a. what is a device register? b. what is a device data register? c. what is a device status register?

Answers

Answer 1
Device registration can be described as a device that permits a user to flag the computer, PDA, mobile phone, or other devices.A device data register is commonly a storage space for aparts of memory that are used to deliver data for immediate use by the CPU (Central Processing Unit) for data processing.A device status register refers to a hardware register that include information about the state of the processor.

Register is a kind of computer memory that is used for rapidly accepting, storing, and transfering data and instructions that are being used immediately by the CPU. There are three kinds of register, namely:

MDR (Memory data registers). IR (index registers).MBR (Memory buffer registers).

Learn more about register, here https://brainly.com/question/25760471

#SPJ4


Related Questions

Select the correct text in the passage.
Which sentence describes the correct action that should be taken when the computer doesn’t respond?
Sharon was working on her computer, when it suddenly stopped responding. She checked the power supply of the computer. It was fine. However, the computer still did not respond. Her little brother came to her room and suggested that she switch off the power supply to the computer. Sharon’s mom heard this conversation and told Sharon to press the Num Lock key multiple times. Her dad thought she should press the Ctrl, Alt, and Delete keys simultaneously and reboot the computer. When she called a friend, he said that she should just press any mouse button multiple times.

Answers

Answer:

The sentence that describes the correct action that should be taken when the computer doesn’t respond is: "Her dad thought she should press the Ctrl, Alt, and Delete keys simultaneously and reboot the computer."

Explanation:

(b) The CPU is responsible for processing instructions.
One stage of processing instructions is the decode stage.
(i) Identify the two other stages of processing instructions.​

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The CPU is responsible for processing instruction. CPU instruction processing goes through three stages. Fetch, Decode, and Execute.

When the program runs,  program code is copied from secondary storage into main memory. CPU's program counter set to the first instruction of the program stored in memory where the program starts executing.

When a program is being executed, it goes through fetch-decode-cycle. which repeats over and over again until reaching the STOP instruction.

The processor check which next instruction to be executed, then the processor fetches that instruction value from the memory location.  once the instruction being fetched it gets decoded and executed. This instruction processing cycle repeating until the CPU finds a stop instruction.

Answer:

Fetch, Decode, and Execute

Explanation:

What happens when a user clicks the question mark at the top of the Backstage view?
O It shifts the view to the main window.
It makes the Tell Me text box appear.
O It opens the PowerPoint Help interface.
O It opens the Microsoft Help website online.

Answers

Answer:

D

Explanation:

Access to recent opened files, information about the permissions, sharing, and versions of the open file, the ability to create a new file, and printing are all available from the backstage view. Along with other details (properties), the Backstage View offers the following about the file. .file size Thus, option D is correct.

What question mark at the top of the Backstage view?

You may save, open, print, and share your presentations in a number of ways using the backstage view. Click the File tab on the Ribbon to see Backstage view. When you select the Info option in the Backstage View, additional details about the file are also made available, including the following.

The Microsoft Office Backstage view appears when a Microsoft Office program is launched or when you click the File tab. Backstage is where you should go if you need to make a new file, open an existing file, print, save, change options, or do anything else.

Therefore, It opens the Microsoft Help website online.

Learn more about Backstage view here:

https://brainly.com/question/27362542

#SPJ2

When the economy is doing badly, which of the following workers is NOT likely to have fewer customers or patients who want their services?

Answers

A nurse is someone who has completed a basic, generic nursing education program and is qualified to either operate patients or assist doctors during operations.

What tasks does a nurse perform?

In addition to providing patient care, nurses also communicate with doctors, manage medications, and analyse vital signs. Nurses play a crucial role in healthcare institutions and have a significant variety of career options, making them the largest healthcare occupation in the United States.

What is the Indian economy's issue?

Poverty Issues Poverty is a problem for the Indian economy as well. This creates a vicious cycle because a sizable segment of the population is unable to engage in the economy.

