6. In cell K4, create a formula using the IF function to calculate the interest paid on the mortgage (or the difference between the total payments made each year and the total amount of mortgage principal paid each year). a. The formula should first check if the value in cell H4 (the balance remaining on the loan each year) is greater than 0. b. If the value in cell H4 is greater than 0, the formula should return the value in J4 subtracted from the value in cell D5 multiplied by 12. Use a relative cell reference to cell J4 and an absolute cell reference to cell D5. (Hint: Use 12*$D$5-J4 as the is_true argument value in the formula.) c. If the value in cell H4 is not greater than 0, the formula should return a value of 0. Copy the formula from cell K4 into the range K5:K18.

Answers

Answer 1

Answer:

a. =IF(H4>0,12*$D$5-J4,0)

Explanation:

a. =IF(H4>0,12*$D$5-J4,0)

If( H4>0 is the logical test,

12*$D$5-J4 is [value_if_true]

0 is [value_if_false]

b. Referencing to the above formula in (a), which is the required formula which should be typed in cell K4.

Absolute referencing of cell D5 means that this will not change while extending this formula to the entire column. Whereas, since cell H4 and J4 have relative cell referencing, these will change relatively as we extend the formula to the entire column.


Related Questions

1) Your program must contain functions to: deposit, withdraw, balance inquiry and quit. 2) Based on the selection made by the user the functions must be called with the following criteria: a. A user can deposit any amount of money in their account. The function must display the new balance after depositing. by. A person can withdraw an amount as long as it is lower than or equal to his current balance. The function must also display a warning if the new balance is below $100. Must not allow the user to withdraw if amount is great than current balance. Before this function ends - the new balance must be displayed. c. Balance inquiry function must display the balance.

Answers

Answer:

import java.util.Scanner;

public class num6 {

   static double balance = 10000.5; //Current Balance

   //The main Method

   public static void main(String[] args) {

       //Request User Input

       System.out.println("Enter 1 for deposit \nEnter 2 for Withdraw\nEnter 3 for Balance Enquiry\n0 to quit ");

       Scanner in = new Scanner(System.in);

       int op = in.nextInt();

       //Check to determine the Operation the user wants

       if(op == 1){

           System.out.println("Enter amount to deposit");

           double depositeAmount = in.nextDouble();

           deposit(depositeAmount); //Call the deposit method

       }

       if(op == 2){

           System.out.println("Enter amount to Withdraw");

           double withdrawAmount = in.nextDouble();

           //validate the withdraw amount

           if(withdrawAmount > balance){

               System.out.println("Insuffucient fund");

               System.out.println("Your current balance is "+balance);

           }

           else {

               withdraw(withdrawAmount);//Call withdraw Method

           }

           }

       if(op == 3){

           balanceEnquiry();

       }

   }

   //Deposit Method

   public static double deposit(double depositAmount){

       double newBalance = balance + depositAmount;

       System.out.println("You deposited "+depositAmount+"Your new balance is "+newBalance);

       return newBalance;

   }

   //Withdraw Method

   public static double withdraw(double withdrawAmount){

           double newBalance = balance - withdrawAmount;

       System.out.println("You Withdrew "+withdrawAmount+"Your new balance is "+newBalance);

           if(newBalance < 100){

           System.out.println("Your Balance is low");

       }

       return  newBalance;

   }

   //Balance Enquiry Method

   public static void balanceEnquiry(){

       System.out.println("Your current balance is "+balance);

   }

}

Explanation:

This is solved in Java programming language

See code explation provided as comments

1- (8 point) The following questions relate to an array called numfrc. a) Define the size of the array to 25 by using a constant macro SIZE. b) Declare the array to be of type double and initialize the elements to 0. c) Assign the value of 6.666 to the 14 th element of the array from beginning. d) Refer to array element index 14 and assign the value of -6.666 to it. e) Assign the value 1.667 to array element index nine. f) Assign the value 3.333 to the seventh element of the array from beginning. g) Print array elements index 14 and 9 with two digits of precision to the right of the decimal point, and show the output that is displayed on the screen. h) Print all the elements of the array, using a for repetition statement. Assume the variable i has been defined as a counter control variable for the loop. Show the output as a table with index number and element value.

Answers

Answer:

Explanation:

Note: Alphabets refers to respective problem in question

Program:

#include<stdio.h>

#define SIZE 25

int main()

{

  double numfrc[SIZE];                                   // (a)

  for(int i=0;i<SIZE;i++)                                   // (b)

      numfrc[i]=0;

 

  numfrc[13]=6.666;                                       // (c)

  numfrc[14]=-6.666;                                       // (d)

  numfrc[9]=1.667;                                       // (e)

  numfrc[6]=3.333;                                       // (f)

 

  for(int i=14;i>=9;i--)

      printf("%2d ---> %.2lf\n",i,numfrc[i]);               // (g)

     

  printf("\n");

 

  for(int i=0;i<SIZE;i++)

      printf("%2d ---> %.2lf\n",i,numfrc[i]);               // (h)

     

}

Output:

JAVA
Write a method that takes the last two values of a String and adds those two values three more times on to the end of the String.

For example, repeatTwo("karel") would return "karelelelel".

public static String repeatTwo(String word){
}

Answers

Answer:

Is in the provided screenshot

Explanation:

Get the last two characters and concatenate.

Final answer:

To solve the task, a method in Java is written that appends the last two characters of the input string three additional times to the end, using the substring method.

Explanation:

The task is to write a method in Java that takes a given string and appends the last two characters of that string three more times onto the end of it. This operation modifies the original string by repeatedly adding a substring that consists of its last two characters.

Method Implementation:

Here is how you can write the method:

public static String repeatTwo(String word) {
   if (word == null || word.length() < 2) {
       return word; // handle null and short strings
   }
   String lastTwoChars = word.substring(word.length() - 2);
   return word + lastTwoChars + lastTwoChars + lastTwoChars;
}

This method first checks if the input string is null or shorter than two characters. If it isn't, it proceeds to use the substring method to extract the last two characters and concatenates this substring three times to the end of the original string.

A professor wants to know if students are getting enough sleep. Each day, the professor observes whether the students sleep in class, and whether they have red eyes. The professor has the following domain theory:

• The prior probability of getting enough sleep, with no observations, is 0.7.
• The probability of getting enough sleep on night t is 0.8 given that the student got enough sleep the previous night, and 0.3 if not.
• The probability of having red eyes is 0.2 if the student got enough sleep, and 0.7 if not.
• The probability of sleeping in class is 0.1 if the student got enough sleep, and 0.3 if not.

