sewing jobs. // She has two files sorted by date. // (The date is composed of two numbers -- month and year.) // One file holds new sewing projects // (such as "wedding dress") // and the other contains repair jobs // (such as "replace jacket zipper"). // Each file contains the month, day, client name, phone number, // job description, and price. // Currently, this program merges the files to produce // a report that lists all of Marian's jobs for the year // in date order. // Modify the program to also display her total earnings // at the end of each month as well as at the end of the year.

Answers

Answer:

See Explaination

Explanation:

Provided Pseudocode as per your new specifications:

start

Declarations

num weddingMonth

num weddingDay

string weddingClientName

num weddingPhoneNum

string weddingDescription

num weddingPrice

num replaceMonth

num replaceDay

string replaceClientName

num replacePhoneNum

string replaceDescription

num replacePrice

num weddingDate

num replaceDate

num bothAtEnd=0

num END_YEAR=9999

InputFile weddingFile

InputFile replaceFile

ouputFile mergedFile

getReady()

while bothAtEnd<>1

mergeRecords()

endwhile

finishUp()

stop

getReady()

open weddingFile "weddingDress.dat"

open replaceFile "replaceJacketZipper.dat"

open mergedFile “Merged.dat”

readWedding()

readreplace()

checkEnd()

return

readWedding( )

input weddingMonth,weddingDay,weddingClientName,weddingPhoneNum,weddingDescription,weddingPricee from weddingFile

while eof

weddingDate=END_YEAR

endwhile

return

readreplace( )

input replaceMonth,replaceDay,replaceClientName,replacePhoneNum,replaceDescription,replacePricee from replaceFile

while eof

replaceDate=END_YEAR

endwhile

return

checkEnd()

if weddingDate=END_YEAR

if replaceDate=END_YEAR

bothAtEnd=1

endif

endif

return

mergedFile()

if weddingDate<replaceDate

output weddingMonth,weddingDay,weddingClientName,weddingPhoneNum,weddingDescription,weddingPricee to weddingFile

readWedding()

endif

Final answer:

The question is about adding functionality to a computer program to display monthly and yearly earnings for Marian Basting's sewing jobs. This involves data handling, control structures, and algorithms to manage and total earnings in the generated report.

Explanation:

The question pertains to modifying a computer program for Marian Basting, who takes in sewing jobs and tracks them in two sorted files. The program should not only merge the files to produce a date-ordered report of all Marian's jobs for the year but should also be modified to display total earnings at the end of each month and the yearly total earnings. To achieve this, the program would require additional functionality to sum the price of jobs, categorized by month and then aggregated for the year-end total. This could involve processing each entry, keeping a running total, and then displaying the totals when a new month starts or the report ends.

For clarity, here's a hypothetical implementation outline: Load the entries from both files, sort them by date, iterate through the sorted list while maintaining a subtotal for each month's earnings. After processing all entries for a month, display the subtotal. Upon reaching year-end, display the final total. This implementation requires knowledge of programming concepts such as data handling, control structures, and algorithms for sorting and totaling.

Write a method that checks whether the input string or a sentence (a string with spaces) is a palindrome or not. The method should be case insensitive and should ignore spaces. Write a test program that prompts the user to input a string and invokes this method. Some example runs are: Enter the input string: madam Input string madam is a palindrome Enter the input string: banana Input string banana is NOT a palindrome Enter the input string: Race Car Input string Race Car is a palindrome Enter the input string: Too HOT to hoot Input string Too HOT to hoot is a palindrome

Answers

Answer:

import java.util.Scanner;

public class Pallindrome {

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       System.out.println("Enter the input string: ");

       String word = in.nextLine();

       System.out.println(isPallindrome(word));

   }

   public static String isPallindrome(String word){

       String rev ="";

       int len = word.length();

       for ( int i = len - 1; i >= 0; i-- )

           rev = rev + word.charAt(i);

       if (word.equals(rev))

           return word+" is palindrome";

       else

           return word+ " is not palindrome";

   }

}

Explanation:

Create the method in Java to receive a String parameterUsing a for loop reverse the stringUse another for loop to compare the characters of the original string and the reversed stringIf they are equal print palindromeelse print not palindromeWithin the main method prompt user for a sentenceCall the method and pass the sentence entered by user

In this exercise we have to use the knowledge in computational language in JAVA to describe a code that best suits, so we have:

The code can be found in the attached image.