To know more about program visit:-

https://brainly.com/question/14618533

#SPJ1

A manager rents a unit to a tenant who later has a car accident and is confined to a wheelchair. the tenant now wants the manager to lower all the light switches and install grab bars. does the manager have to make these modifications?

Answers

Yes, since it is the landlord's responsibility to keep the apartments in livable condition.

What is meant by the term "real estate"?

The term "real estate" refers to property in the form of land and buildings. It will remain illegal to acquire foreign real estate for non-business purposes, such as purchasing rental properties. As a result of the law, more land is intended to be productively used for housing. The term "real estate" refers to property in the form of land and buildings.

How do things work in real estate?

Real estate is made up of land and improvements like roads, buildings, fixtures, and utility systems. Property rights confer ownership of the land, improvements, and natural resources, such as water, wildlife, plants, and any additional mineral deposits.

To know more about real estate visit:-

brainly.com/question/10336196

#SPJ4

Budgeting for a Computer
You can save up money to pay for the computer later, or
you can use a credit card to pay for it now.
Which option will you choose, and why? Write your
answer using at least two sentences.



Answer is pay for the computer later

Answers

Answer:

Use a credit card to pay for it now.

Explanation:

The computer will help you cut on cost which you incur when having other people do for you simple c computing jobs. For example, typing, editing and proofreading documents. Additionally, it is possible to do some online tasks and get paid. So you'll save much more than you'll spend when having other people do for you the computing jobs or assignments

This is C programming.
- Vehicle Plate Generator​
A vehicle plate number consists of three uppercase letters followed by four digits. Write a program to generate a plate number. Use random generator to generate each digit. Store the digits in a char array. Generate ten plate numbers.​

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

#include <time.h>

int main() {

   // Seed the random number generator

   srand(time(NULL));

   // Loop to generate 10 plates

   for (int i = 1; i <= 10; i++) {

       // Generate three random uppercase letters

       char letters[4];

       for (int j = 0; j < 3; j++) {

           letters[j] = rand() % 26 + 'A';

       }

       letters[3] = '\0'; // Add null terminator

       // Generate four random digits

       char digits[5];

       for (int j = 0; j < 4; j++) {

           digits[j] = rand() % 10 + '0';

       }

       digits[4] = '\0'; // Add null terminator

       // Print the plate number

       printf("%d: %s%s\n", i, letters, digits);

   }

   return 0;

}

Explanation:

This program uses the rand() function to generate random numbers and the time() function to seed the random number generator. It then loops ten times to generate ten plates. For each plate, it generates three random uppercase letters and four random digits using a loop and the rand() function. Finally, it prints the plate number using the printf() function.

꧁༒αηѕωєяє∂ ву gσ∂кєу༒꧂

Gina is using Outlook in the default cached mode and is connected to an Exchange server. What is the default file type used to store a cached version of Gina’s mailbox?

PST
OST
MSG
XML

Answers

Answer:

Its C. MSG

Explanation:

On edg

Answer:

c

Explanation:

took the test

How would you explain how a password generator program works

Answers

Answer:

A random password generator is a software program or hardware device that takes input from a random or pseudo-random number generator and automatically generates a password. Random passwords can be generated manually, using simple sources of randomness such as dice or coins, or they can be generated using a computer.

which web driven technology allows agents or specialists to approach customers while they are online and offer assistance

Answers

The web-driven technology that allows agents or specialists to approach customers while they are online and offer assistance is called live chat.

Live chat is a web-based communication tool that allows users to engage in real-time text-based conversations with customer service representatives or agents. Live chat enables businesses to interact with customers directly on their websites, providing an efficient and effective way to offer support and assistance to customers.

With live chat, agents or specialists can approach customers while they are online and offer assistance by initiating a chat session with them. This allows agents to address customer questions, concerns, and issues quickly and efficiently, leading to higher levels of customer satisfaction and loyalty.