Answers

Answer:

Each day, the professor observes whether the students sleep in class, and whether they have red eyes. The professor has the following domain theory: • The prior probability of getting enough sleep, with ... The probability of having red eyes if the student did not get enough sleep. • The probability of sleeping in class is if the ...

Explanation:

What is technology??

Answers

Answer:

Technology is the skills, methods, and processes used to achieve goals. People can use technology to: Produce goods or services. Carry out goals, such as scientific investigation or sending a spaceship to the moon. Solve problems, such as disease or famine.

Explanation:

Good Luck!

Technology refers to the application of scientific knowledge, tools, and techniques for practical purposes.

Technology involves the creation, development, and utilization of various systems, methods, processes, and devices to solve problems, improve efficiency, enhance productivity, and achieve specific goals in different domains.

Technology encompasses a wide range of fields and disciplines, including engineering, computer science, electronics, telecommunications, biotechnology, information technology, and more. It involves the design, production, and utilization of tangible and intangible artifacts, such as machinery, software, infrastructure, systems, algorithms, and networks.

Technology is constantly evolving and advancing, driven by research, innovation, and human creativity. It plays a significant role in shaping societies, economies, and cultures, influencing various aspects of our lives.

Overall, technology encompasses the tools, knowledge, and systems that enable the practical application of scientific understanding to address challenges, improve efficiency, and enhance human experiences in the modern world.

Learn more about Technology here:

https://brainly.com/question/9171028

#SPJ6

Tiny College wants to keep track of the history of all its administrative appointments, including dates of appointment and dates of termination. (Hint: Time- variant data is at work.) The Tiny College chancellor may want to know how many deans worked in the College of Business between January 1, 1960, and January 1, 2018, or who the dean of the College of Education was in 1990. Given that information, create the complete ERD that contains all primary keys, foreign keys, and main attributes. To upload and submit your assignment, click the Choose File button below to find and select your saved document. Make sure that the file is saved with your last name in the file name. (Example: ch5_problem1_Jones.doc)

Answers

Answer:

Explanation:

check below for the answer in d attached file

Write a method called swapPairs that switches the order of values in an ArrayList of strings in a pairwise fashion. Your method should switch the order of the first two values, then switch the order of the next two, then the next two, and so on. If the number of values in the list is odd, the method should not move the final element. For example, if the list initially stores ["to", "be", "or", "not", "to", "be", "hamlet"], your method should change the list's contents to ["be", "to", "not", "or", "be", "to", "hamlet"].

Answers

Answer:

import java.util.ArrayList; public class Main {    public static void main(String[] args) {        ArrayList<String> strList =new ArrayList<String>();        strList.add("to");        strList.add("be");        strList.add("or");        strList.add("not");        strList.add("to");        strList.add("be");        strList.add("hamlet");        swapPairs(strList);        System.out.println(strList);    }    public static void swapPairs(ArrayList<String> list){        for(int i=0; i < list.size()-1; i+=2){            String temp = list.get(i);            list.set(i, list.get(i+1));            list.set(i+1, temp);        }    } }

Explanation:

Firstly, let's create a method swapPairs that take one ArrayList (Line 18). In the method, use a for-loop to traverse through each item in the ArrayList and swap the items between the current items at index-i and at index-i+1 (Line 19-22). The index-i is incremented by two in next loop and therefore the next swapping will proceed with third and fourth items and so forth.

In the main program, create a sample ArrayList (Line 5-12) and then test the method (Line 14) and print the output (Line 15). We shall get  [be, to, not, or, be, to, hamlet].

A Musician class has been built that takes the name, number of albums sold, and number of weeks that artist has been on the Top40 list. The Musician class also has a boolean instance variable isPlatinum that determines if the musician has gone platinum, meaning they’ve sold over a million copies of the same record. The Billboard class currently has a top10 ArrayList that will store the top 10 musicians as a list. In the Billboard class, create an add method that will add a musician to the list if there are less than 10 musicians in the list, and if the musician has Platinum status. If there are 10 musicians in the list, then the method should call the replace method. Otherwise, a message should be displayed to the user that the musician could not be added to the top10 list. The replace method compares the total number of weeks that the musician has been on the top40 list. If the musician with the lowest number of weeks on the top40 is lower than the number of weeks on the top40 of the new musician, then the old musician is replaced by the new one. There should be a message to the user that the old musician has been replaced by the new one. Otherwise, the user should be notified that the new musician cannot be added because they don’t have enough weeks on the top40. This method should be created in the Billboard class. Use the BillboardTester class to test if the new musicians being added are being correctly replaced, or omitted from the Top 10.

Answers

Answer:

See explaination for program code

Explanation:

Java code below:

Musician.java :

public class Musician {

private String name;

private int weeksInTop40;

private int albumsSold;

private boolean isPlatinum;

public Musician(String name, int weeksInTop40, int albumsSold) {

this.name = name;

this.weeksInTop40 = weeksInTop40;

this.albumsSold = albumsSold;

setPlatinum(albumsSold);

}

public void setPlatinum(int albumsSold) {

if(albumsSold >= 1000000) {

isPlatinum = true;

}else {

isPlatinum = false;

}

}

public int getWeeksInTop40() {

return this.weeksInTop40;

}

public String getName() {

return this.name;

}

public boolean getIsPlatinum() {

return this.isPlatinum;

}

public String toString() {

return this.name;

}

}

Billboard.java :

import java.util.ArrayList;

public class Billboard {

private ArrayList<Musician> top10 = new ArrayList<Musician>();

public void add(Musician newMusician) {

if(this.top10.size()<10 && newMusician.getIsPlatinum()==true) {

/**

* Less than 10 musician are present in the list currently

* And also the newMusician is platinum

* */

this.top10.add(newMusician);

}else {

if(newMusician.getIsPlatinum()==false) {

System.out.println("The new musician "+newMusician+" cannot be added because not enough records are sold");

}else {

/**

* We need to call the replace method

* */

replace(newMusician);

}

}

}

public void replace(Musician newMusician) {

/**

* First we need to find what is the lowest number of weeks

* an musician was there in top40.

