Write the prototype for a function named showValues. It should accept an array of integers and an integer for the array size as arguments. The function should not return a value.

Answers

Answer 1

Answer:

void showValues(int [maximum volume],int);

Answer 2

Answer:

void showValues(int * array, int array_size){

int i;

for(i = 0; i < array_size; i++){

printf("%d\n", array[i]);

}

}

Explanation:

I am going to write the prototype of a function as a c code.

array is the array as an argument, and array_size is the argument for the size of the array.

void showValues(int * array, int array_size){

int i;

for(i = 0; i < array_size; i++){

printf("%d\n", array[i]);

}

}


Related Questions

Write a short note on Façadepattern.

Answers

is a software design pattern commonly used with object-oriented programming. The name is by analogy to an architectural facade. A facade is an object that provides a simplified interface to a larger body of code, such as a class library. I looked it up hope it helps

In Java a final class must be sub-classed before it.
?? True

?? False

Answers

Answer: False

Explanation: In java, whenever a final class is declared it cannot be extended further and also it is not possible for a declared class to be overridden in the sub class. A class can be declared final by using the final keyword. Final class cannot be extended but they can be used to extend the other classes.Therefore the final class cannot be sub classed before it in java.

What is computer virus?

Answers

It is a (software) program that is installed on a computer without the user's knowledge for the purpose of making harmful changes. A computer virus attaches itself to another program (the execution of the host program triggers the action of the virus). And most of them perform actions that are malicious in nature, such as destroying data. A computer virus operates in two ways: As soon as it lands on a new computer, begins to replicate or it plays dead until the trigger kick starts the malicious code. The term 'computer virus' was formally defined by Fred Cohen in 1983.

Answer:

A computer virus is a virus attached onto your computer, and it gives you bugs and can often delete your important files.

Describe a method for protecting users against URL obfuscation Attacks

Answers

Answer:

Anti-Phising softwares in stand alone systems connected to  a centralized database.

Explanation:

In order to protect oneself from URL obfuscation attacks one should install anti-phising software in their systems which is a software to warn users when exposed to obfuscation attacks. These software when connected contains a centralized database maintained which warns users when they try to access an effected URL. So upon clicking such URL the users are warned in their screen and thus provided with an option to return to their previous page.

Anti-phising software come handy in preventing such attacks while accessing certain URLs in their mails also.

You want a class to have access to members ofanother class in the same package. Which is themost restrictive access that accomplishes thisobjective?
? public

? private

? protected

? transient

? default access

Answers

Answer:

default access

Explanation:

Classes, methods, variables(identifiers*) declared without any access modifier are considered as default and these can be accesed in others clases of same  package.

Identifiers are the name of classes, methods, variables, arrays, enums, etc.

Convert the following binary numbers to decimal:

10010101
01110110
00110011
11100010
10000001

Answers

Answer:

Hi!

10010101 = 149;

01110110 = 118;

00110011 = 51;

11100010 = 226;

10000001 = 129;

Explanation:

To convert binary numbers you can use this formula:

[tex]N = bit_{1} * 2^{0} + bit_{2} * 2^{1} + bit_{3} * 2^{2} + bit_{4} * 2^{3} + ... + bit_n 2^{n-1}[/tex], where position of the bit₀ is the rightmost digit of the number.

Results, using the formula:

10010101 = 1*2⁰+1*2²+1*2⁴+1*2⁷ = 1 + 4 + 16 + 128 = 149.

01110110 = 1*2¹+1*2²+1*2⁴+1*2⁵+1*2⁶  = 118;

00110011 = 1*2⁰+1*2¹+1*2⁴+1*2⁵ = 51;

11100010 = 1*2¹+1*2⁵+1*2⁶+1*2⁷ = 226;

10000001 = 1*2⁰+1*2⁷ = 129;

Note: All bits in 0 multiplied by any number are 0.

Final answer:

To convert binary numbers to decimal, use the place value system. Multiply each digit by 2 raised to the power of its position and add up the results.

Explanation:

To convert binary numbers to decimal, we use the place value system. Each digit in the binary number represents a power of 2. We start from the rightmost digit and multiply it by 2 raised to the power of its position. Then, we add up all the results to get the decimal equivalent.