To make it simpler we can write this code as:

public class Pallindrome {

  public static void main(String[] args) {

      Scanner in = new Scanner(System.in);

      System.out.println("Enter the input string: ");

      String word = in.nextLine();

      System.out.println(isPallindrome(word));

  }

  public static String isPallindrome(String word){

      String rev ="";

      int len = word.length();

      for ( int i = len - 1; i >= 0; i-- )

          rev = rev + word.charAt(i);

      if (word.equals(rev))

          return word+" is palindrome";

      else

          return word+ " is not palindrome";

  }

}

See more about JAVA at brainly.com/question/19705654

QUESTION
UNi-Library is conducting a survey to rate the quality of their services in order to improve their
services. In the survey, 30 students were asked to rate the quality of the service in the library on a
scale of 1 to 5 (1 indicating very bad and 5 indicating excellent). You have to store the 30 responses of
the students in an array named responses [ ]. Then, you have to count the frequency of each scale
and store it in an array named frequency[ ]. Use the appropriate looping structure to enter the
responses and to count the frequency. You are also required to display the percentage of the
frequency of each scale. Display the scale, frequency and its percentage as shown below.
The program also allows the user to repeat this process as often as the user wishes.

*Write a complete C++ program*​

Answers

Answer:

Explanation:

#include <iostream>

using namespace std;

int main ()

{

   int responses[30],count[6];

   int score = 0;

   string resp = " ";

   for (int i = 0; i < 30; i++)

   {

    responses[i] = 0;

   }

   for (int i = 0; i < 6; i++)

   {

    count[i,1]=0;

    count[i,2]=0;

    count[i,0]=0;

   }

   while ((resp != "Y") && (resp != "y"))

   {

    for (int i = 0; i < 30; i++)

    {

        while ((score > 5) || (score < 1))

           {

            cout << "Student " << (i+1)<< " please enter a value (1-5):";

            cin >> score;

        }

           responses[i] = score;

           if((score > 5)||(score<1))

           {

               if(score==1) count[1]++;        

               if(score==2) count[2]++;        

               if(score==3) count[3]++;        

               if(score==4) count[4]++;        

               if(score==5) count[5]++;        

           }

           score = 0;

    }

    cout<< "Response               Frequency              Percentage"<<endl;;

    cout<< "    1                      "<<count[1]<<"               "<<(count[1]/30)<<"%"<<endl;

    cout<< "    2                      "<<count[2]<<"               "<<(count[2]/30)<<"%"<<endl;

    cout<< "    3                      "<<count[3]<<"               "<<(count[3]/30)<<"%"<<endl;

    cout<< "    4                      "<<count[4]<<"               "<<(count[4]/30)<<"%"<<endl;

    cout<< "    5                      "<<count[5]<<"               "<<(count[5]/30)<<"%"<<endl;

    cout<< "Do you want to exit? Press Y to exit any other key to continue: ";

    cin>> resp;

   }

   return 0;

}

Write an application that inputs a telephone number as a string in the form (555) 555-5555. The application should use String method split to extract the area code as a token, the first three digits of the phone number as a token and the last four digits of the phone number as a token. The seven digits of the phone number should be concatenated into one string. Both the area code and the phone number should be printed. Remember that you will have to change deliminator characters during the tokenization process.

Answers

Answer:

See explaination

Explanation:

// File: TelephoneNumber.java

import java.util.Scanner;

public class TelephoneNumber

{

public static void main(String[] args)

{

Scanner input = new Scanner(System.in);

String inputNumber;

String tokens1[];

String tokens2[];

String areaCode;

String firstThree;

String lastFour;

String allSeven;

String fullNumber;

/* input a telephone number as a string in the form (555) 555-5555BsAt4ube4GblQIAAAAASUVORK5CYII= */

System.out.print("Enter a telephone number as '(XXX) XXX-XXXX': ");

inputNumber = input.nextLine();

System.out.println();

/* use String method split */

tokens1 = inputNumber.split(" ");

/* extract the area code as a token */

areaCode = tokens1[0].substring(1, 4);

/* use String method split */

tokens2 = tokens1[1].split("-");

/* extract the first three digits of the phone number as a token */

firstThree = tokens2[0];

/* extract the last four digits of the phone number as a token */

lastFour = tokens2[1];

/* concatenate the seven digits of the phone number into one string */

allSeven = firstThree + lastFour;

/* concatenate both the area code and the seven digits of the phone number into one full string separated by one space */

fullNumber = areaCode + " " + allSeven;

/* print both the area code and the phone number */

System.out.println("Area code: " + areaCode);

System.out.println("Phone number: " + allSeven);

System.out.println("Full Phone number: " + fullNumber);

}

}

In C++ Programming:Given the following header:vector split(string target, string delimiter);
Implement the function split so that it returns a vector of the strings in target that are separated by the string delimiter.For example: split("10,20,30", ",") should return a vector with the strings "10", "20", and "30".Similarly, split("do re mi fa so la ti do", " ") should return a vector with the strings "do", "re","mi", "fa", "so", "la", "ti", and "do".1. Write a program that inputs two strings and calls your function to split the first target string by the second delimiter string and prints the resulting vector all on line line with elements separated by commas.A successful program should be as below with variable inputs:Examples with inputs of :10,20,30and:do re mi fa so la ti doEnter string to split: 10,20,30 Enter delimiter string: , The substrings are: "10", "20", "30"Enter string to split: do re mi fa so la ti do Enter delimiter string: The substrings are: "do", "re", "mi", "fa", "so", "la", "ti", "do"

Answers

The provided C++ program reads two strings, calls the `split` function using the given header, and prints the resulting vector with elements separated by commas.