* */

int lowestOnTop40 = Integer.MAX_VALUE;

int index=-1;

for(int i=0;i<this.top10.size();i++) {

if(this.top10.get(i).getWeeksInTop40()<lowestOnTop40) {

lowestOnTop40 = this.top10.get(i).getWeeksInTop40();

index = i;

}

}

/**

* We have at what position the lowest number of week on top value in variable

* lowestOnTop40 at index

* We need to compare this value with newMusician's number of weeks on top 40

* */

if(lowestOnTop40 < newMusician.getWeeksInTop40()) {

System.out.println("The old musician "+this.top10.get(index)+" has been replaced by new musician "+newMusician);

this.top10.set(index, newMusician);

}else {

System.out.println("The new musician "+newMusician+" cannot be added because not enough weeks on top40.");

}

}

public void printTop10() {

System.out.println(top10);

}

}

BillboardTester.java :

public class BillboardTester {

public static void main(String[] args) {

Billboard top10 = new Billboard();

top10.add(new Musician("Beyonce", 316, 100000000));

top10.add(new Musician("The Beatles", 365, 600000000));

top10.add(new Musician("Drake", 425, 150000000));

top10.add(new Musician("Pink Floyd", 34, 250000000));

top10.add(new Musician("Mariah Carey", 287, 200000000));

top10.add(new Musician("Rihanna", 688, 250000000));

top10.add(new Musician("Queen", 327, 170000000));

top10.add(new Musician("Ed Sheeran", 536, 150000000));

top10.add(new Musician("Katy Perry", 317, 143000000));

top10.add(new Musician("Justin Bieber", 398, 140000000));

//This musician should not be added to the top10 because they don't have enough records sold

top10.add(new Musician("Karel the Dog", 332, 60));

//This musician should replace the artist

top10.add(new Musician("Tracy the Turtle", 332, 150000000));

//This musician should not replace an artist, but is a Platinum artist

top10.add(new Musician("Alex Eacker", 100, 23400000));

top10.printTop10();

}

}

2. Using the Enhanced for Statement, write an application that uses an enhanced for statement to sum the double values passed by the command-line arguments. [Hint: Use the static method parseDouble of class Double to convert a String to a double value.] This is sample run of your program: The·sum·of·the·double·values·passed·in·from·the·command·line·is·0.0↵

Answers

Answer:

Here is the program:

public class DoubleValue

{ public static void main(String[] args) { //start of the main function

 double sum = 0.0;  // initialize double type sum by 0.0

//for statement to sum the double values passed by the command-line //arguments

       for (String str : args)        {  

         sum += Double.parseDouble(str);  

//returns double representation of the passed str argument and takes the //sum of these double values         }

       System.out.printf("The sum of the double values passed in from the command line is %.1f\n", sum);  }  }      

//prints the above message with output 0.0                                  

Explanation:

The above program has a static method parseDouble of class Double to convert a string str to a double value and the for statement is used to sum the double values passed by command line arguments. This sum is stored in sum variable and is displayed in the output. The program along with its output is attached.

If you want to get the input from the user you can use the following code. Just use the Scanner class to take input from the user.

import java.util.Scanner;

public class DoubleValue

{ public static void main(String[] args) {

//two string type variables

 String str1;

               String str2;

//scans and reads input from user

Scanner input = new Scanner(System.in);

System.out.println("Enter value of str1: ");

str1 = input.next();

System.out.println("Enter value of str2: ");

str2 = input.next();

double sum = 0.0;

//sum double values and parseDouble function is used to convert string to //double value

sum += Double.parseDouble(str1) + Double.parseDouble(str2);

System.out.printf("The sum of the double values passed in from the command line is %.1f\n", sum); } }  //prints result of the sum

Final answer:

The code provided illustrates how to sum double values passed through command-line arguments in Java, using Double.parseDouble and an enhanced for loop, demonstrating important concepts in parsing and arithmetic operations in programming.

Explanation:

The question involves writing a Java application to sum double values passed through command-line arguments using an enhanced for loop, illustrating a practical application in parsing and arithmetic operations in programming. This task requires knowledge of Java's Double.parseDouble method and the enhanced for loop. To accomplish this, a main method is created where the command-line arguments are accessed. Each argument, which is initially a String, is converted to a double using Double.parseDouble, and then summed in an enhanced for loop. Here is a simple implementation:

public class SumDoubles {
   public static void main(String[] args) {
       double sum = 0.0;
       for (String arg : args) {
           sum += Double.parseDouble(arg);
       }
       System.out.println("The sum of the double values passed in from the command line is " + sum);
   }
}

This code snippet effectively addresses the task by converting command-line arguments from String to double and summing them. It demonstrates the use of command-line arguments, Double.parseDouble, and an enhanced for loop in Java.

This programming project is to simulate a few CPU scheduling policies discussed in the class. You willwrite a C program to implement a simulator with different scheduling algorithms. The simulator selects atask to run from ready queue based on the scheduling algorithm. Since the project intends to simulate aCPU scheduler, so it does not require any actual process creation or execution. When a task is scheduled,the simulator will simply print out what task is selected to run at a time. It outputs the way similar to Ganttchart style.

Answers

Answer:

FCFS Scheduling Algorithm:-

// C++ program for implementation of FCFS

// scheduling

#include<iostream>

using namespace std;

// Function to find the waiting time for all

// processes

void findWaitingTime(int processes[], int n,

int bt[], int wt[])

{

// waiting time for first process is 0

wt[0] = 0;

// calculating waiting time

for (int i = 1; i < n ; i++ )

wt[i] = bt[i-1] + wt[i-1] ;

}

// Function to calculate turn around time

void findTurnAroundTime( int processes[], int n,

int bt[], int wt[], int tat[])

{

// calculating turnaround time by adding

// bt[i] + wt[i]

for (int i = 0; i < n ; i++)

tat[i] = bt[i] + wt[i];

}

//Function to calculate average time

void findavgTime( int processes[], int n, int bt[])

{

int wt[n], tat[n], total_wt = 0, total_tat = 0;

//Function to find waiting time of all processes

findWaitingTime(processes, n, bt, wt);

//Function to find turn around time for all processes

findTurnAroundTime(processes, n, bt, wt, tat);

//Display processes along with all details

cout << "Processes "<< " Burst time "

<< " Waiting time " << " Turn around time\n";

// Calculate total waiting time and total turn

// around time

for (int i=0; i<n; i++)

{

total_wt = total_wt + wt[i];

total_tat = total_tat + tat[i];

cout << " " << i+1 << "\t\t" << bt[i] <<"\t "

<< wt[i] <<"\t\t " << tat[i] <<endl;

}

cout << "Average waiting time = "

<< (float)total_wt / (float)n;

cout << "\nAverage turn around time = "

<< (float)total_tat / (float)n;

}

// Driver code

int main()

{

//process id's

int processes[] = { 1, 2, 3};

int n = sizeof processes / sizeof processes[0];

//Burst time of all processes

int burst_time[] = {10, 5, 8};

findavgTime(processes, n, burst_time);

return 0;

}

Explanation:

See output

Write a program with functions that accepts a string as an argument and returns the number of vowels that the string contains. The application should have another function that accepts a string as an argument and return the number of consonants that the string contains. The application should let the user enter a string and should display the number of vowels and the number of consonants it contains.