Live chat has become an increasingly popular customer support tool in recent years, with many businesses incorporating it into their websites and mobile apps. It offers several benefits over traditional support channels such as phone and email, including faster response times, more personalized support, and the ability to handle multiple customer inquiries simultaneously.

Overall, live chat is an effective web-driven technology that enables businesses to provide superior customer support, build stronger customer relationships, and improve overall customer satisfaction.

Learn more about technology here:

https://brainly.com/question/28288301

#SPJ11

an obstacle or barrier that may prevent you from accomplishing your goal is called

Answers

Answer:

a roadblock

Explanation:

A roadblock because it is

Which access control method is defined primarily at the user or subject level?A.Role-based access control (RBAC) [x]B.Mandatory access control (MAC)C.Rule-based access control (RuBAC)D.Discretionary access control (DAC)

Answers

The access control method primarily defined at the user or subject level is Role-based access control (RBAC). RBAC assigns permissions to users based on their roles or responsibilities within an organization.

RBAC is a widely used access control method that focuses on defining and managing user access based on their roles. In RBAC, users are assigned specific roles that are associated with a set of permissions. These roles are defined based on the user's responsibilities, job functions, or positions within an organization. Users inherit the permissions associated with their assigned roles, which simplifies access control management and reduces administrative overhead. This method provides a more structured and scalable approach to access control, allowing organizations to easily manage user privileges based on their roles and ensuring that users have appropriate access to resources.

Learn more about RBAC here:

https://brainly.com/question/15409417

#SPJ11

What is the purpose of hatch marks on ruler

Answers

The term "hatch mark" is used to describe a mark on a ruler. Hash markings are another name for hatch marks. Hatch marks are used to indicate the lengths of a straight line on a ruler and to alert you to each unit's movement.

What is the concept of hatching?

On a ruler, not every hatch mark seems the same since some are longer and some are shorter. The longest measurement on the inch ruler indicates a line segment that is one inch long. Half-inch measurements are the next longest. Depending on the ruler, the shortest lines are marked with 1/8-inch or 1/16-inch measurements. On a 12-inch ruler, the hatch marks corresponding to each inch are numbered from 1 to 12. Due to space limitations, the shorter lines are not numbered.

• On a ruler, not every hatch mark seems the same since some are longer and some are shorter.

• Depending on the ruler, the shortest lines are marked with 1/8-inch or 1/16-inch measurements.

To know more about Hatching, Check out:

https://brainly.com/question/8589816

#SPJ1

.

convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
pls in step by step
pls help me bro

Answers

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

A computer database uses a binary sequence of 5 bits to represent unique user ids. To increase the number of unique ids that the database is able to represent, the database administrator increases the number of bits in a user id to 8 bits. How many times more unique user ids can be represented with the new system?

Answers

2^56 times more unique user ID's can be represented in the system.

For User ID entries, 5 bits will result in a maximum data allocation of 2^10.

The maximum amount of data that can be allocated for User ID entries using 12 bits is 2^66.

The additional unique user IDs that will be represented are therefore 2^(66-10) = 2^56 times.

A single entity within a given system is identified by a string of numbers or letters called a unique identifier (UID). UIDs enable addressing of that entity, enabling access to and interaction with it.

A 128-bit number called a universally unique identifier (UUID) is used to identify data in computer systems. A UUID can be made and used to identify something specifically.

Learn more about systems:

https://brainly.com/question/25594630

#SPJ4

cloud kicks intends to protect data with backups by using the data export service. which two considerations should the administrator remember when scheduling the export? choose 2 answers

Answers

Cloud kicks intends to protect data with backups by using data export service in which Data backups are limited to weekly or monthly intervals.

Metadata backups must be run via a separate process.

Option A and B are correct.

What are the features of cloud backup?

A cloud backup service involves backing up and storing a company's applications and data on a remote server. In the event of a system failure, outage, or natural disaster, businesses choose to backup their data to the cloud.

What does "data backup" entail?