Below is an updated C++ program that adheres to the given header and meets the specified requirements. It reads two strings, calls the `split` function, and prints the resulting vector:

#include <iostream>

#include <vector>

#include <string>

// Function to split a string by a delimiter

std::vector<std::string> split(std::string target, std::string delimiter) {

   std::vector<std::string> substrings;

   size_t start = 0;

   size_t end = target.find(delimiter);

   while (end != std::string::npos) {

       substrings.push_back(target.substr(start, end - start));

       start = end + delimiter.length();

       end = target.find(delimiter, start);

   }

   substrings.push_back(target.substr(start));

   return substrings;

}

int main() {

   std::string inputString, delimiter;

   std::cout << "Enter string to split: ";

   std::getline(std::cin, inputString);

   std::cout << "Enter delimiter string: ";

   std::getline(std::cin, delimiter);

   // Call the split function

   std::vector<std::string> result = split(inputString, delimiter);

   // Print the resulting vector

   std::cout << "The substrings are: ";

   for (size_t i = 0; i < result.size(); ++i) {

       std::cout << "\"" << result[i] << "\"";

       if (i < result.size() - 1) {

           std::cout << ", ";

       }

   }

   return 0;

}

This program uses the `split` function to tokenize the input string based on the given delimiter, and it prints the resulting vector as required.

Define a JavaScript function named thanos which has a single parameter. This function will be called so that the parameter will be an array. Your function should return a NEW array which contains only the entries at even indices. (Hint: you can tell an index is even if that index mod 2 is equivalent to 0).. Examples: thanos([ ]) would evaluate to [ ] thanos(['0', 2, 4]) would evaluate to ['0', 4]

Answers

Answer:

See explaination

Explanation:

function thanos(lst) {

var result = [];

for (var i = 0; i < lst.length; i += 2) {

result.push(lst[i]);

}

return result;

}

// Testing the function here. ignore/remove the code below if not required

console.log(thanos([]));

console.log(thanos(['0', 2, 4]));

With the sheets grouped, apply Underline to cell B5 and Double Underline to cell B6. Ungroup the worksheets. Note, use the Format Cells dialog box to ensure that the Underline styles Single and Double are applied, rather than Single Accounting or Double Accounting.

Answers

Answer:

Check Explanation.

Explanation:

Task: (1). Apply Underline to cell B5 and Double Underline to cell B6.

(2). Ungroup the worksheets.

(3).use the Format Cells dialog box to ensure that the Underline styles Single and Double are applied, rather than Single Accounting or Double Accounting.

Steps to follow;

Step one: On the Excel document that you are working on, make sure you highlight from B6 cell to F6 cell.

Step two: Then, press CTRL+SHIFT+F.

Step three: from action in step two above, the "format cells dailogue box" will come up, click underline > (underline type) dropdown list > ok.

Step four: next, highlight from B7 to F7.

Step five: press CTRL+SHIFT+F. As in step two above.

Step Six: do the same thing as in Step three above.

Please note that to apply the SINGLE UNDERLINE, you need to type the data in the cell for cells of B6 to F6 ONLY.

Also, for DOUBLE UNDERLINE for B7 to F7; just type the data in the cell and it will apply.

Q2 - Square Everything (0.25 points) Write a function called square_all that takes an input called collection that you assume to be a list or tuple of numbers. This function should return a new list, which contains the square of each value in collection. To do so, inside the function, you will define a new list, use a loop to loop through the input list, use an operator to square the current value, and use the append method to add this to your output list. After the loop, return the output list.g

Answers

Answer:

See explaination

Explanation:

#Define the function square_all() having a list of

#integers. This function will return a list of square

#of all integer included in the given list.

def square_all(num_list):

#Create an empty list to store resultant list.

sq_list = []

#Start a for loop till the length of the given list.

for index in range(0, len(num_list)):

#Multiply the current list value with its value

#and append the resultant value in the list

#sq_list in each iteration.

sq_list.append(num_list[index] * num_list[index])

#Return the final list of squares of all integrs in

#the list num_list.

return sq_list

#Declare and initialize a list of integers.

intList = [2, 4]

#Call the function square_all() and pass the above list

#as argument of the function. Display the returned list.

print(square_all(intList))

Perhaps programs used for business purposes ought to conform to higher standards of quality than games. With respect to software warranties, would it make sense to distinguish between software used for entertainment purposes (such as a first-person shooter game) and software used for business (such as for medical testing)?

Answers

Answer:

Answered below

Explanation:

A software warranty is a written promise or guarantee from a software manufacturer or company to repair or replace a product of it has a fault within a particular period of time. Such faults must arise from the manufacturer's errors.

During the warranty period given, the software developer must fix all the defects and bugs within the software so long as it occurred due to a development fault and there is evidence of system failure.