Answers

Answer:

import java.util.Scanner;

public class num11 {

   public static void main(String[] args) {

   Scanner in = new Scanner(System.in);

       System.out.println("Enter a word or phrase");

       String word = in.nextLine();

       //Calling the methods

       System.out.println("Total vowels in "+word+" are "+numVowels(word));

       System.out.println("Total consonants in "+word+" are "+numConsonants(word));

   }

   public static int numVowels(String word){

       //Remove spaces and convert to lowercase

       //Assume that only correct character a-z are entered

       String newWord = word.toLowerCase().replaceAll(" ","");

       int vowelCount = 0;

       for(int i = 0; i <= newWord.length()-1; i++){

           if(newWord.charAt(i)=='a'||newWord.charAt(i)=='e'||newWord.charAt(i)=='i'

                   ||newWord.charAt(i)=='o'||newWord.charAt(i)=='u'){

               vowelCount++;

           }

       }

       return vowelCount;

   }

   public static int numConsonants(String word){

       //Remove spaces and convert to lowercase

       //Assume that only correct character a-z are entered

       String newWord = word.toLowerCase().replaceAll(" ","");

       int consonantCount = 0;

       //Substract total vowels from the length of the word to get the consonants

       consonantCount = newWord.length()-numVowels(word);

       return consonantCount;

   }

}

Explanation:

Create two methods vowelCount() and consonantCount() both accepts a string parameter and returns an intvowelCount() Uses a for loop to count the occurrence of the vowels (a,e,i,o,u) in the string and returns the count.consonantCount calls vowelCount and subtracts the vowelCount from the string lengthIn the main Method the user is prompted to enter a stringThe two methods are called to return the number of vowels and consonantsObserve also that it is assumed that user entered only strings containing the character a-Z. Observe also that the string is converted to all lower cases and whitespaces removed.

Consider a one-way authentication technique based on asymmetric encryption: A --> B: IDA B --> A: R1 A --> B: E(PRa, R1) Explain the protocol. What type of attack is this protocol susceptible to?

Answers

Answer:

See explaination

Explanation:

A protocol in computing can be defined as a standard set of rules that allow electronic devices to communicate with each other. These rules include what type of data may be transmitted, what commands are used to send and receive data, and how data transfers are confirmed. You can think of a protocol as a spoken language.

Please kindly check attachment for for the details of the answer.

 (a) Protocol working

Here, A-->B : ID means protocol is issued authentic A to B.

Then B--> A : R1 here, R1 take care about only A can encrypt R1 ensure that only A can take authentication challenge.Last A--> B : E (PRa, R1) here, A's public key is take care to decrypt.

(b). According to the question it is based on asymmetric key encryption technique, Let us assume any third-party K could use the given below assumption:

Let us suppose A sign a message, and this message, K show to any other party D.so, in this case if A used public or private key for authentication and signature.Then, in this case attacks occurrence chance is happen, so man middle attack will be happen.

Learn more about:

https://brainly.com/question/17495888

public class Test { public static void main(String[] args) { try { method(); System.out.println("After the method call"); } catch (ArithmeticException ex) { System.out.println("ArithmeticException"); } catch (RuntimeException ex) { System.out.println("RuntimeException"); } catch (Exception e) { System.out.println("Exception"); } } static void method() throws Exception { System.out.println(1 / 0); } }

Answers

Answer:

"ArithmeticException" is the correct answer for the above question.

Explanation:

Missing Information : The above question does not hold that "what is the output of the program".

The above question has a class that holds the two functions one function is the main function which calls the other function in a try-catch block.The method function holds one run time exception which is 1/0 which is an arithmetic exception.It can be handle by the help of an arithmetic class object which is defined in the first catch block.Hence the print function of this catch is executed and prints "ArithmeticException".

Create a class CitiesAndCountries with at least three methods: class CitiesAndCountries: def add_country(self, country_name): """ :param country_name: name of new country :return: True if added, False if duplicate """ def add_city(self, country_name, city_name): """ :param country_name: must be a country in the already defined countries :param city_name: name of new city. :return: True if added, False if not added """ def find_city(self, city_name): """ :param city_name: get all cities with that name, in all different countries :return: list of countries which have a city with that name, empty list if none """

Answers

Answer:

Check the explanation

Explanation:

class CitiesAndCountries:

   """

   This is the class which maintains a dictionary of the Countries with the cites in them.

   """

   def __init__(self):

       """

       Constructor for the class CitiesAndCountries.

       It defines a dictionary to store the names of the countries and a list of the cities which are in them

       Example of the the following dictionary when it is populated:

       citiesandcountries = {"india":["bhopal", "mumbai", "nagpur"], "usa":["new york", "seatlle"]

       Keeping the names in lowercase helps in search

       """

       self.citiesandcountries = {}  # This is the dictionary which stores the information

   def add_country(self, country_name):

       """

       The add_country function to add countries to our list.

       :param country_name: Name of the country to add to the dictionary

       :return: True if added to the dictionary, False if it is already present in the dictionary

       """

       if country_name.lower() not in self.citiesandcountries.keys():

           self.citiesandcountries[country_name.lower()] = [] # Storing the country name in lower case helps in

           # searching

           return True

       else:  # You could omit the else statement and directly return False, but it adds to readability.

           return False

   def add_city(self, country_name, city_name):

       """

       This function adds the cities names to the dictionary corresponding to their countries.

       :param country_name: Country to which the city belongs

       :param city_name:  Name of the city to be added

       :return: True if the country is present in the dictionary and the city is added to the list, else False

       """

       if country_name.lower() in self.citiesandcountries.keys():

           self.citiesandcountries[country_name.lower()].append(city_name.lower())

           return True

       else:

           return False

   def find_city(self, city_name):

       """

       This function is used to retrive a list of countries where the city with the given name is present

       :param city_name: Name of the city.

       :return: A list of all the countries where the city if present.

       """

       countries_with_city = []

       for country in self.citiesandcountries.keys():

           if city_name.lower() in self.citiesandcountries[country]:

               countries_with_city.append(country.title())

       return countries_with_city

Write a complete program that declares an array of 1000 integers and initializes each element in the array to have a value equal to the index of that element. That is, the value at index 0 should be 0, the value at index 1 should be 1, the value at index 2 should be 2, and so on. Then, ask the * user for a single integer input. Triple the value of each element in the * array whose value is divisible by that user input. You do not need to print out the array or anything else except for the user input prompt. You can assume that the user will input an integer when prompted.

