A web _____________ is software that finds websites, webpages, images, videos, news, maps and other information related to a specific topic.

Answers

Answer 1

Answer:

a web browser

Explanation:

it is like safari chrome or edge

Answer 2

A web browser  is software that finds websites, webpages, images, videos, news, maps and other information related to a specific topic.

What is software?

Software is a set of instructions, information, or computer programs that are used to operate equipment and perform certain tasks. Hardware, which is a term for a computer's external components, is the opposite of it. In this usage, "software" refers to the running scripts, programs, and apps on a device.

Software refers to the processes and programs that enable a computer or other electrical device to function. Software like Excel, Windows, or iTunes are examples. Computers are managed by software. Software can be divided into three categories: system software, utility software, and application software.

Thus, it is a web browser

For more details about software, click here:

https://brainly.com/question/985406

#SPJ2


Related Questions

You are an ISP. For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addresses to satisfy them? and explain why? b. Say the first block of 64 customers want 128 addresses/customer - what would the address space look like?

Answers

Answer:

a. The network will not satisfy the customers because the required addresses is 128 but what can be offered is 126.

b. 195.200.0.0/22

Explanation:

195.200.0.0/16

The number of bits to give 512 is 9

2^9=512

2^8=256 which is not up to our expected 320 customers that requires a network ip

Note we have to use a bit number that is equal or higher than our required number of networks.

The number of host per each subnet of the network (195.200.0.0/25) is (2^7)-2= 128-2=126

The network will not satisfy the customers because the required addresses is 128 but what can be offered is 126.

b. 64 customers requires  6 bits to be taken from the host bit to the network bit

i.e 2^6 = 64

195.200.0.0/22

The number of host per each subnet of the network (195.200.0.0/22) is (2^10)-2=1024 - 2 = 1022 hosts per subnet

This network meet the requirement " 64 customers want 128 addresses/customer "

In a deployment with multiple indexes, what will happen when a search is run and an index is not specified in the search string?

Answers

Answer:

no events will be returned

Explanation:

Write a statement that uses the decrement operator, in prefix mode, to decrease the value of the variable time.

Answers

Answer:

public class Main

{

public static void main(String[] args) {

    int time = 60;

    --time;

    System.out.println(time);

}

}

Explanation:

*The code is in Java.

Initialize an integer called time and set it to some value, in this case 60

To use the decrement operator in prefix mode, you need to write the decrement operator, --, before the variable time. The decrement operator decreases the variable value by one first and then gives back the new value. In our example the output will be 59.

When you program in a language that uses GUI components, you need to create them from scratch.

a. True
b. False

Answers

Answer:

B. False

Explanation:

You do NOT need to start from scratch when you program in a language that uses GUI components. You can think of it like the components are add-ons to your programming language.

Answer:

The correct answer is b. False

Explanation:

You don't need to create them from scratch.

Hope this helps!

In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers.

Answers

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

Which of the following could an attacker use to overwrite instruction pointers in order to execute malicious code?
a) Memory leak
b) SQL injection
c) Resource exhaustion
d) Buffer overflow

Answers

Answer:

d) buffer overflow

Explanation:

When buffer overflow happens, data gets overwritten by caller data that is not supposed to be overwritten.

If the caller data is carefully crafter instruction code, this would be a way to execute malicious code.

Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method

Answers

Answer:

hello your question is incomplete attached is the complete question and solution

answer : The solution is attached below

Explanation:

Below is a program named Derivations.java that creates an array with the deviations from average of another array.

The Employee class will contain a String attribute for an employee’s name and a double attribute for the employee’s salary. Which of the following is the most appropriate implementation of the class?

a. public class Employee

{
public String name;
private double salary;
// constructor and methods not shown
}

b. public class Employee
{
private String name;
private double salary;
// constructor and methods not shown
}

c. private class Employee
{
public String name;
public double salary;
// constructor and methods not shown
}

d. private class Employee
{
private String name;
private double salary;
// constructor and methods not shown
}

Answers

Answer:

The answer is "Option b".