Some software programs and applications really do require a warranty with a longer duration. Such softwares include those used in big businesses and corporations like banks, medical softwares, nuclear softwares and aviation softwares. The warranties are like a testament of reliability of the software in such critical and delicate sectors.

An open source software for a video game may not require a warranty or the warranty period might not be long compared to business softwares.

Univariate linear regression Note: Solutions to this problem must follow the method described in class and the linear regression handout. There is some flexibility in how your solution is coded, but you may not use special functions that automatically perform linear regression for you. Load in the BodyBrain Weight.csv dataset. Perform linear regression using two different models: M1: brain_weight = w0 + w1 x body_weight M2: brain_weight = w0 + w1 x body_weight + w2 x body_weight2
a. For each model, follow the steps shown in class to solve for w. Report the model, including w values and variable names for both models.
b. Use subplots to display two graphs, one for each model. In each graph, include: • Labeled x and y axes • Title • Scatterplot of the dataset • A smooth line representing the model
c. For each model, calculate the sum squared error (SSE). Show your 2 SSE values together in a bar plot.
d. Which model do you think is better? Why? Is there a different model that you think would better represent the data?
Body weight (kg) Brain weight (g)
0.023 0.4
0.048 0.33
0.075 1.2
0.12 1
0.122 3
0.2 5
0.28 1.9
0.55 2.4
0.75 12.3
0.785 3.5
0.93 3.5
1.04 5.5
1.35 8.1
1.41 17.5
2.5 12.1
3 25
3.3 25.6
3.6 21
4.288 39.2
5.3 41.6
6.8 179
10 115
10.55 179.5
27.66 115
35 56
36.33 119.5
52.16 440
55.5 175
60 81
62 1320
85 325
93 225
100 157
110 288
110 442
187.1 419
192 180
207 406
250 334
465 423
480 712
521 655
529 680
1400 590
2547 4603
6654 5712

Answers

Answer:

regression line is  Y  =    124.9281    +    0.9370    *x

SSE=    (SSxx * SSyy - SS²xy)/SSxx =     7317401.270      

Explanation:

See the attached image file

A small monster collector has captured ten Bagel-type small monsters. Each Bagel-type small monster has a 35% chance of being a Sesame Seed-subtype and a 20% chance of being a Whole Wheat-subtype.What is the probability of exactly eight of the captured small monsters being Whole Wheat-subtypes?What is the probability of at least one of the captured small monsters being a Sesame Seed-subtype?What is the probability that there are no Sesame Seed- or Whole Wheat-subtype small monsters captured?What is the probability that are at least two Whole Wheat/Sesame Seed dual-subtype small monsters captured?

Answers

Answer:

Check the explanation

Explanation:

Each Bagel-type small monster has 0.35 probability of being a Sesame Seed-subtype and 0.2 probability of being a Whole Wheat-subtype.

The probability that exactly 8 of them are Whole Wheat-subtype is [tex]\binom{10}{8}(0.2)^8(0.8)^2[/tex] using multiplication principle, because first need to choose which 8 are Whole Wheat-subtype, and if exactly 8 of them are Whole Wheat-subtype, then other two are not Whole Wheat-subtype. The former has probability 0.2, while the latter has probability 1-0.2 = 0.8 .

Kindly check the attached images below for the complete answer to the question above

What are techniques for active listening? Select all
that apply.

1. asking clarifying questions, without
interrupting
2. keeping eye contact
3. indicating full agreement to what is being said

Answers

1.) asking clarifying questions, without interrupting

2.) keeping eye contact

Techniques for active listening are

asking clarifying questions, without interruptingkeeping eye contact

The correct options are 1 and 2.

What is active listening?

An active listening is when a person actively listens to another person.

A person must maintain eye contact with the speaker while in conversation with him.

Also, they must have two way conversation between them.

Thus, correct options are 1 and 2.

Learn more about active listening.

https://brainly.com/question/3013119

#SPJ2

How are graphs used to analyze data?

Answers

Answer:

Graphs and charts are visual representations of data in the form of points, lines, bars, and pie charts. Using graphs or charts, you can display values you measure in an experiment, sales data, or how your electrical use changes over time. Types of graphs and charts include line graphs, bar graphs, and circle charts.

Explanation:

Graphs are used to visually display data, making it easier to identify trends and patterns. They simplify complex data and allow for effective comparisons, aiding better understanding and data-driven decision-making.

Graphs are a powerful tool used to display data visually, making it easier to see trends and patterns compared to numerical data in a table. In high school mathematics, understanding how to interpret various types of graphs is crucial.

Here are some key reasons why graphs are employed:

Visualizing trends: For example, a line graph can show how temperature changes over time, making it easy to spot trends such as increases or decreases.Simplifying complex data: Complicated data sets can often be more easily interpreted when presented in a pie chart, bar graph, or scatter plot rather than a dense table.Comparing data: Graphs allow for side-by-side comparison of different data sets. For example, bar graphs can compare the population of different cities.