Answers

Answer:

see explaination

Explanation:

import java.util.Scanner;

class Main

{

public static void main (String[] args)

{

int []A = new int[1000]; // Declaration of array which will store 1000 integers

for( int i = 0; i<1000; i++ )

A[i] = i; // will initialise elements of array equal to their index

System.out.print("Enter a value: ");

Scanner sc = new Scanner(System.in);

int num = sc.nextInt(); // Prompts the user to enter value

for( int i = 0; i<1000; i++ )

{

if( A[i]%num==0 ) //checks if the element is divisible by the entered value

A[i] = 3*A[i]; // Triples the value and reassigns to the same element

}

}

}

5. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for each of the following byte addresses: 0, 9, 27, 31,120, and 256.

6. Extend the above exercise by writing a computer program that computes the answer. The program should take a series of inputs that each consist of two values: a word size specified in bits and a byte address. For each input, the program should generate a word address and offset within the word. Note: although it is specified in bits, the word size must be a power of two bytes.

Answers

Answer:

see explaination and attachment

Explanation:

5.

To convert any byte address, By, to word address, Wo, first divide By by No, the no. of bytes/word, and ignores the remainder. To calculate a byte offset, O, in word, calculate the remainder of By divided by No.

i) 0 : word address = 0/8 = 0 and offset, O = 0 mod 8 = 0

ii) 9 : word address = 9/8 = 1 and offset, O = 9 mod 8 = 1

iii) 27 : word address = 27/8 = 3 and offset, O = 27 mod 8 = 3

iv) 31 : word address = 31/8 = 3 and offset, O = 31 mod 8 = 7

v) 120 : word address = 120/8 = 15 and offset, O = 120 mod 8 = 0

vi) 256 :word address = 256/8 = 32 and offset, O = 256 mod 8 = 0

6. see attachment for the python programming screen shot and output

The word address is the integer division of the physical address by 8, while the offset is the remainder of the physical address divided by 8.

(a) Calculate the word address and offset

The number of bit is given as 64.

So, we have:

[tex]2^n = 64[/tex]

Express 64 as a base of 2

[tex]2^n = 2^8[/tex]

Cancel out the base of 2

[tex]n = 8[/tex]

So, we have:

(i) Physical address: 0

Word address = 0\8 = 0Offset = 0 mod 8 = 0

(ii) Physical address: 9

Word address = 9\8 = 1Offset = 9 mod 8 = 1

(iii) Physical address: 27

Word address = 27/8 = 3Offset = 27 mod 8 = 3

(iv) Physical address: 31

Word address = 31/8 = 3Offset = 31 mod 8 = 7

(v) Physical address: 120

Word address = 120/8 = 15Offset = 120 mod 8 = 0

(v) Physical address: 256

Word address = 256/8 = 32Offset = 256 mod 8 = 0

(b) The program

The program written in Python, where comments are used to explain each line is as follows:

#This creates a list of physical address

pA = [0, 9, 27, 31,120, 256]

#This iterates through the list

for i in range(len(pA)):

   #This prints the word address

   print("Word Address:",(pA[i]//8))

   #This prints the offset

   print("Offset:",(pA[i]%8))

Read more about word address at:

https://brainly.com/question/17493537

1. An integer in C (int) is represented by 4 bytes (1 byte = 8 bits). Find the largest integer that can be handled by C. Verify that number by computer (try to printf that number, and printf that number +1). No programming is required for this. Hint: (a) Conversion from binary to decimal: 3 2 1 0 2 1101 =1 2 + 0 2 +1 2 +1 2 = 8 + 0 + 2 +1 10 =11 (b) If an integer is represented by 1 byte (8 bits), the maximum integer number is 1111111 (Seven 1's as one bit must be reserved for a sign). 6 5 0 2 1111111 =1 2 +1 2 ++1 2 1 2 1 7 =  − =128 −1 (c) The number looks like a telephone number in Dallas.

Answers

Answer:

Check the explanation

Explanation:

In C, int requires 4 butes to sotre a integer number. that means it requires 4*8 = 32 bits. The maximum number can be stored using 32 bits is

[tex](11111111111111111111111111111111)_2[/tex]

The first digit is used for sign. decimal equivalent to this number can be computed as

[tex](1111111111111111111111111111111)_2= 1\times2^{30}+1\times2^{29}+...+1\times2^0[/tex]

=[tex]1\times2^{31}-1[/tex]

= [tex]2147483647-1=2147483646[/tex]

That means int can store a up to 2147483646.

                      Testing with C code

#include<stdio.h>

int main()

{

  int a = 2147483647; // a with max number

  printf("%d\n",a);// printing max number

  a = a+1;// adding one to the number

  printf("%d\n",a);// printing the number after adding one

  return 0;

}

                THE OUTPUT

$ ./a.out

2147483647

-2147483648

Final answer:

The largest integer that can be represented by an int in C is 2,147,483,647. Adding 1 to this maximum value leads to an integer overflow, resulting in the smallest possible integer that can be handled in C, which is -2,147,483,648.

Explanation:

In C, an integer (int) is typically represented using 4 bytes, or 32 bits. However, one bit is reserved for indicating the sign of the integer (positive or negative), leaving 31 bits for the numerical value. In binary notation, the maximum number that can be represented with 31 bits all set to 1 is 231-1. By direct calculation, this is 2,147,483,647. Therefore, the largest integer that can be represented by an int in C is 2,147,483,647.

When you try to add 1 to this maximum value (e.g., printf the number 2,147,483,647 + 1), the result will not be as expected because it leads to an integer overflow. Instead, it would give you the smallest possible integer that can be handled in C, which is -2,147,483,648.

Learn more about C Programming here:

https://brainly.com/question/34799304

#SPJ3

a. Assume a computer has a physical memory organized into 64-bit words. Give the word address and offset within the word for each of the following byte addresses:

0, 9, 27, 31,120, and 256.

b. Extend the above exercise by writing a computer program that computes the answer. The program should take a series of inputs that each consist of two values: a word size specified in bits and a byte address. For each input, the program should generate a word address and offset within the word. Note: although it is specified in bits, the word size must be a power of two bytes.

Answers

Answer:

Check the explanation

Explanation:

For 9th byte , it is from 8*8 bit to 9"8th bit so each word consists of 64 bits , to find word address u have to divide 8*8 by 64.

Offset within word = 9*8modulo 64.

For 27th byte , word address = 8*27/64.

Offset within word = 27* 8 modulo 64

For 21th byte , word address = 8*31/64

Offset within the word = 31*8 modulo 64

For 120 , word address = 8*120/64

Offset within the word = 120*8 modulo 64.

