6[5 points]. Which of the following types of memory has the shortest (fastest) access time?
A) cache memory
B) main memory
C) secondary memory
D) registers
7[5 points]. Which of the following types of memory has the longest (slowest) access time?
A) cache memory
B) main memory
C) secondary memory
D) registers
8[5 points]. Consider the postfix (reverse Polish notation) 10 5 + 6 3 - /. The equivalent infix
expression is:
A) (10+5)/(6-3)
B) (10+5)-(6/3)
C) 10/5+(6-3)
D) (10+5)-(6/3)
9[5 points]. In reverse Polish notation, the expression A*B+C*D is written:
A) ABCD**+
B) AB*CD*+
C) AB*CD+*
D) A*B*CD+
10[5 points].The equation below relates seconds to instruction cycles. What goes in the ????
space?
A) maximum bytes
B) average bytes
C) maximum cycles
D) average cycles
11[10 points]. Suppose we have the instruction LOAD 1000. Given memory as follows:
What would be loaded into the AC if the addressing mode for the
operand is:
a. immediate __________
b. direct __________
c. indirect ____________

Answers

Answer 1

6. Cache memory has the shortest (fastest) access time.

7. Secondary memory has the longest (slowest) access time.

8. The equivalent infix expression is (10+5)/(6-3).

9. In reverse Polish notation, the expression A*B+C*D is written: AB*CD+*

10. Average cycles

11. The AC contents would be:

a. immediate 1000b. direct the value stored at memory location 1000c. indirect the value stored in memory location 1000+ 1000 = 2000

6.Cache memory is a small high-speed memory located between CPU and main memory. It is used to store those parts of data and programs which are most frequently used or are most likely to be used in the near future. Cache memory is faster than main memory because it is closer to the processor.

7.Secondary storage devices are used to store large amounts of data. Access time of secondary memory is very slow as compared to primary memory as data is stored on a disk in a sequential manner. It takes time to locate and read data from different parts of the disk.

8.Given postfix expression : 10 5 + 6 3 - /

The first two operands encountered are 10 and 5, and the operator between them is +. Thus, 10 + 5 = 15.The next two operands encountered are 6 and 3, and the operator between them is -. Thus, 6 - 3 = 3.The last operator encountered is /, which means division. Thus, 15 / 3 = 5.The equivalent infix expression is: (10 + 5) / (6 - 3)

9.The postfix expression A*B+C*D can be evaluated as follows:

First, push operand A into the stack, then push operand B into the stack. Pop both operands from the stack, multiply them and push the result back into the stack.

Then push operand C into the stack, then push operand D into the stack. Pop both operands from the stack, multiply them and push the result back into the stack. Pop the two operands from the stack, add them and push the result back into the stack.

Therefore, the postfix expression A*B+C*D is equivalent to AB*CD+*.

The equation that relates seconds to instruction cycles is:Seconds = Instruction count x Cycles per instruction x Clock cycle time

Therefore, the value that goes into the ???? space is average cycles as it refers to the average number of clock cycles required for executing a single instruction.

11.LOAD 1000 loads the contents of memory location 1000 into the accumulator (AC).

a. In immediate addressing mode, the operand itself is part of the instruction. Thus, the contents of memory location 1000 would be loaded into the AC.b. In direct addressing mode, the operand is a memory address that points to the location of the data. Thus, the value stored at memory location 1000 would be loaded into the AC.c. In indirect addressing mode, the operand itself is not a memory address but a pointer to that memory address. The value stored in memory location 1000 is a memory address which points to the actual data. Thus, the value stored in memory location 1000 + 1000 = 2000 would be loaded into the AC.