Explanation:

In the choice b, a public class "Employee" is declared, in which two private variables "name and salary" is declared whose data type is a string and double. At this, the class is accessible outside the scope but it variable accessible in the class only and the wrong choice can be defined as follows:

In choice a, datatypes access modifiers were different that's why it is wrong.In choice c and d both classes use a priavte access modifier, which means it can't accessible outside that's why it is wrong.

The ethical framework that assumes that people are deeply connected to one another in webs of relationships, and that ethical decisions cannot be made outside the context of those relationships is known as

Answers

Answer:

Ethics of Care

Explanation:

Ethics of care is a feminist philosophical idea that promotes the idea that the interpersonal relationship between individuals should be a determinant of their moral response to different situations. The theory was developed by Carol Gilligan. The emphasis of this theory is on how to respond to situations, taking into context, a person's relationship with others.

According to a philosopher named Tronto, for people to be effective at displaying care, they would need to;

1. be attentive to the needs of others

2. be responsible for their situations

3. be adequately qualified to render such help, and

4 be responsive enough to the needs of others.

Select the correct answer.

Maggie is preparing a business report. Which type of keys will she use to type in letters, numbers, symbols, and punctuations?

A typing keys

B. navigation keys

C.

function keys

OD

control keys

Answers

Answer:

Explanation:

On a windows operating system or any computer based application there are only three types of keys, these are alphanumeric keys, punctuation keys and special keys.  Therefore the answers provided are not accurate. Each of these types of keys serves different purposes as follows.

Letters – use alphanumeric keys Numbers – use alphanumeric keys Symbols – use punctuation keys Punctuations – use punctuation keys

If you must use the answers choices provided we can say the following

Letters – use alphanumeric keys  - typing keysNumbers – use alphanumeric keys  - typing keysSymbols – use punctuation keys  - function keysPunctuations – use punctuation keys  - typing keys

The type of keys Maggi will use to type in letters, numbers, symbols, and punctuations are: A. typing keys.

An input device can be defined as an electronic device that is typically designed and used for sending data to a computer system. Thus, these devices are used for entering data (information) into a computer system.

In Computer technology, some examples of input devices include the following:

MouseScannerMicrophoneKeyboard

A keyboard refers to a an electronic device that is typically designed to allow end users type textual information such as letters, numbers, symbols, and punctuations.

In this scenario, the type of keys Maggi will use to type in letters, numbers, symbols, and punctuations are typing keys because it comprises the 26 alphabets, number one to nine, and special characters or symbols.

Read more: https://brainly.com/question/17402566

Can Someone Help
Please Show Work​

Answers

Answer:

1) 1/14

2) 1/7

Explanation:

Summer Vacation

Number of times letters listed

S 1

U 1

M 2

E 1

R 1

V 1

A 2

C 1

T 1

I 1

O 1

N 1

Probability= Successful outcome ÷ Possible outcome.

Successful outcome(C)=1

*Successful outcome(M)=2

Successful outcome refers to letters chosen.

*Possible outcome=14

*Possible outcome refers to total number of letters.

Probability of C =1/14

Probability of M= 2/14=1/7

Hope this helps ;) ❤❤❤

Let me know if there is an error in my answer.

When backing up a database server to LTO tape drives, the following schedule is used. Backups take one hour to complete.
Sunday (7PM) : Full backup
Monday (7PM) : Incremental
Tuesday (7PM) :I Incremental
Wednesday (7PM) : Differential
Thursday (7PM) : i Incremental
Friday (7PM) : i Incremental
Saturday (7PM) : Incremental
On Friday at 9:00PM there is a RAID failure on the database server. The data must be restored from backup. Which of the backup tapes that will be needed to complete this operation?
A. 1
B. 2
C. 3
D. 4
E. 5

Answers

Answer:

C. 3

Explanation:

Linear Tape Open LTO tape drives are magnetic tapes used to store data. This can be used with small and large computers for backup purposes. The backup needs to maintained frequently so that new data is backup on every interval. The is a RAID failure on database server to ensure complete backup there must be 3  backup tapes needed.