The major objective of this lab is to practice class and object-oriented programming (OOP), and separate files: 1. We will reuse lab 6, a direct current simulator with extensions to let you practice OOP. Pay special attention to the difference between procedural programming and OOP. 2. This is the first time you break a program into several files such that you do not need to have all functions included in one program. The idea of breaking a program into several files has many benefits that will be explained in lecture notes and ZyBook reading assignment. It is NOT the purpose of this lab to train your logical thinking capability. We select a simple problem to help you fully understand OOP and separate files in an efficient manner.

Answers

Answer:

Implementation of resistor.cpp

#include "resistor.h"

Ohms::Ohm()

{

// default constructor

voltage=0;

}

Ohms::Ohm( double x) // parameterised constructor

{

voltage = x; // voltage x set to the supply voltage in the private data field called voltage

}

Ohms:: setVoltage(double a)

{

voltage = a;// to set supply voltage in private data field called voltage

}

Ohms::setOneResistance( String s, double p)

{

cin>>p; //enter the resistance value

if(p<=0) // if resistance is less than or equals to 0

return false

else // if re

cin.getline(s);

}

Ohms::getVoltage()

{

return voltage; //return voltage of ckt

}

Ohms::getCurrent()

{

return current; //return current of ckt

}

Ohms:: getNode()

{

return resistors; //return resistors of ckt

}

Ohms::sumResist()

{

double tot_resist = accumulate(resistors.begin(),resistors.end(),0); //std::accumulate function for calculating sum //of vectors and following are the starting and ending points

return tot_resist;

}

Ohms::calcCurrent()

{

if(current <=0) // if current is less than or equal to 0

return false;

else   // if current is greater than 0

return true;

}

Ohms:: calcVoltageAcross()

{

if(voltage<=0) // if voltage is less than or equal to 0

return false;

else //if voltage greater than 0

return true;

}

Explanation:

in the case of main.cpp its simple just make a class object and remember to include resistors.cpp with it for which the second last picture describes the process precisely. (Hint: Use theunit test case functions in the main.cpp).

As you can see node is a structure consisting of member variables, followed by a class Ohms representing a DC circuit.

By looking at these pictures, it is needed to implement the main.cpp and resistor.cpp files. The user defined header file resistor.h already consists of all contents of Class Ohm, struct node. You don't need to modify it in anyway in such case.

After reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions
What questions should Iris ask Charlie about the new job, Kelvin’s team, and the future of the company?
What questions should Iris ask Kelvin about the new job?
Had you been in Kelvin’s place, what would you have done differently to prepare for this meeting?

Answers

Final answer:

Iris should ask Charlie and Kelvin thorough questions about the job's responsibilities, the team dynamics, and the company's future. Reflecting on past decisions with an understanding of cognitive bias leads to better outcomes. It's essential to commit to ongoing critical reflection to avoid future biases in decision-making.

Explanation:

Discussion Questions for Iris

When considering questions that Iris should ask Charlie, she should be inquisitive about the specifics of the new job, the dynamics within Kelvin's team, and the future of the company. This includes asking about the job responsibilities, the team's current projects and goals, the team's working style and culture, any potential for advancement, and the company's vision for the future and stability.

Questions for Kelvin

Regarding questions for Kelvin, Iris could probe deeper into how the role fits into the company's larger strategy, how success will be measured for the new position, what the expectations are during the first few months, and how Kelvin envisions the position evolving. These questions would provide Iris with a comprehensive understanding of how her potential role manifests within the company's framework.

Hypothetical Scenario as Kelvin

If placed in Kelvin's position, to prepare for the meeting, I would ensure that I clearly understood the objectives for the new role, prepared a structured plan outlining how I would integrate the new member into the team, and had a thorough understanding of the company's future plans to address any inquiries. Reflecting on past decisions through the lens of cognitive bias would help mitigate any irrational elements involved in decision-making.

Impact of Different Behaviors

Had a different approach been taken, such as being more critical or self-aware, the consequences may have included more informed decision-making and reduced chances of miscommunication. Understanding the cognitive bias and employing critical reflection and metacognition could have led to better outcomes and a healthier decision-making process.

Conclusion and Lessons Learned

In conclusion, reflecting on experiences and understanding cognitive biases can profoundly impact personal growth and decision-making. This level of self-awareness can lead to improved choices in the future and help avoid repeating the same mistakes. Committing to ongoing critical reflection and seeking diverse perspectives are steps one can take today to prevent cognitive bias from clouding judgment.

Write a code segment that uses a loop to create and place nine labels into a 3-by-3 grid. The text of each label should be its coordinates in the grid, starting with (0, 0) in the upper left corner. Each label should be centered in its grid cell. You should use a nested for loop in your code.

Answers

Answer:

Check the explanation

Explanation:

# List to store text values

grid=list()

# LOOP FOR 3 ROWS

for i in range(3):

   # LIST TO STORE COLUMN

   row = list()

   # LOOP FOR 3 COLUMNS

   for j in range(3):

       # CREATING TEXT WITH

       # COORDINATES FORMAT

       text = "({},{})".format(i,j)

       # APPEND TEXT TO ROW

       row.append(text)

   # APPEND ROW TO GRID

   grid.append(row)

# AFTER THE ABOVE LOOP

# GRID WILL BE CREATED IN TO

# 3 X 3 GRID

# PRINTING GRID

# FOR ALL ROWS

for i in grid:

   # FOR ALL COLUMNS

   for j in i:

       # PRINTING VALUE AT

       # ROW I, COLUMN J

       print(j,end=" ")

   print()

Kindly check the screenshot and output below.

Consider the following requests to read data from sectors of a hard drives, where the current position of the head is at sector 103 and the head is moving towards sector 0. What is the order in which the sectors in the queue would be services using the SCAN disk scheduling algorithm? 19, 5, 109, 23, 10, 87, 32, 120, 74, 14, 151, 81, 1, 123, 198

Answers

Answer:

168

Explanation:

=(109-103)+(120-109)+(123-120)+(151-123)+(198-151)+(87-74)+(74-32)+(32-23)+(23-19)+(19-14)+(14-10)+(10-5)+(1-0)

=6+11+3+28+47+3+42+9+4+5+4+5+1

=168

We are interested in creating a grid of n boxes by n boxes. Each box in the grid is 5 x 5 pixels and the surrounding black border is 1 pixel thick. The second last row and the second last column of the boxes are of cyan color (RGB = [0, 255, 255]), rest all are white. Write a program which displays such a grid based on the number of boxes given by the user. Assume that the user will always input a value greater than 4.

Answers

Answer:

clc

clear

size = input('Enter the number of boxes in a row : ');

for i=1:size

for j=1:size

if i==size-1 || j==2

rectangle('Position',[i*size,j*size,size,size],'FaceColor',[0,1,1],'EdgeColor','black',...