Learn more about Polish notation at

https://brainly.com/question/31432103

#SPJ11


Related Questions

Need help please help me
I need it right now ​

Need help please help me I need it right now

Answers

Answer:

1. G

2. J

3. I

4. B

5. A

6. H

7. C

8. F

9. E

10. D

11. D

12. C

13. A

14. B

Explanation:

1. OCR: converts paper based text to digital form. OCR is an acronym for Optical Character Recognition.

2. OMR: marks candidates' responses on a multiple choice exam. OMR is an acronym for Optical Mark Recognition.

3. Printer: produces a hard copy document. It is an output device that accepts electronic data and prints them on a paper (hardware document).

4. Joystick: used for playing a car racing game on the computer

5. Sensor: turns on the light when someone enters the room. It can be defined as a device designed to detect changes or events within its immediate surroundings and then transfers this data to the central processing unit of a computer.

6. ROM: Contains 'boot up' instructions. ROM is acronym for read only memory and it contains the basic input and output system (BIOS) used during a computer start-up.

7. Pad and tablet: draws lines in an architectural design. They are an electronic device that can be used two or three dimensional shapes.

8. Modem: Modulates and demodulates signals. Modulation refers to the conversion of digital signals into an analogue signal while transmitting it over a line. Demodulation is the conversion of analogue signal into a digital signal.

9. Barcode reader: Reads data containing information on a product

10. MICR: reads digit specially printed on a cheque. MICR is an acronym for Magnetic Ink Character Recognition.

Section B

11. Banking industry: managing user accounts through the use of software applications.

12. Weather forecasting: predicting the weather through the use of software programs.

13. Household appliance: sequencing wash cycle tasks in a washing machine.

14. Manufacturing industry: using robots to assemble a car components.

A. which display shows the frequency content of the signal at a particular point in time? what quantities are on the axes of this display?

Answers

FFT Spectrum demonstrates the frequency content of the signal at a certain point in time.

What is FFT Spectrum?

The spectrum exists as the basic measurement of an FFT analyzer. It is simply the complex FFT. Normally, the magnitude of the spectrum stands displayed. The magnitude stands as the square root of the FFT times its complex conjugate. (Square root of the sum of the real (sine) part squared and the imaginary (cosine) part squared.)

The output of the FFT stands for a complex vector containing information about the frequency content of the signal. The magnitude tells you the strength of the frequency components compared to other components. The grade tells you how all the frequency components align in time.

Hence,  FFT Spectrum demonstrates the frequency content of the signal at a certain point in time.

To learn more about FFT Spectrum refer to:

https://brainly.com/question/15830034

#SPJ4

IT engineers troubleshoot a problematic layer 2 network device by monitoring dynamic host configuration protocol (DHCP) traffic. Considering the troubleshooting approach, which technology should the engineers utilize

Answers

IT engineers should utilize a network protocol analyzer tool, such as Wireshark, to monitor DHCP traffic and identify any issues with the layer 2 network device.

DHCP is a network protocol used to dynamically assign IP addresses and other network configuration parameters to devices on a network. By monitoring DHCP traffic, IT engineers can gain insight into the behavior of the network and identify any issues that may be affectdentify any errors or misconfigurations in the layer 2 network device.

A network protocol analyzer, like Wireshark, allows engineers to capture and analyze network traffic in real-time. It can filter specific protocols, such as DHCP, to help identify issues and monitor the communication between devices.

To know more about IT engineers visit:-

https://brainly.com/question/24383409

#SPJ11

Please help with my assignment! Use python to do it.

Answers

Answer:

I cant see image

Explanation:

can you type it and I'll try to answer

What does a pencil icon in the row selector area indicate?

The record is missing some text or data values in its fields.
The row is blank and is available for inserting a new record.
The row is being edited, and the changes are not yet saved.
The record has incorrect data values or conflicting data values.

(This is using Excel)

Answers

Answer:

c

Explanation:

The pencil icon is in the row selector area it indicates that the row is being edited, and the changes are not yet saved.

What are fields in computer?

We all have to use the computer to fill in forms and these forms have spaces for us to provide information. These spaces that we are required to fill are called fields.