The process of creating a backup copy of your digital data and other business information in the event that it is lost, deleted, or damaged is known as data backup. The reinforcement duplicate is then used to recuperate or reestablish your information for business congruity and catastrophe recuperation.

Incomplete question :

Cloud Kicks intends to protect data with backups by using the data export service. Which two considerations should the administrator remember when scheduling the export? Choose 2 answers.

A. Data backups are limited to weekly or monthly intervals.

B. Metadata backups must be run via a separate process.

C. Metadata backups are limited to sandbox refresh intervals.

D. Data export service should be run from a sandbox.

Learn more about cloud kicks :

brainly.com/question/29240780

#SPJ1

can someone help me with this trace table - its computer science

can someone help me with this trace table - its computer science

Answers

TThe while loop keeps going until count is greater than or equal to 10.

count = 0, sum = 0

count = 2, sum =2

count = 4, sum = 6

count = 6, sum = 12

count = 8, sum = 20

count = 10, sum = 30

Now that count is equal to 10, it exits the while loop and the program ends. The values above complete your trace table.

the beepers in atm machines that warn you if you forget to remove your card are an example of a:

Answers

The beepers in ATM machines that warn you if you forget to remove your card are an example of a feedback mechanism.

The beepers in ATM machines that warn you if you forget to remove your card are an example of an auditory user interface. An auditory user interface (AUI) is a type of interface that uses sound as the primary means of communication between the user and the system.

In the case of the ATM machine, the beeper serves as an auditory feedback mechanism that alerts the user when they have left their card behind, which can help prevent the card from being lost, stolen, or misused.

This is just one example of how sound can be used to enhance the usability and safety of a system. Other examples of auditory user interfaces include voice assistants, audio cues in video games, and text-to-speech software for people with visual impairments.

Learn more about visual impairments here:

https://brainly.com/question/30245681

#SPJ11

The beepers in ATM machines that warn you if you forget to remove your card are an example of an alert system.

Alert systems are designed to notify individuals of potential problems or dangers that require attention. In the case of ATM machines, the alert system is designed to prevent individuals from leaving their debit or credit cards behind after completing a transaction.The alert system in ATM machines works by using sensors to detect when a card has been inserted and removed from the machine. If the card is not removed within a certain period of time, the alert system is triggered, and a beeping sound is emitted from the machine to alert the individual that their card is still inside. The alert system in ATM machines not only helps prevent individuals from losing their debit or credit cards, but it also helps prevent fraudulent activity. If a card is left in the machine, it can be accessed by someone else who may use it for unauthorized transactions. The alert system in ATM machines is an important feature that helps prevent card loss and fraudulent activity. It is a simple yet effective way to ensure that individuals are reminded to retrieve their cards after using an ATM machine.

For such more questions on ATM machine

https://brainly.com/question/29215864

#SPJ11

Which of the following commands is used to find a specific file on a Linux system?
(Select TWO. Each answer represents an independent solution.)
a) find. b) search. c) locate. d) throw

Answers

The two commands used to find a specific file on a Linux system are "a.find" and "c.locate".

The two commands "find" and "locate" are used to find a specific file on a Linux system. Here's a brief explanation of each command:

1."find" command:

The "find" command is a powerful and versatile tool for searching for files and directories on a Linux system. It allows you to search for files by name, size, type, or modification date, among other parameters. The basic syntax of the "find" command is as follows:

2."locate" command:

The "locate" command is a simpler and faster way to find files on a Linux system. It uses a pre-built index of file names and locations to quickly find files that match a search pattern. The basic syntax of the "locate" command is as follows:

Learn more about Linux system: https://brainly.com/question/12853667

#SPJ11

Draw the recursion tree for T(n) = 4T(⌊n/2⌋)+cn, where c is a constant, and provide a tight asymptotic bound on its solution. Verify the bound by the substitution method. You need to show the detailed process how the results are obtained?

Answers

The tight asymptotic bound for T(n) = 4T(⌊n/2⌋) + cn is Θ(n²), and it can be verified using the substitution method.