Write down the information for your system’s active network connection (most likely either Ethernet or Wi-Fi).

Answers

Question:

1. Open a command prompt window, type ipconfig/ all and press Enter.

2. Write down the information for your system’s active network connection(most likely either Ethernet or Wi-Fi).

* Physical address in paired hexadecimal form.

* Physical address expressed in binary form.

Answer:

00000000 11111111 00000011 10111110 10001100 11011010

Explanation:

(i)First, open a command prompt window by using the shortcut: Windows key + X then select command prompt in the list.

(ii)Now type ipconfig/ all and press Enter. This will return a few information

(a) To get the Physical address in paired hexadecimal form, copy any of the Physical Addresses shown. E.g

00-FF-03-BE-8C-DA

This is the hexadecimal form of the physical address.

(b) Now let's convert the physical address into its binary form as follows;

To convert to binary from hexadecimal, we can use the following table;

Hex                 |         Decimal                |           Binary

0                      |          0                           |           0000

1                       |          1                            |           0001

2                      |          2                           |           0010

3                      |          3                           |           0011

4                      |          4                           |           0100

5                      |          5                           |           0101

6                      |          6                           |           0110

7                      |          7                           |           0111

8                      |          8                           |           1000

9                      |          9                           |           1001

A                     |          10                           |           1010

B                      |          11                           |           1011

C                      |          12                           |           1100

D                      |          13                           |           1101

E                      |          14                           |           1110

F                      |          15                           |           1111

Now, from the table;

0 = 0000

0 = 0000

F = 1111

F = 1111

0 = 0000

3 = 0011

B = 1011

E = 1110

8 = 1000

C = 1100

D = 1101

A = 1010

Put together, 00-FF-03-BE-8C-DA becomes;

00000000 11111111 00000011 10111110 10001100 11011010

PS: Please make sure there is a space between ipconfig/ and all

Define the term residential subscriber as it pertains to the telecommunications industry. Explain what is meant by the term rate center as it pertains to local telephone service. Who is responsible for determining the rate center boundaries for a calling region? Explain the difference between the terms rate center and wire center as they pertain to the local telephone serving area.

Answers

Answer:

According to section 40-15-102(18) of the Colorado Revised Statutes (CRS), a residential “Residential subscriber” is an individual who has elected to receive residential telephone service with a local exchange provider. The definition of “Person” here is extended to include any other persons living or residing with the residential subscriber.

A rate center is a geographical area used to define and organise the perimeter for local calling, for billing, and for assigning specific phone numbers, which can include multiple area codes.

The rate center boundaries are determined by Local Exchange Carriers (LEC)

LEC is just a regulatory jargon in the telecoms sector for the local telephone company.

A wire center is the actual physical telephone exchange building.

A rate center, on the other hand, is a regulatory concept designed with the primary goal to make billing administration within the local telephone serving area easy.

Cheers!

 

C++ 3.4.4: If-else statement: Print senior citizen. Write an if-else statement that checks patronAge. If 55 or greater, print "Senior citizen", otherwise print "Not senior citizen" (without quotes). End with newline.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   int patronAge = 71;

   

   if(patronAge >=55)

       cout<<"Senior citizen"<<endl;

   else

       cout<<"Not senior citizen"<<endl;

   return 0;

}

Explanation:

Initialize the patronAge age, in this case set it to 71

Check the patronAge. If it is greater than or equal to print "Senior citizen". Otherwise, print "Not senior citizen". Use "endl" at the end of each print statement to have new lines.