When the pencil icon is in the row selector area it indicates that the row is being edited, and the changes are not yet saved.

Learn more about computer:https://brainly.com/question/21080395

#SPJ2

pointers contain memory addresses for other variables, but there are no means to access or change the contents of those variables group of answer choices true false

Answers

False. Pointers can be used to access and modify the contents of variables whose memory addresses they contain.

Learn more about Pointers here:

brainly.com/question/32073644

#SPJ11

Use the pulldown menus below to match the name of the field with the function/purpose of a field within an Ethernet frame.

_____ Cyclic redundancy check (CRC) field
_____ Source address field
_____ Data (payload) field
_____ Type field.
_____ Sequence number field

A. Used to detect and possibly correct bit-level errors in the frame.
B. This field does not exist in the Ethernet frame
C. Used to demultiplex the payload up to a higher level protocol at the receiver.
D. The contents of this field is typically (bit not always) a network-layer IP datagram.
E. 48-bit MAC address of the sending node.

Answers

Matching the field names with their functions/purposes in an Ethernet frame:

_____ Cyclic redundancy check (CRC) field

A. Used to detect and possibly correct bit-level errors in the frame.

_____ Source address field

E. 48-bit MAC address of the sending node.

_____ Data (payload) field

C. Used to demultiplex the payload up to a higher-level protocol at the receiver.

_____ Type field.

D. The contents of this field are typically (but not always) a network-layer IP datagram.

_____ Sequence number field

B. This field does not exist in the Ethernet frame.

Learn more about functions/purposes from

https://brainly.com/question/13859033

#SPJ11

ASAP! Due by tonight!!!! Please help!!!

ASAP! Due by tonight!!!! Please help!!!

Answers

The answer is C. Start of mystery

Answer: e

Explanation:

working on a python assignment, not sure what i did wrong can anyone help?

working on a python assignment, not sure what i did wrong can anyone help?

Answers

Answer:

Explanation:

line 13 should be changed to:

print(“Item 1: “ + item1 + “ - $” + str(float(const1)))

You cannot concatenate a string to float type.

Lines 621–644: Explain why Proctor is considered the protagonist(good character) of The Crucible. Consider the main events of the plot so far and analyze their connections to Proctor.

Answers

Proctor is the protagonist in The Crucible due to his role in revealing the flaws of the Salem community and his moral integrity.

Lines 621-644: In the play The Crucible, Proctor is considered the protagonist (good character) due to his central role and the events that unfold around him. Throughout the plot, Proctor's actions and decisions are pivotal in revealing the flaws and corruption within the Salem community. His refusal to conform to societal expectations and his vocal opposition to the witch trials demonstrate his moral integrity and courage. Proctor's affair with Abigail Williams, while a source of personal conflict, ultimately becomes a catalyst for exposing the deceit and manipulation that underlie the trials. His willingness to sacrifice his reputation and ultimately his life in order to uphold the truth and justice solidifies his status as the protagonist of the story.

Learn more about Crucible here:

https://brainly.com/question/31414691

#SPJ11

There is one clear definition of IT. True False

Answers

Answer:

That is False. it has more definitions not only one.

Hey can y’all help me with this thanks

Hey can yall help me with this thanks

Answers

Answer:The answer is 144

Explanation:First you subtract the two numbers which would be 8-2=6

Then you multiply the 6 by how many numbers there are: 6x2=12

then you multiply 12 by itself: 12x12=144

What MIPS32 command is associated with the following hexadecimal instruction: 2888006416 A. slti Sto, $a0, 100 B. sub $vo, $t8, $19 C. sub $v0, $t9, $t8 D. slti $a0,$t0, 100

Answers

The MIPS32 instruction associated with the hexadecimal instruction 2888006416 is D. slti $a0, $t0, 100.

What is MIPS32?