'LineWidth',3)

else

rectangle('Position',[i*size,j*size,size,size],'FaceColor',[1 1 1],'EdgeColor','black',...

'LineWidth',3)

end

end

end

Explanation:

Three batch jobs, A through E, arrive at a computer center at almost the same time. They have estimated running times of 10, 6, 2, 4 and 8 minutes. Their priorities are 3, 5, 2, 1 and 4 respectively, with 5 being the highest priority.
(a) For each of the following scheduling algorithms, determine the mean turnaround time. Ignore any process switching overhead.
1. Round Robin
2. Priority scheduling
3. First come, First served (run in order 10, 6, 2, 4, 8)
4. Shortest job first
For (a), assume that the system is multiprogrammed, and that each job gets its fair share of the CPU. For (b) through (d) assume that only one job runs at a time, until it finishes. All jobs are completely CPU bound.

Answers

Answer:

1. The average turn around time is 21.2 minute using round robin scheduling algorithm with a quantum time of 1 minute.

2. The average turn around time is 20 minute using Priority scheduling algorithm.

3. The average turn around time is 19.2 minute using First Come First Serve scheduling algorithm.

4. The average turn around time is 14 minute using Shortest Job First scheduling algorithm.

Explanation:

Gantt chart was used to solve the scheduling problem.

Image showing the Gantt chart and working solution is attached.

Round Robin scheduling algorithm is a type of scheduling that uses a time slice for each process/job. Once the time slice is complete, the process leave to join the queue again if it has not finished execution.

Priority scheduling algorithm is a type of scheduling algorithm that allows a process/job to execute/complete based on the order of priority. In this case, the higher the number, the higher the priority. With 5 having the highest priority.

First Come First Serve scheduling algorithm is a type of scheduling algorithm that allows execution of a process/job based on first come first server i.e based on order of arrival time. In this case the order is ABCDE.

Shortest Job First scheduling algorithm is a type of scheduling algorithm that allocate the CPU to the process/job having the shortest completion time first. In this case, Job C has the shortest completion time.

JAVA
In this exercise, you are given a phrase that starts with ‘A’. If the word after ‘A’ begins with a vowel, add an ‘n’ after the ‘A’, otherwise, return the phrase as is.

Example:

grammer("A word") --> "A word"
grammer("A excellent word") --> "An excellent word"


public String grammar(String phrase)
{
}

Answers

Answer:

Answer is provided in the attached screenshot

Explanation:

The character in the 2nd position will be always be the one we need to check. We then check if that character is a vowel, and replace the string as required.

Final answer:

To modify a phrase that starts with 'A' followed by a word that starts with a vowel by adding an 'n', one must write a Java function that checks the following character and adjusts the string accordingly.

Explanation:

The student's question pertains to a programming exercise in Java where the user needs to modify a string based on whether the word following an 'A' begins with a vowel or not. To solve this, you would need to check the character after the 'A ' for a vowel. If it's a vowel, an 'n' should be added to form 'An'. The Java function would use conditionals to check this and then return the modified or original phrase accordingly.

Here is an example of how the grammar function can be implemented:

public String grammar(String phrase) {
   if(phrase.length() > 2 && phrase.substring(0, 2).equalsIgnoreCase("A ")) {
       char nextChar = phrase.charAt(2);
       if(nextChar == 'a' || nextChar == 'e' || nextChar == 'i' || nextChar == 'o' || nextChar == 'u') {
           return "An " + phrase.substring(2);
       }
   }
   return phrase;
}

Using a text editor, create a file that contains a list of at least 15 six-digit account numbers. Read in each account number and display whether it is valid. An account number is valid only if the last digit is equal to the remainder when the sum of the first five digits is divided by 10. For example, the number 223355 is valid because the sum of the first five digits is 15, the remainder when 15 is divided by 10 is 5, and the last digit is 5. Write only valid account numbers to an output file, each on its own line. Note that the contents of the file AcctNumsIn.txt will change when the test is run to test the program against different input. Grading Write your Java code in the area on the right. Use the Run button to compile and run the code. Clicking the Run Checks button will run pre-configured tests against your code to calculate a grade. Once you are happy with your results, click the Submit button to record your score. AcctNumsIn.txt ValidateCheckDigits.java

Answers

Answer:

See explaination

Explanation:

/File: ValidateCheckDigits.java

import java.io.BufferedWriter;

import java.io.File;

import java.io.FileWriter;

import java.io.IOException;

import java.util.Scanner;

public class ValidateCheckDigits {

public static void main(String[] args) {

String fileName = "numbers.txt"; //input file name

String validFileName = "valid_numbers.txt"; // file name of the output file

//Open the input file for reading and output file for writing

try(Scanner fileScanner = new Scanner( new File(fileName));

BufferedWriter fileWriter = new BufferedWriter( new FileWriter(validFileName))) {

//Until we have lines to be read in the input file

while(fileScanner.hasNextLine()) {

//Read each line

String line = fileScanner.nextLine().trim();

//calculate the sum of first 5 digits

int sum = 0;

for(int i = 0; i < 5; i++) {

sum += Integer.parseInt( line.charAt(i) + "");

}

//Get the last digit

int lastDigit = Integer.parseInt(line.charAt(5)+"");

//Check if the remainder of the sum when divided by 10 is equal to last digit

if(sum%10 == lastDigit) {

//write the number in each line

fileWriter.write(line);

fileWriter.newLine();

System.out.println("Writing valid number to file: " + line);

}

}

System.out.println("Verifying valid numbers completed.");

} catch(IOException ex ) {

System.err.println("Error: Unable to read or write to the file. Check if the input file exists in the same directory.");

}

}

}

Check attachment for output and screenshot

Final answer:

The process involves reading six-digit account numbers, summing the first five digits, and validating if the last digit matches the remainder of the sum modulo 10, outputting only the verified numbers to a file.

Explanation:

The goal is to validate six-digit account numbers to ensure their authenticity. The last digit of each account number must match the remainder when the sum of the first five digits is divided by 10. This concept utilizes simple mathematical operations like addition and modulo in conjunction with programming to accomplish the task of validation. Here's an outline of the procedure:

Read account numbers from a file.Add the first five digits of each number.Take the sum and perform a modulo operation by 10.Compare the result to the sixth digit of the account number.If they match, write the account number to an output file.

This process highlights the importance of validating data and using programming to automate otherwise time-consuming tasks.