For example, for the binary number 10010101:

The rightmost digit is 1, so we multiply it by 2 raised to the power of 0, which is 1.The next digit is 0, so we multiply it by 2 raised to the power of 1, which is 2.We continue this process for all the digits and add up the results: 1 + 0 + 0 + 16 + 4 + 0 + 1 = 22.

So, the decimal equivalent of 10010101 is 22. Following the same steps, you can convert the other binary numbers to decimal.

The process known as AAA (or “triple A”) security involves three components. _____________ means ensuring that an authenticated user is allowed to perform the requested action.

Answers

Answer:

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

The process known as AAA (or “triple A”) security involves three components. Authorization means ensuring that an authenticated user is allowed to perform the requested action.

What is access control?

By validating various login credentials, such as passwords and usernames PINs, biometric scans, and tokens, access control identifies users. A type of credential known as an authentication factor is one that is used to verify, often in conjunction with other factors.

Multifactor Authentication is a technique that needs multiple authentication methods to validate a user's identity is another feature found in many access control systems. The three AAA are authentication, authorization, and accounting.

Therefore, authorization refers to confirming that a user who has been authenticated is permitted to carry out the specified action.

To learn more about authentication, refer to the below link:

https://brainly.com/question/13553677

#SPJ2

Building a linked list forward places the new item to be added at the beginning of the linked list.

True

False

Answers

Answer:

False

Explanation:

When a new item is added to a linked list it gets added to the rear end of the list.

For example if my list is as follows:

A->B->C

Now I want to add D, it will get added as follows:

A->B->C->D

Similarly if I add E, the updated list will become:

A->B->C->D->E

True / False
. Fixed-length instruction architectures do not use memory as efficiently as variable-length architectures.

Answers

Answer:

TRUE. Variable length instruction architectures are better at memory efficiency than fixed length architectures.

Explanation:

Variable length instruction architectures use memory efficiently than fixed length architectures. Fixed length instructions are used in RISC (Reduced Instruction Set Computers) , where as CISC (Complex Instruction Set Computers ) have instructions of variable length. In fixed instruction length architectures if the instruction has shorter length than that of fixed length it requires padding to increase the instruction length to fixed length. This is wastage of memory.

Suppose you create a new PricedApt class that is derived from the RentalApt class (so it's derived from a derived class). It adds one new double attribute, price, which tells what the monthly rental for the apartment is. Here is a constructor call for the class: PricedApt p = new PricedApt("jill", 900, true, "jack", 1050.00); The class is missing its constructor. In the box provided below, write the constructor in its entirety. public class PricedApt extends RentalApt { private double price;

Answers

// here i am writing C++ code

public class PricedApt extends RentalApt {

private double price;

RentalApt(firstname,price,b,lastname): PricedApt(firstname,b,lastname){

// As there is only one member in this class this means that every argument //coming to it is supposed to be passed to the parent class constructor.

// in c++ : operator is used to call the super class constructor

this.price = price;

}

}

Data mining is becoming increasingly common in both theprivate and public sectors. Discuss

What do you understand by DATA MINING?
Study and discuss where and how DM can beused?

Answers

Answer:

Data Mining is the process of getting important data from the given set of large amount of data based on some attributes and dimensions

Explanation:

Data Mining can be used in all kind of organizations to take some important decisions based on historical data

You use the ____ data type to hold any single character.

a.
single

b.
char

c.
float

d.
byte

Answers

b. char. Char is short for character.

If there is no inheritance in Java then this environment may be__________but not ____________.
object oriented, object based
component based , object based
object based ,component based
object based , object oriented

Answers

Answer:

The answer is object based,component based.

Explanation:

If there is no inheritance in Java then the environment may be object based but not component based.

Component based is an approach in programming in which we divide a problem into different parts called components each of having a specific role in the program.

The difference between component based and object based is re-usability and scale. Component based means to emphasize on responsibilities which are mostly independent and may not share or may share common objects with other components.Object based means to emphasize on the integration of objects, where objects are reused over an entire software.That is why the environment may be object based but not component based.

Write a program that stores the value 16 in the variable length and the value 18 in the variable width. Have your program calculate the value assigned to the variable perimeter using the formula perimeter = 2 * length + 2 * width. Have your program print the value stored in perimeter.

Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

  int length = 16;

   int width = 18;

   int perimeter = (2*length) + (2 * width);

   cout<<"The perimeter is: "<<perimeter<<endl;

}

Explanation:

First include the library iostream in the c++ program for input/output.

then, create the main function and define the variable with given values in the length and width.