Overall, utilizing graphs not only aids in understanding data better but also helps in making data-driven decisions effectively.

Direct current is produced by an electric motor. an armature. a solenoid. a battery.

Answers

I believe D or A would be the answer. D for sure is correct

Answer:

D

Explanation:

I just did it

Asks the user for the full path of a file to be read - path should include the folder and filename.
Asks the user for the full path of a file to be written - path should include the folder and filename.
Declares an array of strings of 1024 words.
Opens the input and output files.
Reads the file word by word into the array.
Prints the content of the array in reverse order to both screen and output file at the same time.
Remember :
Check that input file opened successfully.
Input file can be quite smaller than 1024 words, exactly 1024 words or much larger than 1024 words.
Close the files before program ends.
Put a 'pause' in your program before it ends.

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <fstream>

using namespace std;

int main()

{

int size = 10;

string inputFileName, outputFileName;

cout << "Please enter input file name, including full path: ";

cin >> inputFileName;

cout << "Please enter output file name, including full path: ";

cin >> outputFileName;

ifstream inFile(inputFileName.c_str());

ofstream outFile(outputFileName.c_str());

// checking whether input and output files are good to open

if(!inFile.is_open())

{

cout << "Cannot open " << inputFileName << endl;

exit(EXIT_FAILURE);

}

if(!outFile.is_open())

{

cout << "Cannot open " << outputFileName << endl;

exit(EXIT_FAILURE);

}

// declare an array of string to store 1024 words

string words[size];

// read the file for exactly 1024 words

// assuming each line of input file contains only 1 word

int count = 0;

string word;

while(getline(inFile, word))

{

if(count == size)

break;

words[count++] = word;

}

inFile.close();

// now we need to print the words array in reverse order both to the console and to the output file, simultaneously

cout << "WORDS:\n------\n";

for(int i = size - 1; i >= 0; i--)

{

if(words[i] != "")

{

cout << words[i] << endl;

outFile << words[i] << endl;

}

}

outFile.close();

system("pause");

return 0;

}

Final answer:

The question is about creating a program for file reading and writing, including array manipulation and outputting content in reverse. The program must handle input/output operations, file size variations, and ensure resource management by closing files properly.

Explanation:

The student's question pertains to writing a program that can read and write files, and specifically handle reading words into an array and then outputting them in reverse order to a file and the screen. The steps to achieve this involve prompting the user for file paths, checking the success of opening files, handling files of various sizes, and managing resources correctly by closing files. A 'pause' before the program ends is also required, likely to allow the user to see the output before the program closes.

To begin, here's a simplified pseudo-code outline:

Ask the user for the input file path (including the directory and file name).Ask the user for the output file path (including the directory and file name).Declare an array of strings, sized to 1024 elements.Open the input file and check if it opens successfully. If not, display an error message.Open the output file for writing.Read the words from the input file into the array until the file ends or the array is full.Output the array contents in reverse order to the screen and write them to the output file.Close both files.Implement a pause at the end of the program.

Note: When implementing the read operation, the program should consider the file size which may be larger than the array and handle it appropriately, perhaps by reading in chunks if necessary.

g Given an array, the task is to design an efficient algorithm to tell whether the array has a majority element, and, if so, to find that element. The elements of the array are not necessarily from some ordered domain like the integers, and so there can be no comparisons of the form "is A[i] ≥ A[j]?". (Think of the array elements as GIF files, say.) However you can answer questions of the form: "is A[i] = A[j]?" in constant time

Answers

Answer:

If there is a majority element in the array it will be the median. Thus,

just run the linear time median finding algorithm, and compare the result with all the  elements of the array (also linear time). If [tex]\frac{n}{2}[/tex]elements are the same as the median, the  median is a ma majority element. If not, there is none.

Suppose now that the elements of the array are not from some ordered domain like the  integers, and so there can be no comparisons of the form "is the ith element of the array  greater than the jth element of the array?" However you can answer questions of the  form:

"Are the ith and jth elements of the array the same?" in constant time. Such

queries constitute the only way whereby you can access the array. (Think of the elements  of the array as GIF files, say.) Notice that your solution above cannot be used now.

Consider the following method substringFound, which is intended to return true if a substring, key, is located at a specific index of the string phrase. Otherwise, it should return false.
public boolean substringFound(String phrase, String key, int index)
{
String part = phrase.substring(index, index + key.length());
return part.equals(key);
}
Which of the following is the best precondition for index so that the method will return the appropriate result in all cases and a runtime error can be avoided?
A. 0 <= index < phrase.length()
B. 0 <= index < key.length()
C. 0 <= index < phrase.length() + key.length()
D. 0 <= index < phrase.length() - key.length()
E. 0 <= index < phrase.length() - index

Answers

Answer:

Option D 0 <= index < phrase.length() - key.length()

Explanation:

The index has to be between the range of 0 <= index < phrase length - key length to prevent index out of bound error. This is because the substring method will have to extract part of the string with a certain length from the original string starting from the index-position. If the key length is longer than the string area between phrase[index] and  phase.length(), an index out of bound runtime error will be thrown.