MIPS32 is a reduced instruction set computing (RISC) architecture that is based on the MIPS Computer Systems company's MIPS I instruction set. This is one of the most widely used instruction sets in the embedded processor space, and it has been in use for a long time. Because the architecture is both compact and efficient, it is frequently used in embedded applications and is a common platform for embedded systems development.

The MIPS32 architecture is similar to other RISC-based architectures, which are characterised by a limited number of instructions and fast execution times. Instructions have a fixed length of 32 bits, and operands are mostly 32 bits wide. The MIPS instruction set is divided into three different instruction formats. The R-type, I-type, and J-type are the three types of instructions. Each instruction format contains a variety of fields that are used to specify the operands and the operation to be performed.

Learn more about RISC here:

https://brainly.com/question/13266932

#SPJ11

In a cross join, all of the rows in the first table are joined with all of the
O unmatched columns in the second table
O matched rows in the second table
O rows from the second table
O distinct rows in the second table

Answers

O rows from the second table. All of the first table's rows and all of the second table's O unmatched columns are combined in a cross join.

What does SQL's cross join accomplish?

The Cartesian sum of the rows from of the rowsets inside the join are returned by a cross join.The rows from the first and second rowsets will be combined, in other words.

Describe the Cross join ?

A crossing join is a kind of join that gives the Cartesian sum of all the rows from the joined tables.In other words, every row from the initial table and each row from of the second table are combined.

To know more about rows visit:

https://brainly.com/question/27917476

#SPJ4

Television is a technological development that occurred during what age

Answers

Answer:

Industrial Age

Explanation:

In Black friday 2019 how much percentage of a cut did asus or msi did on gaming laptops did they do 50% off or?

Answers

Answer:

yes they do 50% off

Explanation:

How will i go about the investigation considering all the pat requirements

Answers

Investigations can vary widely in their scope and requirements, depending on the situation and the goals of the investigation. However, there are some general steps that can be helpful in conducting a thorough and effective investigation:

Define the scope and purpose of the investigation: Before starting an investigation, it is important to define what you hope to achieve and what the investigation will cover. This could include defining the timeframe, identifying key players, and establishing the boundaries of the investigation.Gather information and evidence: This step involves collecting information and evidence that is relevant to the investigation. This could include interviewing witnesses, reviewing documents and records, and collecting physical evidence.Analyze the information and evidence: Once you have collected the information and evidence, you will need to analyze it to identify patterns, inconsistencies, and potential leads. This may involve using data analysis tools, creating timelines, and conducting background research on individuals and organizations involved in the investigation.Draw conclusions and make recommendations: Based on the analysis, you will need to draw conclusions about what happened and make recommendations for how to proceed. This could include recommending further investigation, disciplinary action, or changes to policies and procedures.Communicate findings: Finally, you will need to communicate the findings of the investigation to relevant stakeholders. This could include writing a report, giving a presentation, or testifying in court.Throughout the investigation, it is important to maintain a clear and objective perspective, follow established protocols and procedures, and ensure that all relevant legal and ethical requirements are met.

To learn more about Investigations click the link below:

brainly.com/question/29659466

#SPJ4

How do you reset a g.mail password?

Answers

Answer:

put: forgot password to reset it

Answer:

Change your pass word

Open your Go ogle Account. You might need to sign in.

Under "Security," select Signing in to G oo gle.

Choose Password. You might need to sign in again.

Enter your new password, then select Change Password.

Which unit of binary storage has a size that is processor dependent?.

Answers

It should be noted that the unit of binary storage has a size that is processor dependent is word.

What is binary storage?

In a binary storage , all the information that is been  stored in a computer is usually done by following a sequence of 0's and 1's, .

Since the  storage devices consist of a set of locations and do have  one of two possible states.

learn more about binary storage at;

https://brainly.com/question/21400963

which of the following correctly describes the meaning of the two names

Answers

The option correctly describes the meaning of‘namespace’ feature in C++ is "Namespaces provide facilities for organizing the names in a program to avoid name clashes". So option D is the correct answer.