After that calculate the perimeter by using the formula.

perimeter = 2*length + 2*width

and finally display the output  on the screen by using the cout instruction.

A function that is called or summoned into action by its reference in another function is a ____.
A) function prototype
B) called function
C) calling function
D) function declarator

Answers

Answer:

Answer is B. Called function

Explanation:

The function which is called is the called function.

In which function we call it, that's calling function.

Decision-making undercertainty is always easy to solve.
True
False

Answers

Answer:

False

Explanation:

Decision making is a complex subjective process which involves analyzing multiple inputs, current state and identifying the most relevant actions to achieve a set of desired objectives.

The process is complicated by factors such as:

- inadequacy or incorrectness of inputs

- unawareness of the current state

- lack of expertise of the decision maker

- multiplicity of potential actions which lead to desired outcomes

- fuzzy end objectives

If the data needs to be processed in a First In First Out (FIFO) manner, we typically use a(n) ____.

A.
stack

B.
queue

C.
map

Answers

Answer:

B. queue

Explanation:

If the data needs to be processed in a First In First Out (FIFO) manner, we typically use a queue.

Write the half function. A function call and the functionprototype
are provided.

void half(float *pv);

float value=5.0;

printf("Value before half: %4.1f\n",value); // Prints 5.0

half(&value);

printf("Value after half: %4.1f\n",value); // Prints 2.5

Answers

Answer:

C code for half()

#include<stdio.h>

void half(float *pv);

int main()

{

float value=5.0;  //value is initialized  

printf ("Value before half: %4.1f\n", value); // Prints 5.0

half(&value);  // the function call takes the address of the variable.

printf("Value after half: %4.1f\n", value); // Prints 2.5

}

void half(float *pv) //In function definition pointer pv will hold the address of variable passed.

{

*pv=*pv/2;  //pointer value is accessed through * operator.

}

This method is called call-by-reference method. Here when we call a function, we pass the address of the variable instead of passing the value of the variable. The address of “value” is passed from the “half” function within main(), then in called “half” function we store the address in float pointer ‘pv.’ Now inside the half(),  we can manipulate the value pointed by pointer ‘pv’. That will reflect in the main(). Inside half() we write *pv=*pv/2, which means the value of variable pointed by ‘pv’ will be the half of its value, so after returning from half function value of variable “value” inside main will be 2.5.

Output:

Output is given as image.

Describe business benefits of using wireless electricity?

Answers

Answer:

To put it simply, the main benefit for a business to use wireless electricity is money.

Explanation:

Assuming that the company in question can solve specific hurdles such as Microwave Interference and Implementation costs. Then they would save a huge amount of money in the mid to long term since wireless electricity needs very little landscape and does not need cables and transmitting towers as opposed to traditional electrical systems.

Hope you have found this explanation helpful and If you have any more questions please feel free to ask them here at Brainly, We are always here to help.

Wireless electricity offers businesses enhanced reliability, reduced transmission losses, and operational flexibility. Smart Grid principles further improve efficiency and optimize energy usage. These benefits lead to greater cost savings and improved service reliability.

Wireless electricity offers several significant advantages for businesses:

Enhanced Reliability: Generating electricity at the point of use enhances the reliability of the electricity supply, ensuring that critical circuits remain powered during grid outages.Reduced Transmission Losses: By avoiding the need to convey electricity from central power generators to urban loads, businesses can eliminate energy losses typically around 7% due to transmission inefficiencies.Operational Flexibility: Wireless operations enable services and applications that are simply impossible or impractical with wired systems, especially for long-range communications and distributed electricity production.

Implementation and Efficiency

Future electrical transmission and distribution systems will become more efficient with the implementation of "Smart Grid" principles. These grids use smart meters and time-of-use pricing to optimize energy consumption during non-peak times, such as using electricity at night for heating water or charging electric vehicles, which can help level load and reduce peak demand.Moreover, transmitting electricity at high voltage and low current over long distances with wireless technology minimizes energy losses due to resistance heating, known as Joule heating, thus making the entire process more energy-efficient.

Consumer Advantages

Changes in equipment and usage patterns at the consumer end to allow for increased efficiencies, improved reliability, and lower energy costs are expected to benefit businesses greatly. For instance, ice-making air conditioning systems that operate during non-peak hours can provide cooling during peak demand hours, contributing to overall efficiency and cost savings.