A security analyst is performing a BIA. The analyst notes that in a disaster, failover systems must be up and running within 30 minutes. The failover systems must use back up data that is no older than one hour. Which of the following should the analyst include in the business continuity plan?
A. A maximum MTTR of 30 minutes
B. A maximum MTBF of 30 minutes
C. A maximum RTO of 60 minutes
D. An SLA guarantee of 60 minutes

Answers

Answer:

D.  A maximum RPO of 60 minutes

Explanation:

Note that an option is not included in this list of options.

The complete list of options is:

A. A maximum MTTR of 30 minutes

B. A maximum MTBF of 30 minutes

C. A maximum RTO of 60 minutes

D.  A maximum RPO of 60 minutes

E. An SLA guarantee of 60 minutes

The Recovery Point Objective tells how old a backup file must be before it can be  recovered by a system after failure.

Since the data in the failover systems described in this question must be backup and recovered after the failure, it will be important to include the Recovery Point Objective (RPO) in the Business Continuity Plan.

Since the failover systems must use back up data that is no older than one hour, the backup of the system data must be done at intervals of 60 minutes or less. Meaning that the maximum RPO is 60 minutes.

Note that RPO is more critical than RTO in data backup

PARTNERING AS IT RELATES TO BPR.​

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it. IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change. It might contribute to making reconfiguration improvements, and is known as a BPR enabler.

A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2,048 sectors and there are 131,072 (217) tracks per surface. A block holds 512 bytes. The disk is not "zoned." What is the total capacity of this disk

Answers

Answer:

128 GB

Explanation:

Here, we are interested in calculating the total capacity of the disk.

From the question, we can identify the following;

Number of surfaces = 4

Tracks per surface = 131,072

Number of sectors = 2,048

Each Block size = 512 bytes

Mathematically;

Total data capacity of the disk = no of tracks * no of sectors * block size

= 131,072 * 2048 * 512 bytes

= 2^17 * 2^11 * 2^9 bytes = 2^37 bytes

1 GB = 2^30 bytes

So 2^37 = 2^7 * 2^30

= 128 GB

For the Address Block 195.200.0.0/16 a. If you have 320 Customers that need 128 addresses/customer - will there be enough addresses to satisfy them? and explain why? b. Say the first block of 64 customers want 128 addresses/customer - what would the address space look like?

Answers

Answer / Explanation:

195.200.0.0/16

Note: Class C address can not be assigned a subnet mask of /16 because class c address has 24 bits assigned for network part.

2ⁿ = number of subnets

where n is additional bits borrowed from the host portion.

2ˣ - 2 = number of hosts

where x represent bits for the host portion.

Assuming we have 195.200.0.0/25

In the last octet, we have one bit for the network

number of subnets  = 2¹  =2 network addresses  

number of host = 2⁷ - 2= 126 network addresses per subnets

hard disk drive has 16 platters, 8192 cylinders, and 256 4KB sectors per track. The storage capacity of this disk drive is at most Select one: a. 32 GB. b. 128 GB. c. 128 TB. d. 32 TB.

Answers

Answer:

B

Explanation:

Here, we want to calculate the storage capacity of the disk drive.

We proceed as follows;

Per track capacity = 4 * 256 KB = 1024 KB = 1 MB

per platter capacity = 1 MB * 8192 = 8192 MB

total capacity = 16 * 8192 MB = 131072 MB

converting total capacity to GB,

1024 MB = 1 GB

thus, 131,072 MB to GB would be;

total capacity =131072/1024 = 128GB

The concept of a process in an operating system embodies two primary characteristics, one of which is:

Answers

Answer:

Resource Ownership and Scheduling execution

Explanation:

In process characteristic the characteristic is

Resource ownershipScheduling / Execution

In Resource ownership, the OS performs a protection function where unwanted interference in processes are with resources

In scheduling execution, the process has execution state and scheduled. They can be separated by resource ownership.

The dispatching of the process is the lightweight process, and it is multi-threading. The ability of the operating system supports the single concurrent process.