To draw the recursion tree for T(n) = 4T(⌊n/2⌋) + cn, we can start by first writing out the recursive calls for the first few levels:

Level 0: T(n)

Level 1: 4T(⌊n/2⌋)

Level 2: 16T(⌊n/4⌋)

Level 3: 64T(⌊n/8⌋)....

Level i: \(4^i\)T(⌊\(n/2^i\)⌋)

We can see that the recursion tree will have log(n) levels, since we are repeatedly dividing n by 2. At each level i, we have \(4^i\) subproblems, each with size ⌊\(n/2^i\)⌋. Therefore, the total work at level i is:

\(4^i\) * c⌊\(n/2^i\)⌋

Summing up the total work at all levels, we get:

T(n) = cn + 4c⌊n/2⌋ + \(4^{2c}\)*⌊n/4⌋ + ... + \(4^{(log(n))}c\)*⌊n/\(2^{(log(n))}\)⌋

Using the fact that ⌊n/2^i⌋ = Θ(n/2^i), we can simplify the above equation as:

T(n) = cn + 2cn + 4c*n + ... + \(n^c\)

= Θ(nlog(n))

To verify this bound using the substitution method, we assume that T(k) ≤ cklog(k) for all k < n. Then we can write:

T(n) = 4T(⌊n/2⌋) + cn

≤ 4c(⌊n/2⌋log(⌊n/2⌋)) + cn

≤ cnlog(n) + 2cn

= Θ(nlog(n))

Therefore, the tight asymptotic bound for T(n) is Θ(nlog(n)).

Learn more about recursion here:

https://brainly.com/question/20749341

#SPJ4

which mmc is added after active directory installation? (choose all that apply.) active directory domains and trusts active directory groups and sites adsi edit active directory restoration utility

Answers

The correct option is Active Directory Domains and Trusts. The other MMCs mentioned in the options are not added automatically after Active Directory installation, but they can be installed and used separately for specific tasks.

The Active Directory Domain Services (AD DS) MMC (Microsoft Management Console) is added after Active Directory installation. This MMC allows administrators to manage the domain controllers, users, groups, computers, and other resources in an Active Directory domain. The specific tasks for which the MMCs are used are:

Active Directory Sites and Services: This MMC is used to manage the replication topology and site links between domain controllers in an Active Directory forest.

ADSI Edit: This MMC is used to manage the low-level attributes of Active Directory objects, and it is typically used by advanced administrators.

Active Directory Restoration Utility: This is not an MMC, but a command-line tool that can be used to restore an Active Directory database from backup in case of a disaster or data loss.

To know more about active directory; https://brainly.com/question/28900362

#SPJ11

The item in this illustration that is highlighted is the _____. resize handle status bar zoom control home command

Answers

Answer: resize handle

edge is garbo

4. Write technical term for the following statements
A) The computers designed to handle specific single tasks.
B) The networked computers dedicated to the users for professional wrok.
C) The computers that uses microprocessor as their CPU.
D) A computer that users analog and digital device.
E) The computer that processes discontinuous data.
F) The portable computer which can be used keeping in laps.
G) The general purpose computers used keeping on desk. ​

Answers

Answer:

a) Special-purpose computer

b)

c)microcomputers

d) hybrid computer

e) digital computer

f) laptop computers

g) desktop computers.

Please mark me as brainlist :)

ATM machines respond to request in__________​

Answers

Answer:

Atm machine respond to request in atm card

ATM machines respond to requests in ATM card.

What is an ATM Machine?

ATM simply known as Automated Teller Machine is an electronic machine used by financial institutions to perform financial transactions. It is an automated banking operation which does not require the effort of man.

ATM card is a payment card that is issued by a financial institution which enables a customer to access their financial accounts through the automated teller machine (ATM) and other point of purchase transactions.

Hence, the ATM card gives commands to the ATM machine.