C++ programming language introduced the concept of namespaces to avoid naming conflicts. The namespace is a mechanism for logically grouping related identifiers to avoid naming collisions.

In simple words, a namespace is a container for identifiers, including variables, classes, functions, etc. It is an abstract container that allows to define a scope where identifiers with the same name can exist without creating any name conflict.

For example, if you create a variable named "sum" in one function and another variable named "sum" in another function, both variables will have different memory spaces, but when you try to access the variable "sum", the compiler will not be able to decide which "sum" you are referring to.

This is where the namespaces come to the rescue. You can create separate namespaces and put the "sum" variables in their respective namespaces to resolve the naming conflict. Therefore option D is the correct answer.

To learn more about c++: https://brainly.com/question/30392694

#SPJ11

A company that want to send data over the internet has asked you to write a program that will encrypt it so that it may be transmitted more securely.All the data transmitted as four digit intergers.Your application should read a four digit integer enterd by the user and encrypt it as follows:replace each digit with the result of adding 7 to the digit and getting the remainder after diving the new value by 10.Tjen swap the first digit with the third,and swap the second digit with the fourth.Then print the encrpted interger.Write a separate application that inputs an encrypted four digit interger and decrypts it (by reversing the encryption scheme) to form the original number

Answers

Answer:

A java code was used to write a program that will encrypt and secure a company data that is transmitted over the Internet.

The Java code is shown below

Explanation:

Solution:

CODE IN JAVA:

Encryption.java file:

import java.util.Scanner;

public class Encryption {

  public static String encrypt(String number) {

      int arr[] = new int[4];

      for(int i=0;i<4;i++) {

          char ch = number.charAt(i);

          arr[i] = Character.getNumericValue(ch);

      }

      for(int i=0;i<4;i++) {

          int temp = arr[i] ;

          temp += 7 ;

          temp = temp % 10 ;

          arr[i] = temp ;

      }

      int temp = arr[0];

      arr[0] = arr[2];

      arr[2]= temp ;

      temp = arr[1];

      arr[1] =arr[3];

      arr[3] = temp ;

      int newNumber = 0 ;

      for(int i=0;i<4;i++)

          newNumber = newNumber * 10 + arr[i];

      String output = Integer.toString(newNumber);

      if(arr[0]==0)

          output = "0"+output;

      return output;

  }

  public static String decrypt(String number) {

      int arr[] = new int[4];

      for(int i=0;i<4;i++) {

          char ch = number.charAt(i);

          arr[i] = Character.getNumericValue(ch);

      }

      int temp = arr[0];

      arr[0]=arr[2];

      arr[2]=temp;

      temp = arr[1];

      arr[1]=arr[3];

      arr[3]=temp;

      for(int i=0;i<4;i++) {

          int digit = arr[i];

          switch(digit) {

              case 0:

                  arr[i] = 3;

                  break;

              case 1:

                  arr[i] = 4;

                  break;

              case 2:

                  arr[i] = 5;

                  break;

              case 3:

                  arr[i] = 6;

                  break;

              case 4:

                  arr[i] = 7;

                  break;

              case 5:

                  arr[i] = 8;

                  break;

              case 6:

                  arr[i] = 9;

                  break;

              case 7:

                  arr[i] = 0;

                  break;

              case 8:

                  arr[i] = 1;

                  break;

              case 9:

                  arr[i] = 2;

                  break;

          }

      }

     int newNumber = 0 ;

      for(int i=0;i<4;i++)

          newNumber = newNumber * 10 + arr[i];

      String output = Integer.toString(newNumber);

      if(arr[0]==0)

          output = "0"+output;

      return output;    

  }

  public static void main(String[] args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter a 4 digit integer:");

      String number = sc.nextLine();

      String encryptedNumber = encrypt(number);

      System.out.println("The decrypted number is:"+encryptedNumber);

      System.out.println("The original number is:"+decrypt(encryptedNumber));  

  }  

}

Which statement about assembly-line design is false? Choose all that apply. - Assembly line products have low variety. - Assembly line services have high variety. - Assembly lines have low volumes of output. - The goal of an assembly line layout is to arrange workers in the sequence that operations need. Which statement regarding assembly-line balancing is true? Choose all that apply. - Assembly-line balancing is not a strategic decision. - Assembly-line balancing requires information about assembly tasks and task times. - Assembly-line balancing requires information about precedence relationships among assembly tasks. - Assembly-line balancing cannot be used to redesign assembly lines.