A ____ resembles a circle of computers that communicate with each other.
Answer
hierarchical network
star network
bus network
ring network

Answers

Answer:

ring network

Explanation:

In a ring network, the nodes are arranged in a circular pattern where each node is connected to two adjacent nodes. In this topology, any node can communicate with any other node via the intermediaries.

In comparison,

- in a star network every communication needs to pass through a central hub node

- in a bus, each node is connected to a shared linear communication bus.

- in a hierarchical network nodes are organized along a tree structure layout.

How is the bootstrap program started?

Answers

Answer:

Bootstrapping :- It refers when a process does not require any input from outside to start.

Bootstrap program:- It is the first code that is executed when the computer system is started.

Bootstrap program is a part of ROM and it is non-volatile memory. Then the  operating system is loaded in the RAM by bootstrap program after the start of the computer system. Then the operating system starts the device drivers.

A bootstrap program is the first code that is executed when the computer system is started. ... The operating system is loaded into the RAM by the bootstrap program after the start of the computer system. Then the operating system starts the device drivers.

What are the differences between responsibility,accountability and liability?

Answers

Answer: Responsibility is the process when one has an authority over another, accountability means to be answerable to the action of the concerned and liability means to be legally responsible for the concerned.

Explanation:

A person who is responsible must be accountable and vice versa. In liability the person responsible must be governed by some documents for legal bindings to be help responsible for someones else action.

You are to create a program using Python that asks the user for a nonnegative number, then computes the mean and variance using the above given online update formulas which should be displayed on the console screen. The program should end when a user enters a negative number.

Answers

Answer:

# In the new version of python is available the functions mean() an variance()

# In the module of statistics

i = 0 #Var to input the elements

l = [] #Var to store the elements on a list

while(i>0):

    print("In put a positive number to add in the list or negative to exit ")

    i = input()

    l.append(i)

    print("The mean of the all elements is: " + mean(l) )

    print("The variance of the all elements is: " + variance(i) )

Explanation:

At present, you can use in the news python's verison e.g. (python 3.7) the statistics module and use functions like mean(), variance(), stdev() and many others.

In the first step you create two variables, i to recieve the inputs of a loop and l to store all the elements recieved in the i variable. after that you pass as an argument the list that you stored before and get the mean() and variance() of the all elements in the list.

I hope it's help you.

a network on the internet has a subnet mask of 255.255.240.0.what is the maximum number of hosts it can handle?

Answers

Answer:

4094 hosts

Explanation:

In a network,

     Number of hosts is (2^host no -2)

We have subtracted 2 because out of these hosts two are used in broadcasting and other purposes.  

Host number is equal to the 0's in the Subnet mask

                    255.255.240.0

convert this into binary number i.e

   11111111.11111111.11110000.00000000

So,12 0's are there

           Number of valid hosts= 2^12 -2

                                                = 4096-2

                                                =  4094

.When a design begins with a consideration of what the systemmust accomplish, it is called:
A.user-centered design B.data-driven design C.event-driven design D.task-centered design

Answers

Answer: D) Task-centered design

Explanation: Task centered design is the technique for a design to made in such a way that it can have the desired or expected result . The goals are set in it and the task is decided in a particular structure. Thus a design having any such system , it is known as task centered design. It is mainly focused on the user and the way this design can be used by them.

Given a one dimensional array arr, what is the correct way ofgetting the number of elements in arr

?? arr.length

?? arr.length – 1

?? arr.size – 1

?? arr.length()

Answers

Answer:

The answer is option 1 arr.length.

Explanation:

In java arr.length gives the correct number of elements in the array.The length is function is only applicable for arrays.

The length() method is applicable for strings.

arr.length-1 will give 1 element less.

There is no .size for arrays in java.

So we conclude that arr.length is correct way of getting the number of elements in one dimensional array arr.

Answer:

The answer is arr.length.

Explanation:

In java arr. length gives the correct number of elements in the array. The length() method is applicable for strings. arr. length-1 will give 1 element less. There is no . size for arrays in java. So we conclude that arr.

Learn more about the array, refer:

https://brainly.com/question/13971324.

function getLongestString(strings) { } /* Do not modify code below this line */ const strings = ['long', 'longer', 'longest']; console.log(getLongestString(strings), '<-- should be "longest"');

Answers

Answer:

function getLongestString(strings) {  

return strings.reduce( (acc, cur) => acc.length > cur.length ? acc : cur);

}

Explanation:

A reducer applies the same operation to each array element. In this case, the longest string is stored in the accumulator (acc), and is replaced only by the current element (cur) if the current element is longer than the accumulator.