Read more on atm machine:

https://brainly.com/question/24471380

#SPJ2

What happens to a message when it is deleted? It goes to a deleted items area. It goes to a restored items area. It is removed permanently. It is archived with older messages.

Answers

Answer:

it goes to a deleted items area

Explanation:

just answered it and got it right :)

Computers store all characters as numbers stored as binary data. Each instruction or symbol gets a bit string assignment. The strings can correspond to instructions, letters, or symbols. In computing, these codes are used for encoding data. What digits are used for writing and sending binary code?

Answers

Binary code is written and sent using only two digits, which are represented as 0 and 1.

Binary code is a system of representing data using only two digits, which are also known as bits. Each digit in binary code can be either a 0 or a 1, and these digits are used to represent different values depending on their position within the code. For example, an 8-bit binary code can represent values from 0 to 255, where each position within the code corresponds to a different power of 2.

Computers use binary code to store and process data because it is a simple and efficient way to represent information using electronic circuits. By using just two digits to represent all data, computers can perform calculations and operations quickly and accurately. When data is sent over a network, it is also typically encoded as binary code, with the 0 and 1 digits used to represent the different bits of the data.

To learn more about Binary code

https://brainly.com/question/9480337

#SPJ11

2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

Answers

Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

What is company's website?

The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.

Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.

Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

Learn more about website here:

https://brainly.com/question/19459381

#SPJ2

can you describe the difference between progressive enhancement and graceful degradation?

Answers

Progressive enhancement and graceful degradation are two approaches used in web design and development to ensure optimal user experience across different devices and browser capabilities.

Here's a description of each approach: Progressive Enhancement: Progressive enhancement starts with a basic, core version of a website or web application that focuses on delivering content and functionality to the widest range of devices and browsers. The core version is built using widely supported technologies and features. Additional layers of enhancements are then added on top of the core version to take advantage of more advanced features and capabilities of modern devices and browsers.

These enhancements are applied selectively based on the capabilities of the user's device or browser. Progressive enhancement ensures that all users can access and interact with the basic version, while users with more capable devices or browsers can enjoy enhanced features and experiences.

Graceful Degradation: Graceful degradation takes the opposite approach. It starts with a fully featured version of a website or web application that is built using the latest technologies and features. The website is designed and developed to work optimally on modern devices and browsers. However, in the case of older or less capable devices or browsers, some features may not be supported or may not work as intended.

Graceful degradation involves designing the website in such a way that it gracefully degrades its functionality and user experience for those devices or browsers. This ensures that users with older or less capable devices can still access and use the website, even if they don't have access to all the advanced features.

In summary, progressive enhancement starts with a basic version and enhances it based on capabilities, while graceful degradation starts with a fully-featured version and gracefully degrades for devices with limited capabilities. Both approaches aim to provide an inclusive user experience across a wide range of devices and browsers.

Learn more about development here

https://brainly.com/question/17107821

#SPJ11

Which of the following is NOT a career in the Information Support and Services pathway?

a
Website engineers
b
Technical writers and editors
c
Database administrators
d
Software developers

Answers

Answer:

here yuuuurrrrr Vote for me nah jk

Which of the following is NOT a career in the Information Support and Services pathway? aWebsite engineers

construct a pda for the language l = {ab(ab)nba(ba)n : n ≥ 0}.

Answers

The PDA starts by pushing 'a' onto the stack for each 'a' encountered in the input.

A Pushdown Automaton (PDA) for the language L = {ab(ab)nba(ba)n : n ≥ 0} can be constructed as follows:

PDA Description:

1. The initial state is q0 and the stack is initially empty.

2. Read an 'a' from the input and push it onto the stack.

3. Read a 'b' from the input and pop the 'a' from the stack.

4. Repeat steps 2 and 3 for any number of times (n) until reaching the end of the input.

5. After reaching the end of the input, read a 'b' from the input and push it onto the stack.

6. Read an 'a' from the input and pop the 'b' from the stack.

7. Repeat steps 5 and 6 for any number of times (n) until reaching the end of the input.

8. If the input is fully consumed and the stack is empty, accept the input. Otherwise, reject it.

Then, it pops the 'a' from the stack for each 'b' encountered in the input until reaching the end of the input. This process ensures that the substring "ab" is matched.