5. Write a 500- to 1,000-word description of one of the following items or of a piece of equipment used in your field. In a note preceding the description, specify your audience and indicate the type of description (general or particular) you are writing. Include appropriate graphics, and be sure to cite their sources correctly if you did not create them (see Appendix, Part B, for documentation systems). a. GPS device b. MP3 player c. waste electrical and electronic equipment d. automobile jack e. bluetooth technology

Answers

Final answer:

This response examines the role of smartphones, laptops, and GPS devices in daily life, considering how they affect communication, work, travel, and convenience.

Explanation:

Understanding how electronic devices shape our daily lives can provide insight into their pervasive influence and the reliance we've developed on technology. For this exercise, we'll examine three common devices: a smartphone, a laptop, and a GPS device.

Smartphones have become nearly indispensable in modern life. They serve as communication hubs, personal assistants, and portable entertainment systems. The smartphone keeps us connected through calls, texts, emails, and social media. It also helps manage our schedules, set alarms, and capture memories through its camera. Life without smartphones would mean a return to separate devices for each of these functions and a significant loss in convenience and efficiency.

Laptops offer portable computing power that enables us to work, learn, and play from virtually anywhere. They are essential for students and professionals alike, as they support software for creating documents, managing data, and facilitating online meetings. The absence of laptops would drastically change the landscape of mobile work and education, likely requiring a heavier reliance on desktop computers and physical media.

A GPS device provides accurate navigation and location tracking, which is especially useful for travel and logistics. The utility of GPS extends beyond simple navigation to include applications in science, military, and emergency services. Without GPS technology, we would need to rely on physical maps and alternative methods for location tracking, potentially complicating travel and critical operations.

_____ has many knowledge management applications, ranging from mapping knowledge flows and identifying knowledge gaps within organizations to helping establish collaborative networks. Select one: a. Social network analysis (SNA) b. Branching router-based multicast routing (BRM) c. Online analytical processing (OLAP) d. Drill-down analysis (DDA)

Answers

Answer:

A. Social network analysis (SNA).

Explanation:

This is explained to be a process of quantitative and qualitative analysis of a social network. It measures and maps the flow of relationships and relationship changes between knowledge possessing entities. Simple and complex entities include websites, computers, animals, humans, groups, organizations and nations.

The SNA structure is made up of node entities, such as humans, and ties, such as relationships. The advent of modern thought and computing facilitated a gradual evolution of the social networking concept in the form of highly complex, graphical based networks with many types of nodes and ties. These networks are the key to procedures and initiatives involving problem solving, administration and operations.

For credit card processing, stock exchanges, and airline reservations, data availability must be continuous. There are many other examples of mission-critical applications. Research the Internet to find four additional mission-critical applications and explain why data availability must be continuous for these applications. If you use information from the Web, use reputable sites. Do not plagiarize or copy from the Web. Be sure to cite your references.

Answers

Answer:

The answer to this question can be described as follows:

Explanation:

The mission-critical System-

A vital mission program is necessary for an organization's life. If a critical task program disrupted, industrial control should be severely affected.  The essential support device is often referred to as critical task equipment.

Safety system for nuclear reactors-

The nuclear power plant is used to control the system, and it also contains and continues reactions.  It's also usually used only for energy production, and also used experiments and clinical isotope manufacture.  

If another system of nuclear power fails, this could result in a continuous nuclear reaction in a range of aspects like irradiated leaks. These same persons across the area may experience serious radioactivity symptoms.

The main task in their personal life-  

They realize, that without power, they turn down your entire life when you've never encountered a dark off with more than 30 minutes. Essentially, people wouldn't have been allowed to do what you'll do, entirely frozen.  

Consumer survey: big financial transfer controlling business-

That company is the infrastructure and software supplier for banks, traders, distributors, and institutional investors to take out money transfers. With all the money transfers they depend on, you must establish a successful company to become the 'guy behind the button', etc.

When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. But, she does not like to remember too many passwords. She wants to keep only one password. So, she tried to change the password again to her original password. But, she cannot change the password. Why can’t she change the password

Answers

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.

g The state of Massachusetts at one time had considered generating electric power by harvesting energy crops and burning them. Assume that the state requires 4000 MW of electricity and that planted crops yield between 10,000 and 20,000 lb of dry biomass per acre per year that could be burned to produce electricity at 35% efficiency. How many acres would the state need to plant to supply all its electricity in this way? HTML EditorKeyboard Shortcuts

Answers

Answer:

The require number of acres is between 220714.991 acres and 4414287.982 acres

Explanation:

Given

Power = 4,000MW

Yield = 10,000lb - 20,000 lb/year

Electricity Efficiency = 35%

Required

Number of acres needed

To calculate the required number of acres, the following steps will be followed.