______ organizations have physical and online dimensions

A. clicks and mortar

B. pure-play

C. virtual

D. brick and mortar

Answers

Answer:

Click and Mortar

Explanation:

In the e-commerce world, a click and mortar organization is a type of business model that includes both its operations in the online and offline domains. Clients are able to shop online and at the same time visit the retailer’s store. It is able to offer its clients fast online transactions and face-to-face service.

Further explanation

Electronic Commerce Describes the process of buying, selling, sending, or exchanging products, services, and / or information through computer networks, including the Internet.

Electronic Business refers to a broader definition of the EC, not only buying and selling goods and services, but also serving consumers, collaborating with business partners, conducting e-learning, and conducting electronic transactions in organizations.

3 forms of EC organization:

• Brick-and-Mortar:

Is an organization that does business offline, sells physical products, and also physical agents.

• Virtual (Pure Play):

Is an organization that conducts business activities only online.

• Click-and-Mortar:

Clicks and mortar refers to the use of electronic sales (CLICK) by combining traditional methods of operation (brick and mortar). Cliks and mortar also refers to the development of electronic commerce that is side by side with conventional business operations by utilizing the strengths in each of the complementary and synergistic channels.

Clicks and mortar, companies can successfully develop parallel electronic trade in parallel with brick and mortar. The level of integration between the two channels is manifested in several dimensions: the actual business processes used for company transactions, the company's brand identity, ownership and management in each channel.

Is an organization that carries out several EC activities, but does major business in the physical world.

E-Marketplace is an online marketplace where buyers and sellers meet to exchange goods, services, money, or information.

Learn  More

clicks and mortar : https://brainly.com/question/12914277

Details

Class: college

Subject: computers and technology

Keywords : clicks and mortar, Electronic Commerce, Electronic Business, E-Marketplace

Write a program that asks the user to enter a number within the range of 1 through 10. Use a switch statement to display the Roman numeral version of that number. Input Validation: Do not accept a number less than 1 or greater than 10. Prompts And Output Labels. Use the following prompt for input: "Enter a number in the range of 1 - 10: ". The output of the program should be just a Roman numeral, such as VII.

Answers

cout<<"Enter a number in the range of 1 - 10 ";

cin>>num;

// check if the input is valid

if(num<0 || num > 10)

cout<<"Invalid Number"

// checking for appropriate output

switch(num){

case 1:

cout<< "|";

case 2:

cout<< "||";

case 3:

cout<< "|||";

case 4:

cout<< "|V";

case 5:

cout<< "V";

case 6:

cout<< "V|";

case 7:

cout<< "V||";

case 8:

cout<< "V|||";

case 9:

cout<< "|X";

case 10:

cout<< "X";

default :

cout<<" Nothing found";

}

Final answer:

The program asks the user to enter a number between 1 and 10 and uses a switch statement to convert it to a Roman numeral, with input validation to ensure the number is within the specified range.

Explanation:

Converting Numbers to Roman Numerals Using a Switch Statement

To write a program that asks for a number in the range of 1 through 10 and converts it to a Roman numeral, we can utilize a switch statement. Here is an example code in a programming language like C++ or Java:

#include <iostream>
using namespace std;
main() {
 int number;
 cout << "Enter a number in the range of 1 - 10: ";
 cin >> number;
 switch(number) {
   case 1: cout << 'I'; break;
   case 2: cout << 'II'; break;
   case 3: cout << 'III'; break;
   case 4: cout << 'IV'; break;
   case 5: cout << 'V'; break;
   case 6: cout << 'VI'; break;
   case 7: cout << 'VII'; break;
   case 8: cout << 'VIII'; break;
   case 9: cout << 'IX'; break;
   case 10: cout << 'X'; break;
   default: cout << "Error: invalid input.";
 }

 return 0;
}
This program will display a Roman numeral corresponding to the number entered by the user, ensuring that input validation is performed and only numbers between 1 and 10 are accepted.

TRUE/FALSE

The Interrupt Flag (IF) controls the way the CPU responds to all interrupts.

Answers

Answer: True.