The process is a unit in the resource protection and protected the CPU and other processes. It contains the multiple thread execution

Each thread contains the running, ready state and saved the thread context and access the memory. Some necessary activities of the various threads are the same address space and the resources.

Which test refers to the retesting of a unit, integration and system after modification, in order to ascertain that the change has not introduced new faults?

Answers

Answer:

Regression test

Explanation:

There are different types of testing in software development. Some of them are;

i. Smoke test

ii. Interface test

iii. Alpha test

iv. Beta/Acceptance test

v. Regression test

vi. System test

While all of these have their individual meanings and purposes, the regression test seeks to confirm that a recent update, modification or change in the underlying program code of the application (software) has not affected the existing features. This test ensures that a change to a software has not introduced new bugs or vulnerabilities to the state of the software before the change was made.

Regression test is actually done when;

i. there is a change in requirements of the software and thus the code is modified.

ii. a new feature is added to the software.

Suppose the count function for a string didn’t exist. Define a function that returns the number of non-overlapping occurrences of a substring in a string.

Answers

Answer:

I am writing a Python program:

import re

def NonOverlapping():

   string = input("Enter a string: ")

   substring = input("Enter a substring to find its non-overlapping occurances in " + string +": ")

   occurrences=len(re.findall(substring,string))

   return occurrences

print("The number of non-overlapping occurrences: " , NonOverlapping())

Explanation:

I will explain the program line by line.

import re  this is the module for performing regular expressions matching operations in Python.

def NonOverlapping(): this is the function definition. The function name is NonOverlapping and this function returns the number of non-overlapping occurrences of a substring in a string.

string = input("Enter a string: ")

substring = input("Enter a substring to find its non-overlapping occurances in " + string +": ")

The above two statement ares used to take input from the user. First the user is prompted to enter a string and the string is stored in string variable. Next user is asked to input the substring and its stored in susbtring variable.

occurrences=len(re.findall(substring,string)) This is the main line of the function. It has two methods i.e. len() and re.findall().

The re.findall() method returns all non-overlapping matches of substring in string. The string is checked for the given substring from left to right and all the non-overlapping occurrences of the substring are found and a list of matches is returned. len() method is used to return the length of the string but here it is used to count the number of non-overlapping occurrences substring in a string which are returned by re.findall() method. The whole result of these two methods is stored in occurrences.

return occurrences  This statement returns the number of non-overlapping occurrences of a substring in a string computed in the above statement.

print("The number of non-overlapping occurrences: " , NonOverlapping())

This statement displays the result by calling NonOveralling() method.

Your smartphone, digital camera, and printer are all part of a network in your workspace. What type of network is likely in use

Answers

Answer:

PAN

Explanation:

PAN, short form of Personal Area Network, is a type of computer network built for personal use typically within a building. This could be inside a small office or a bedroom in a residence. This type of network basically consists of one or more personal computers, digital camera, printer, Tv, scanner, telephones, peripheral devices, video games console, and other similar devices.

It is pretty much simple to set up and allow for great flexibility. In this network, a single modem can be set up to enable both wired and wireless connections for multiple devices within the building.

True or False: It is okay to just paste the URLs of the items you used for references at the end of a paper. Select one: True False

Answers

True as long as it isn’t on a test

It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False

For better understanding, lets explain why the answer is false

When citing a reference it not OK to cite URLs. when you are citing onlh the URL is wrong because theURL could change at any time and the fact remain that it is not everyone who reads your paper can do it electronically or has access to the internet., so the url is not the first step to take. The right thing to do is to give the name of the paper, the author(s), the Journal it was published in and the year it was published.



From the above, we can therefore say that the answer is It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False, is correct.

Learn more about referencing from:

https://brainly.com/question/13003724

A(n) ________ event is an alert that is generated when the gossip traffic enables a platform to conclude that an attack is under way
A. PEP
B. DDI
C. IDEP
D. IDME

Answers

Answer:

B. DDI

Explanation:

A(n) DDI event is an alert that is produce or invoke when the gossip traffic allow a platform to conclude that an attack or potential attack is under way.