After reaching the end of the input, the PDA reads 'b' and pushes it onto the stack. Then, it reads 'a' and pops the 'b' from the stack for each 'a' encountered in the input until reaching the end. This process ensures that the substring "ba" is matched.

Finally, if the PDA reaches the end of the input and the stack is empty, it means that the input string follows the required pattern. Otherwise, if the stack is not empty or the input is not fully consumed, the input is rejected.

Therefore, the constructed PDA recognizes the language L = {ab(ab)nba(ba)n : n ≥ 0}.

To learn more about Pushdown Automaton click here

brainly.com/question/15554360

#SPJ11

Other Questions
The domain of the function f(x) is the set of integers greater than -5. Which of the following values represent elements of the range of f? Answer choices below. the Adventure of tom sawyer I have a (pain) stomach. Q/Write the noun in the correct form of adverb or adjective suppose you bought a stock today at $20. this stock is expected to pay a dividend of $2 in one year from now, and dividends are expected to grow at an annual rate of 5% thereafter. what should the cost of equity be? Find the missing factor AAA that makes the equality true. 8x^3=(-2x)(A)8x 3 =(2x)(A)8, x, cubed, equals, left parenthesis, minus, 2, x, right parenthesis, left parenthesis, A, right parenthesis A =A=A, equals How many grams means 1 pound? You decide to provide yourself with a retirement account by depositing X into an account at the beginning of every 2 years for the next 40 years. Two year after your final deposit, you want to purchase, with your accumulated funds, a 25-year annuityimmediate that pays $25,000 every six months. Assume that the effective annual rate of interest is 7% for the first 40 years, and 5% thereafter. Find X, the amount of your annual deposit necessary to achieve your retirement annuity purchase. Answer=a) b) c) =6460 d)= 47,641a) compute the both annuities with interest conversion methodb) compute the both annuities with fission method.c) compute both annuities with the general formulad) compute the PV of the 25 year annuity at time 0. can someone please help for brainlest $1,000 invested today at 10% compounded annually will grow to $1,210 at the end of two years. What is the $1,210 value referred to as Question 4 of 15Paul was alone in the house. The night sky was darkening. He heard ascary noise. The phone rang. He jumped.Which answer option best revises the passage by using a variety of sentencestructures?A. Paul was alone in the house, the night sky was darkening, he hearda scary noise, and the phone rang, and he jumped.B. Paul was alone in the house, and the night sky was darkening, thenhe heard a scary noise, and the phone rang, and he jumped.C. Paul was alone in the house, and the night sky was darkening. Ashe heard a scary noise, the phone rang. He jumped.D. Paul was alone. In the house. The night sky was darkening. Ascary noise. The phone rang. He jumped. The inequalities h>42 and h Write an equation for the graph. An object has a mass of 10.2 kg, what is its weight in Newton's? ENLGISH HELP!!! AGAIN!!! MARKING BRAILIEST!! Hurry help Greg plants a seed and as soon as the plant sprouts, he measures its height each day and records his data for two weeks. If the plant continues to grow the whole two weeks, what would a line graph of Greg's data look like?It would be flat.It would move downward.It would go up and down.It would move upward. Translate the following sentences into French18. It measures 2.5 meters by 5 meters.19.. Please sit down.20. Make yourself at home. If a bug is traveling 5 meters across the floor in 5 seconds. How fast did ittravel? I need this answer ASAP I will for real pay you just please help me out The water level in Colorado river is 2.55 m below average. a large rainfall caused The water level to rise 0.8 m. what is the water level after the rainfall? What is prior restraint of speech?. when mary believes that it is ethical to use a hiring method that is illegal in the u.s. in another country in which it is legal to use, she is probably applying which ethical approach?