Answers

Assembly line design is a strategy used to streamline manufacturing processes by breaking down tasks into simple and repeatable steps performed by employees. The objective of assembly line design is to establish an efficient flow of work that promotes productivity, reduces waste, and maximizes profits.

Below are the false statements about assembly-line design:

Assembly line products have low variety.Assembly line services have high variety.Assembly lines have low volumes of output. (False)

The goal of an assembly line layout is to arrange workers in the sequence that operations need.Here are the true statements regarding assembly-line balancing:

Assembly-line balancing requires information about assembly tasks and task times.Assembly-line balancing requires information about precedence relationships among assembly tasks.Assembly-line balancing cannot be used to redesign assembly lines. (False)

Assembly-line balancing is a strategic decision that entails dividing the assembly process into smaller units, assigning specific tasks to individual workers, and ensuring that each employee's tasks are consistent with their abilities and skills.

Task times and task relationships are crucial in assembly-line balancing, as the objective is to optimize production while minimizing downtime, labor, and equipment usage.

Learn more about streamline at

https://brainly.com/question/32658458

#SPJ11

for what remot control help​

Answers

Answer:

?

Explanation:

Answer:

to control other things

Explanation:

hope this helps

Physical Geography of the Middle East

Answers

Answer:

Explanation:

He’s wright SS7G5 The student will locate selected features in

Southwestern Asia (Middle East).

a. Locate on a world and regional political-physical map:

Euphrates River, Jordan River, Tigris River, Suez Canal,

Persian Gulf, Strait of Hormuz, Arabian Sea, Red Sea, and

Gaza Strip.

b. Locate on a world and regional political-physical map the

nations of Afghanistan, Iran, Iraq, Israel, Saudi Arabia, and

Turkey

Which of the following is true about dealing with software and other digital content?
a. if you purchased software, then you own it and can do what you like with it
b. a software license gives you and one other designated person the right to install and use the software
c. the right to copy software belongs to the creator of the work
d. you are prohibited from making a copy of software under any circumstances

Answers

The correct answer for the question is option B: "A software license gives you and one other designated person the right to install and use the software."

A software license is a legal agreement that specifies the terms and conditions under which the software may be used. When you purchase software, you do not own it; rather, you obtain a license to use it. You're just allowed to use the software as specified in the agreement. Software licenses protect intellectual property rights and ensure that the software is used correctly. It ensures that users adhere to certain terms and conditions, such as limiting the number of devices on which software may be installed, prohibiting reverse engineering or copying, and establishing licensing fees. The license's terms are agreed upon when you first install the software. If you agree to the conditions, you will be able to use the software. If you do not agree to the conditions, you will not be able to use the software. Thus, a software license gives you and one other designated person the right to install and use the software.

To learn more about software license, visit:

https://brainly.com/question/12928918

#SPJ11

The network layer in the Internet provides _________________.

a) comprehensive error and flow control.
b) limited error control, but no flow control.
c) comprehensive error control but limited flow control.
d) All of the choices are correct

Answers

The network layer in the Internet provides limited error control, but no flow control. The correct option is b) limited error control, but no flow control.

The network layer is responsible for routing packets through the Internet, handling IP addresses, and fragmentation. It provides limited error control using techniques such as checksums to detect corrupted packets, but does not offer flow control to manage the rate at which data is transmitted. Flow control is typically handled at the transport layer, which also provides more comprehensive error control through mechanisms like error correction, retransmission, and acknowledgements. Therefore, the correct option is b) limited error control, but no flow control.