1) The program reads an integer, that must be changed to read a floating point. 2) You will need to move that number into a floating point register and then that number must be copied into an integer register. 3) You will need to extract the exponent from the integer register and stored in another register. 4) You will need to insert the Implied b

Answers

Answer:

1. Get the number

2. Declare a variable to store the sum and set it to 0

3. Repeat the next two steps till the number is not 0

4. Get the rightmost digit of the number with help of remainder ‘%’ operator by dividing it with 10 and add it to sum.

5. Divide the number by 10 with help of ‘/’ operator

6. Print or return the sum

# include<iostream>

using namespace std;

/* Function to get sum of digits */

class gfg

{

   public:

   int getSum(float n)

   {

   float sum = 0 ;

   while (n != 0)

   {

    sum = sum + n % 10;

    n = n/10;

   }

return sum;

}

};

//driver code

int main()

{

gfg g;

float n = 687;  

cout<< g.getSum(n);

return 0;

}

Explanation:

2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oct, and hex formats. 3. Write the binary representation of number 64.48 in IEEE 754 standard in double precision. Express the result in binary, oct, and hex formats. 4. Register f3 contains the 32-bit number 10101010 11100000 00000000 00000000. What is the corresponding signed decimal number

Answers

Answer:

-1.75

Explanation:

kindly refer to attachment for a detailed step by step solution to the problem.

Privacy laws in other countries are an important concern when performing cloud forensics and investigations. You've been assigned a case involving PII data stored on a cloud in Australia. Before you start any data acquisition from this cloud, you need to research what you can access under Australian law. For this project, look for information on Australia's Privacy Principles (APP), particularly Chapter 8: APP 8 – Cross-border disclosure of personal information. Write a 2 to 3 page paper (not including title and reference pages) using APA format summarizing disclosure requirements for getting consent from data owners, and any exceptions allowed by this law. Writing Requirements

Answers

Answer:

See the explanation for the answer.

Explanation:

Australian regulations makes extremely difficult for the enterprises to move organizations sensitive data to the cloud which is storing outside the Australian network. These are all managed by the Office of Australian Information Commissioner(OAIC) which provides oversight on the data privacy regulations designed to govern the dissemination of the sensitive information.

One rule they applied under this is The Australian National Privacy Act 1988 which tells how the organizations collect, use, secure, store the information. The National Privacy Principles in the Act tells how organizations should use the people's personal information. The NPP has a rule that An organization must take the responsibility to hold the information without misuse or modified by unauthorized access. They require enterprises to put security service level agreements with the cloud service providers that define audit rights, data location, access rights when there is cross border disclosure of information.

In later time they introduced a new principle called The Privacy Amendment Act 2012. This principle gives set of new rules along with the changes in the many rules in the previous act and also this is having a set of new principles those are called Australian Privacy Principles (APP).

In this there is principle for cross border disclosure of personal information which is APP8. This rule regulates the disclosure or transfer of personal information by an agency or company to a different location outside the country.

Before disclosure the information outside they have to take responsible steps that the company outside the Australia must not breach the APP 's.

Consider a Web form that a student would use to input student information and rèsumè information into a career services application at your university. Sketch out how this form would look and identify the fields that the form would include. What types of validity checks would you use to make sure that the correct information is entered into the system?

Answers

Answer:

valid check: Completeness check, Format check, Range check, Consistency check

Explanation:

Form validations required are:

Completeness check:-all fields are filled accordingly

Format check:-Each field entered data is correct format or not

Range check:-Range of data min or max

Consistency check:-Entering consistent data

Database check

Fields are:

Text Boxes,Drop down list box,radio button,check box,button,slider(if you want to rate or show interest of a subject),combo box(group together radio buttons/check boxes/sliders).

See attachment please for the sketch

Other Questions
In January Rita was beginning to perform poorly at work; she was neglecting her appearance, becoming withdrawn, and exhibiting odd behaviors. In June, Rita showed the full-blown symptoms of schizophrenia. Her behavior in January can be considered part of which phase of the disorder? As you apply to college, when should you apply for financial aid?A. After you know you have been accepted by a school.B. Before you actually apply to the school. It shows real interest.C.After you enroll and start your classes.D. When you apply to the college. charlie can make 125 pizzas in 5 hours. how many pizzas can he make in one hour? What was the name for the informal speeches that President Roosevelt did on the radio to communicate with the American peoplebefore and during World War II?radio talkcode talkersfireside chatscampfire talks Cierto o falso?Car, -gar, and -zar verbs are only irregular in the t form.TrueFalse The Taft-Hartley Act of 1947 __________________ .established the National Labor Relations Boardoutlawed certain strike tacticsoutlawed yellow dog contractsguaranteed the right of free speech in union meetings Joni wants to know how much a pedicure cost back in 1954, when her grandmother was her age. The Consumer Price Index (CPI) in 1954 was 26.7 and is 245.9 this year. A pedicure costs $ 45 today. Round your answer to the nearest penny. how did the colonists feel about the American Revolution while it was going on? Who wanted to keep the Jewish refugees out of the USA A researcher teaches rats to recognize a specific object that by giving them their favorite treat when they touched the object. To measure their ability to recognize the specific object a week later, she records the number of times the rat touches the specific object compared to a different object. It was hypothesized that the rats would touch the specific object more than the different object to demonstrate what they learned about the specific object. If the researcher tested this hypothesis at a .05 level of significance and computes a test statistic of t = 2.842 in a sample of 28 rats, what is the degree of freedom for the test? pls help! will give brainlist!why did the buffalo begin to disappear from the Great Plaines in the 1870s? Which of the given statements are true about Point B?A) D B) A and B C) A and C D) B and D . Your 14-year old nephew just walked in the door from school and told you that he is not going to go back to school. You ask why and he tells you that everyone will laughed at him because he dropped his tray full of food as he sat down during lunch. Although you tried to help, he was inconsolable. Why What is the area of the triangle? Read this excerpt from The People Could Ely,When everythin seemed to be ready and everybody had gathered around and quieted down, Mas Tom brought John out,blindfolded, and had him stand thereWhich word best describes the setting in this sceneCloudtensecalmchaotic Read and analyze Drama:Question 2In stage directions, which of the following refers to dialogue spokenby a character that is not meant to be heard by the other characterson stage? Determine which of the following statements must be true. PLEASE HELP !! Walt and Hank collect quarters from different states. Walt collected q quarters. Hank collected four fewer quarters than Walt. The combined dollar value of their coins was $17.50. The following equation represents the situation.0.25q + 0.25(q - 4) = 17.50How many quarters does Walt have? A. 33 quarters B. 35 quarters C. 37 quarters D. 43 quarters Students and teachers at universities held, to explain why they opposed the war, while many protesters focused on what they thought was an unfair. Most of the soldiers were, youth Please help! I will mark you as brainliest!