1. Calculate total energy

2. Calculate the intensity of energy

3. Calculate number of acres.

Calculating the total energy

Energy = Power * Time

From the question;

Power = 4,000MW

The crop yield is measured on a yearly basis. So, time = 1 year.

Convert time to seconds.

First, we convert to days

1 year = 365 days;

Then to hours

= 365 * 24

Then to minutes

= 365 * 24 * 60

Then to seconds

= 365 * 24 * 60 * 60

So,

1 year = 365 * 24 * 60 * 60

1 year = 31,536,000s.

Energy = 4,000 MW * 31,536,000

Emergy = 1.26144E11 MJ

Calculating the intensity of energy.

Energy Intensity = Required Energy * Efficiency

Efficiency = 35%

Calculating Required Energy

When Yield = 10,000 lb

First, we convert this to kilogram

1 lb = 0.453592 kg

10,000 lb = 10,000 * 0.453592

10,000 lb = 4535.92 kg

From energy characterisation factors and method table.

1 kg requires 18 MJ of energy.

4535.92 will require:

4535.92 * 18MJ

= 81646.56 MJ of energy.

Hence, Required Energy = 81646.56 MJ

So, Energy Intensity = 81646.56 MJ * 35%

Energy Intensity = 28576.296 MJ.

Hence, when yield = 10,000 lb; the energy intensity is 28576.296 MJ

When Yield = 20,000 lb

Energy Intensity = Required Energy * Efficiency

If the energy intensity is 28576.296 MJ when yield = 10,000 MJ

Energy Intensity = 2 * 28576.296 MJ

Yield = 2 * 10,000 lb

Hence, Energy Intensity = 2 *28576.296 MJ

Energy Intensity = 57152.592 MJ

Now, the number of acres can be calculated.

Number of acres = Total Energy ÷ Intensity.

Total Energy = 1.26144E11 MJ

When Yield = 10,000 lb, Intensity = 28576.296 MJ

Number of acres = 1.26144E11 ÷ 28576.296

Number of acres = 4414287.982 acres

When Yield = 20,000 lb, Intensity = 57152.592 MJ

Number of acres = 1.26144E11 ÷ 57152.592

Number of acres = 220714.991 acres

Hence, the require number of acres is between 220714.991 acres and 4414287.982 acres

what is linux? what is it good for. And why do people use it?

Answers

Answer:

Linux is Unix-based and Unix was originally designed to provide an environment that's powerful, stable and reliable yet easy to use. Linux systems are widely known for their stability and reliability, many Linux servers on the Internet have been running for years without failure or even being restarted

Explanation:

Linux is used for commercial networking

14. Which of the following statements is true? A. The most secure email message authenticity and confidentiality isprovided by signing the message using the sender’s public key and encrypting the message using the receiver’s private key. B. The most secure email message authenticity and confidentiality isprovided by signing the message using the sender’s private key and encrypting the message using the receiver’s public key. C. The most secure email message authenticity and confidentiality isprovided by signing the message using the receiver’s private key and encrypting the message using the sender’s public key. 266 D. The most secure email message authenticity and confidentiality isprovided by signing the message using the receiver’s public key and encrypting the message using the sender’s private key.

Answers

Answer:

A. The most secure email message authenticity and confidentiality is provided by signing the message using the sender’s public key and encrypting the message using the receiver’s private key

Explanation:

Public key cryptography helps to send public key in an open and an insecure channel as having a friend's public key helps to encrypt messages to them.

The private key helps to decrypt messages encrypted to you by the other person.

The most secure email message authenticity and confidentiality is provided by signing the message using the sender’s public key and encrypting the message using the receiver’s private key

) Write the code to display the content below using user input. The program Name is Half_XmasTree. This program MUST use (ONLY) for loops to display the output below from 10 to 1 therefore ...1st row prints 10 star 2nd row prints 9… 3rd print 8 stars and so forth... This program is controlled by the user to input the amount of row. A good test condition is the value of ten rows. The user will demand the size of the tree. Remember the purpose of print() and println()

Answers

Answer:

Following are the program in java language that is mention below

Explanation:

import java.util.*;  // import package

public class Half_XmasTree // main class

{

public static void main(String args[])  // main method

{

int k,i1,j1; // variable declaration  

Scanner sc2=new Scanner(System.in);   // create the object of scanner

System.out.println("Enter the Number of rows : ");

k=sc2.nextInt(); // Read input by user

for(i1=0;i1<k;i1++)  //iterating the loop

{

for(j1=0;j1<i1;j1++)  // iterating the loop

System.out.print(" ");

for(int r=k-i1;r>0;r--)  //iterating loop

System.out.print("*");  // print *

System.out.println();

}

}

}

Output:

Following are the attachment of output

Following are the description of program

Declared a variable k,i1,j1 as integer type .Create a instance of scanner class "sc2" for taking the input of the rows.Read the input of row in the variable "K" by using nextInt() method .We used three for loop for implement this program .In the last loop we print the * by using system.println() method.