A device driver is a computer program that operates or controls a particular type of device that is attached to a computer system.

A driver provides or supply a software interface to hardware devices which enable the operating systems and other computer programs to access hardware functions without needing to know the exact details in respect of the hardware being used.

DDI means Device Driver Interface

A driver relate or communicate with the device via the computer bus or communications subsystem to which the hardware is connected. Whenever a calling program invokes a routine in the driver, the driver will subsequently transmit commands to the device.

Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the database

Answers

Answer:

"Integrity constraints " is the correct answer.

Explanation:

A successful DBMS offers integrity constraints, which have been an option that allows you to modify the database layout without modifying the applications accessing the repository.A principle or requirement which the data in something like a database should therefore obey.

So that the above is the correct choice.

What are the differences between editing manually and editing digitally? What tools are used for each?

Answers

Answer:

Both manual and digital editing are concepts used in proofreading.

Manual editing is also called "hard proofreading" (or "hard proofing" for short). It is the process of proofreading, modifying or revising printed documents. In this type of proofreading, one would normally manually mark parts of the printed documents with editing materials such as ink, pen, marker e.t.c

Digital editing is also called "soft proofing". In contrast to manual editing, this type is done on digital documents. These documents include, but not limited to, DOC, txt, PDF, image, audio and video files.

Tools for editing manually are;

i. pen

ii. ink

iii. tipex

Tools for editing digitally are;

i. Photoshop application

ii. Text editors such as notepad++, Microsoft word

Proofreading has evolved in recent times as a result of advancements in technology. Now, manual proofreading has paved way for digital proofreading, which allows revising of PDF and  DOC files. The difference in both forms is as follows:

Manual Editing: In the process of revising or proofing printed documents, one would manually apply standard proofreading marks. Manual editing is also known as "Hard proofing", as the process requires proofreaders to mark the hard copies.

Digital Editing: In the process of revising or proofing digital documents i.e. PDF and DOC files, one would digitally apply the proofreading marks. Thus, corrections and edits are transferred electronically among authors, proofreaders. Digital editing is also known as "Soft proofing", as the process requires proofreaders to mark the soft copies i.e. without using any paper or pen.

There are a number of electronic tools and marks available for both techniques of

proofreading. Some tools used for manual proofreading include- deletion, capitalization, and  insertion, close-up, transpose.

Tools used in digital proofreading include- spell check, readability levels, trite expressions,  and comment, track changes.

Learn More: https://brainly.com/question/10002469

The attack in which the attacker sends a fragmented message that the victim cannot reconstruct is a(n) ________ attack.

Answers

Answer:A teardrop attack

Explanation:

A teardrop attack also  called  denial-of-service  attack is one  which an attacker, usually a hacker  sends many  fragmented bug data messages  to a victim's machine causing a crash in the device. This is because data moves in small data packets of whose transmission should follow layers according to the model of the devise be it OSI or  TCP/IP model. Now when a hacker continually sends huge amounts of packets of bug data, the process of data transmission fails and  packet data becomes overlapped, making the victim 's device machine in disarray and difficult to reconstruct while trying to  rearrange them. When the hacker continually sends in more bug data packets to the already confused machine,  The machine system crashes.

Financial application: calculate future investment value)

Write a program that reads in an investment amount, the annual interest rate, and the number of years, and then displays the future investment value using the following formula:

futureInvestmentAmount = investmentAmount * (1 + monthlyInterestRate) ^ numberOfMonths

For example, if you enter the amount 1000.56, an annual interest rate of 4.25%, and the number of years as 1, the future investment value is 1043.33. Here is a sample run:

Enter investment amount: 1000.56

Enter annual interest rate: 4.25

Enter number of years: 1

Accumulated value is 1043.92.