Learn more about network layer visit:

https://brainly.com/question/29671395

#SPJ11

how to save pictures on a chromebook without right-click

Answers

screen shot is easier

_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care

Answers

Answer:

Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.

Text,Audio and graphic is entered into the computer using
a)A cpu
b)Output
C)Input
ICT Question​ asap pls help

Answers

Answer:

I think it's input, not sure tho

Amy wants to compose music for the animation she plans to create. When should a me compose the final music for the animation?
A. before the creation of animation
B. while creating the animation
C. after completion the animation
D. while conceptualizing the animation ​

Answers

Answer:

After the completion.

Explanation:

Other Questions
Consider the following pair of equations:y = -2x + 8y = x - 1Explain how you will solve the pair of equations by substitution. Show all the steps and write the solution in (x, y) form. Put the numbers in descending order 25% 3/4 2.8x10 Victoria Enterprises expects earnings before interest and taxes (EBIT) next year of $1.8 million. Its depreciation and capital expenditures will both be $300,000, and it expects its capital expenditures to always equal its depreciation. Its working capital will increase by $47,000 over the next year. Its tax rate is 25%. If its WACC is 8% and its FCFs are expected to increase at 6% per year in perpetuity, what is its enterprise value? The company's enterprise value is $ (Round to the nearest dollar.) A capacitor of capacitance C has charge Q and stored energy is U if the charge is increased to 2Q then energy will be A)4U B)2U C)U/2 D)U/4 The climate in southern Morocco can be extremely warm. The people of southern Morocco often build their homes underneath trees in order to keep their homes cooler during the summer. What type of relationship exists between people and trees in this situation? A. predation B. commensalism C. mutualism D. parasitism During the industrial revolution what was the childrens role in the workplace ? What are the Atlanic oceans effects on climate? Travis wrote five checks to the employees of his business, each for $225. if the original balance in his checking account was $890, what is his new balance? Q. A customer hands you three (3) five-dollar bills, five (5) quarters, and two (2) dimes to pay thefull amount for an item. How much does the item cost?A. $15.45B. $16.35C. $16.20D. $16.45 What is the base of x2? Use the Pythagorean Theorem to find AB. What is the trigonometric ratio equivalent to tan (C)? 44. The table below lists the tallest waterfalls in the world, in feet.Name/Location Height (ft.)Mutarazi - Zimbabwe 24.99 x 102Gocta Cataracts - Peru 2.532 x 103Utigord - Norway 2,625 x 100Angel - Venezuela .3212 x 104Espelands - Norway 2.307 x 103Yosemite - California (USA) 2,425Monge - Norway 25.4 x 102Tugela - South Africa 3.11 x 103**Heights are approximations**[Part 1]List the waterfalls from tallest to shortest.. Show all of your work and/or explain your reasoning. [Part 2] What is the difference between the tallest and shortest heights? Show your work. 27. AI is an up and coming field with many societal implications. The market has indicated that this is a meaningful field, therefore, De Graff would say if we want meaningful work we should pursue careers in this field. T/F What do you think this quote means ? Why would the president of Mexico say this ? Once corgo comes into thecountry, how is it distributedthroughout the nation? HeLp mEe PleAsE TwTWhy do states need to be concerned about laws passed in other states article and section? What type of testing uses unexpected randomized inputs to determine how software will respond?. Can someone answer this?:(( I really need it What are the types of political party? the following are weekly production in unit of 60 workers in amanufacturing company.23773259204825546942516482193350397235395248644957417262674655528244755651535775856855524540465150166256154401558849635775the management has decided to give bonus of RS.5,10,15,20,&25 to eachworker in the respective output of 40 and over in the interval of 10 ofweekly output find the average bonus received by the worker.