The Half_XmasTree program illustrates the use of loops

Loops are used for operations that must be repeated until a certain condition is met.

The Half_XmasTree program

The Half_XmasTree program written in Java where comments are used to explain each action is as follows:

import java.util.*;

public class Half_XmasTree{

public static void main(String args[]){

   //This creates a Scanner object

   Scanner input =new Scanner(System.in);

   //This prompts the user for the number of rows

   System.out.print("Number of rows: ");

   //This gets input the user for the number of rows

   int rows=input.nextInt();

   //The following iteration prints the half x-mas tree

   for(int i=0; i<rows;i++){

       for(int j=0;j<i;j++){

           System.out.print(" ");

       }

       for(int r=rows-i;r>0;r--){

           System.out.print("*");

       }

       System.out.println();

   }

}

}

Read more about loops at:

https://brainly.com/question/24833629

Other Questions
Trinity takes a sample of 50 songs and finds that 20 are by a female artist. Based on this problem, which of the following is a 99% confidence interval for the proportion of songs on her phone by a female artist? The 2016 annual report for Mega Mills disclosed that 1 billion shares of common stock have been authorized. At the end of 2015, 770 million shares had been issued and the number of shares in treasury stock was 99 million. During 2016, the only common share transactions were that 16 million common shares were reissued from treasury and 22 million common shares were purchased and held as treasury stock. Required: Determine the number of common shares (a) issued, (b) in treasury, and (c) outstanding at the end of 2016. Which statement about ionic bonds is true?A. Ionic bonds occur between non-metals.B. Ionic bonds occur between two metals.C. In ionic bonds one atom accepts electrons from another atom to achieve a stable outer shell.D. In ionic bonds atoms share electrons to achieve a stable outer shell. A commonly cited standard for one-way length (duration) of school bus rides for elementary school children is 30 minutes. A local government office in a rural area conducts a study to determine if elementary schoolers in their district have a longer average one-way commute time. If they determine that the average commute time of students in their district is significantly higher than the commonly cited standard they will invest in increasing the number of school buses to help shorten commute time. What would a Type 2 error mean in this context? Which of the following correctly pairs the subatomic particle with its charge? Select one:a. Protonneutralb. Protonpositivec. Neutronnegatived. Neutronpositive who founded th know nothing party What does the Constitution require for a candidate to be approved as a federal judge?A. The candidate must be a lawyer.B. The candidate must be 50 years of age or older.C. The candidate needs to have served previously as a judge in a state court system.D. There are no constitutional requirements for becoming a federal judge. Which expression uses the distributive property to represent the sum of 39 + 27 Which group of people was MOST affected by the boll weevil in the years between World War I and World War II?cotton farmersfactory workersrailroad workersgovernment officials Megatron Corp. earned net income of 13 comma 000 Euros in its overseas branch at France. Its headquarters is located in the U.S. The rate of conversion during set up was $ 1.31 / Euro. What is the value of its income in its home currency if the rate is $ 1.51 / Euro at the end of a financial year and the average rate being $ 1.41 / Euro? What is the molality of a solution in which 55g of sucrose are dissolved in 950mL of water? Which statement correctly describes the location and charge of the protons in an atom? What confirmed Grovers hunch that there was danger? A. Aunty Em locked the door behind them.B. He realized that the cement statue used to be his uncle.C. She kept asking Grover to smile.D. She went to get her camera. The public library has volunteers shelve books after they have been returned. When Lisa arrives to volunteer, there are 5 non-fiction books for every 9 fiction books. If there are 117 fiction books to shelve, then how many non-fiction books need to be shelved? Xion Co. budgets a selling price of $80 per unit, variable costs of $35 per unit, and total fixed costs of $271,000. During June, the company produced and sold 10,900 units and incurred actual variable costs of $352,000 and actual fixed costs of $286,000. Actual sales for June were $895,000. Prepare a flexible budget report showing variances between budgeted and actual results. List variable and fixed expenses separately. (Indicate the effect of each variance by selecting for favorable, unfavorable, and no variance) The math question is attached below. PLEASE ANSWER RN!! Which statement can be represented by the equation Two-fifths x + 9 = 9? Two-fifths of nine is a number. Two-fifths of a number is nine. Nine more than two-fifths of a number is nine. A number plus nine is the same as two-fifths of nine. Write an inequality, in slope-intercept form, for the graph below. If necessary,use "=" for < or ">=' . will give brainliest for the correct answer Using a refracting telescope, you observe the planet Mars when it is 1.95 10 11 m from Earth. The diameter of the telescope's objective lens is 0.977 m . What is the minimum feature size, in kilometers, on the surface of Mars that your telescope can resolve for you? Use 561 nm for the wavelength of light. Sandy cut three pieces of yarn to use for her art project one was 1ft 8in long one was 10 in long and one was 2 ft 6 in Long how much yarn did Sandy use Steam Workshop Downloader