Explanation:

The value of the IF is very important to respond to the interrupts in the OS. It is a system flag bit. All the hardware interrupts will be handled if the flag value is set to 1 else all interrupts will be ignored. It takes two values either 1 or 0.

Other Questions
The equation below specifies a function. Determine whether the function is linear, constant, or neither.3x + 4y = 1Choose the correct answer below.A constant function is specified by the equation.B. linear function is specified by the equation.C. Neither a constant function nor a linear function is specified by the equation. Use row reduction to solve the system of equations. x-2y+z=4, 3x-5y-17z=3, 2x-6y+43z=-5 Question 1 In order to ensure that they are not missing some of the healthiest food choices in a grocery store, a customer can looka to the lowest shelvesb to the eye-level shelvesc up to the highest shelvesd in the frozen-food sectionQuestion 2 What percentage of grocery store purchases are not planned purchases?a 60%b 20%c 40%d 10%Question 3 The "bull's eye" zone for shelved items in most grocery stores is at ________, even if these items are not the healthiest choices for you.a lower levelb upper levelc bottom leveld eye levelQuestion 4in order to increase customer purchases, grocery stores havea increased the size of the cartsb moved healthy food options to eye levelc decreased the width of the aislesd moved pre-packaged goods to the upper levelQuestion 5 Dominique needs to purchase some carrots for a dish she is making tonight. There are no fresh carrots available in produce, so she will buy either frozen or canned. Which is a better choice?a Frozen, because the freezing process retains their healthy sugars and starchesb Frozen, because they are picked and then frozen, preventing their sugars from turning into starchc Canned, because the canning process retains their healthy sugars and starchesd Canned, because they are picked and then canned, preventing their sugars from turning into starchQuestion 6 Most grocery stores place the ________ along the perimeter of the store.a most expensive foodsb unhealthiest foodsc freshest, healthiest foodsd pre-packaged and canned foodsQuestion 7 Dry, packaged goods are usually founda along the perimeter of the storeb along the inner aisles of the storec in the front of the stored at the checkout point of the store The distance from the earth to the sun is known as:A. a light yearB. an astronomical unitC. one million miles Yo ______________ del novio de mi hermanal si lo conociera ms. Find the greatest common factor of 4c and 18c A human service worker who appears on a TV show to encourage people to apply to become foster parents for runaway teens is using the following intervention:a.group facilitatingb.case managingc.researchingd.outreachinge.collecting and managing data Which of these is a risk of speeding?A. Longer braking distanceB. Mechanical failureC. Tire damageD. Greater likelihood of being distracted Apply the distributive property to create an equivalent expression.\dfrac12(10x + 20y +10z) = 21 (10x+20y+10z Find each of the following for f(x) = 8x + 3. (a) f (x + h) (b) f (x + h - f (x) (c) (f (x+h - f(x))/h Examine the words listed below.graphicautographphotographytelegraphphonographWhat root word do all of these words share?DONEIntro The role of social media in arbia All of the following are true with regards to activity-based costing for service businesses except a. the multiple department factory overhead rate method may lead to distortions of costs. b. activity-based costing is not applicable to service businesses. c. the single plantwide factory overhead rate method may lead to distortions of costs. d. All of these choices are true. If f(a) =11, then use the table above to find f(a-2) I need some help on this question Suppose John Q. Worker is currently unemployed. Each day, John Q. Worker spends the entire day searching available job openings for an appropriate position given his set of skills, abilities, and interests. If someone asks John Q. what he does for work, he tells them that he is currently "in-between jobs." Which of the following best classifies John Q.'s unemployment status?Seasonally unemployedFrictionally unemployedStructurally unemployedCyclically unemployed an irregular object with a mass of 1220g displaces 200 cubic cm of water when placed in a large overflow container. calculate the density of the object. what is the density in g/cm cubic I need help to solve this problem Simplify (6^7)^3 Suppose Ruston Company has the following results related to cash flows for 2018: Increase in Debt of $700,000 Dividends Paid of $500,000 Purchases of Property, Plant, & Equipment of $8,300,000 Other Adjustments from Financing Activities of $200,000 Other Adjustments from Investing Activities of $500,000 Assuming no other cash flow adjustments than those listed above, create a statement of cash flows for investing and financing activities with amounts in thousands. What is the Net Cash Flow from Investing and Financing Activities? Find a linear equation satisfying the conditions: x-intercept at (-2,0) and y-intercept at (0, -3).