In Python.

Answers

Answer:

Using Python

python code:

investmentAmount=float(input("Enter investment amount: "))

annualInterestRate=float(input("Enter annual interest rate: "))

numberOfYears=int(input("Enter no. of years: "))

futureInvestmentAmount=investmentAmount*((1+(annualInterestRate/1200))**(numberOfYears*12))

#formula defined

print ("Accumulated value: ",round(futureInvestmentAmount,2))

output

Enter investment amount: 1000.56

Enter annual interest rate: 4.25

Enter number of years: 1

Accumulated value is 1043.92

Other Questions
the length of a rectangular sheet of metal is 9.96m and it's breadth is 5.08m. Find the area of the metal.Correct the answer to 2 significant figures and then correct the answer to 0.1 meter square What is the midpoint between (-8, 5) and (2,-2)? The Bridal Gift Shop, Inc. has 11 units in ending merchandise inventory on December 31. The units were purchased in November for $150 each. The price lists from suppliers indicate the current replacement cost of the item to be $152 each. What would be the amount reported as Merchandise Inventory on the balance sheet? A $1,650 B. $3.322 C. $1,672 D. $302 Christina will receive annuity payments of $1,200 a year for five years, with the first payment occurring at Year 4. What is the value of this annuity to her today at a discount rate of 7.25 percent The quotient of y and 3 what is the mass of 2.10 x 10^22 formula units of naoh (molar mass equals 40.0 g/mol) help with spanish asap please and thank you I NEED HELP PLEASE, THANKS! :) '....to examine the question critically... standard what type of adverbial is that Which of the following is a vector quantity? A.speed B.weight C.distance travelled D.mechanical energy The representative firm's total revenue (TR) for selling the profit-maximizing level of output is what's the salivating is controlled by A customer has an individual cash account, an individual margin account, a joint cash account with his wife, and a custodial account for each of his 2 children. If the firm liquidates, Securities Investor Protection Corporation covers: #1. The area of a square tile is 53.4cm^2. find the length of one side of the tile, rounded to the nearest 10th.#2 which RADICAL is not a perfect squarea)5.29b)13.69c)1.3d)0.09#3 A walkway is been constructed using square cement tiles that each have an area of 15.5ft^2. Six tiles will be lined up end to end to construct a walkway. What is the total length of the walkway? Round your answer to the nearest 10th of a foot.PLEASE ANSWER ASAP all of them or even one would help please please If a check that was outstanding on last period's bank reconciliation was not among the cancelled checks returned by the bank this period, in preparing this period's reconciliation, the amount of this check should be: g What is the next number in the pattern below? 3, 5, 9, 15, 23, ___ A. 31 B. 33 C. 35 D. 37 There are several ways that governments can increase or decrease the money supply. Match the descriptions below with the corresponding policy tool. It is possible that a description does not apply to any of the terms.1. Open Market Operations 2. Reserve Requirement 3. Discount Rate 4. Quantitative EasingA. A government printing more currency.B. An increase in government spending.C. An increase in the interest rate that a central bank charges commercial banks for loans.D. A central bank purchasing existing bonds.E. An increase in the percentage of deposits that banks must keep on hand.F. A central bank purchasing a large quantity of longer-term Treasury bonds. 10. Five companies employed 2340, 3455, 675, 960 and 1350 workers. The first companylaid off 1 worker for every 5 workers, while the other three recruited 2 new workers forevery 3 A mutation of the proteolytic enzyme Trypsin results in a stable covalent bond between one of the catalytic amino acids of the protease and its protein substrate. Which of the following are probably true?a. The enzyme would become inactive. b. The enzyme and substrate would be stuck together. c. The delta-G of the proteolysis reaction would change. d. The rate of the catalyzed reaction would increase. Ann spent 1/3 of her money on transport, 2/5 on food, 1/6 on clothing and saved $80.00. How much money did she have to begin with?