Answer the following:
a) In a microcontroller, R/W memory is assigned the address range from 2000H to 21FFH; calculate the size of R/Wa) memory.
b) Calculate the Hex equivalent of the decimal number 138 and show its binary representation in an 8-bit processor.
c) What is the size and function of FSR register? Explain the significance of its size.
d) What is the function of an address bus?

Answers

Answer 1

a)  the size of  memory is 512 bytes. b) the binary representation of 138 in an 8-bit processor is 10001010. c)the FSR register is 8 bits, it can address up to 256 file registers. If the FSR register is larger, it can address more file registers.d) The address bus is typically unidirectional, meaning that it only carries address information from the processor or controller to memory or other devices.

a) The address range from 2000H to 21FFH represents 512 bytes of memory.

This can be calculated as follows:

21FFH - 2000H + 1 = 200H (in hex)

200H = 512 (in decimal)

Therefore, the size of R/W memory is 512 bytes.

b) The hex equivalent of the decimal number 138 is 8A.

To show its binary representation in an 8-bit processor, we can convert 138 to binary using the repeated division-by-2 method:

138 / 2 = 69 remainder 0

69 / 2 = 34 remainder 1

34 / 2 = 17 remainder 0

17 / 2 = 8 remainder 1

8 / 2 = 4 remainder 0

4 / 2 = 2 remainder 0

2 / 2 = 1 remainder 0

1 / 2 = 0 remainder 1

So the binary representation of 138 in an 8-bit processor is 10001010.

c) The FSR (File Select Register) is a special-purpose register in some microcontrollers that is used to select a file register for data transfer. The size of the FSR register varies depending on the specific microcontroller, but it is typically 8 bits or more.

The significance of the size of the FSR register is that it determines the maximum number of file registers that can be addressed by the microcontroller. For example, if the FSR register is 8 bits, it can address up to 256 file registers. If the FSR register is larger, it can address more file registers.

d) The address bus is a bus in a computer or microcontroller that is used to transfer memory addresses between different components. Its function is to provide the memory address to identify the location in memory where data is to be read from or written to. When a processor or controller wants to read or write data, it sends the address of the desired memory location on the address bus. The address bus is typically unidirectional, meaning that it only carries address information from the processor or controller to memory or other devices.

Learn more about memory here:

https://brainly.com/question/31788904

#SPJ11


Related Questions

Your parents tell you to wear earplugs when you
go see your favorite band in concert. The earplugs
are rated to reduce sound by 40 dB. What will the
earplugs do if you wear them?
cause the band to sound distorted due to
aliasing
o decrease the loudness of the band
decrease the frequency of the band
cause the band to sound clearer due to
oversampling

Answers

Answer:

The answer is B

Explanation:

B. Decrease the loudness of the band

When a class implements in interface, it must ________ Group of answer choices overload all of the methods listed in the interface provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified not have a constructor be an abstract class

Answers

Answer:

provide all of the nondefault methods that are listed in the interface, with the exact signatures and return types specified

Explanation:

I am assuming the programming language is Java. Actually, none of the answers are 100% correct, but this one is the only one that is partially correct. The reason is the class implementing an interface can be abstract, and in this case it may not provide ALL nondefault methods.

Complete the body of the format_name function. This function receives the first_name and last_name parameters and then returns a properly formatted string. Specifically: If both the last_name and the first_name parameters are supplied, the function should return like so:

Answers

Answer:

Here is the Python program:

def format_name(first_name, last_name):  #function definition of format_name that takes first_name and last_name as parameters

   if first_name != '' and last_name != '':  #checks if first_name and last_name both are not equal to " "

       return ("Name: " + last_name + ", " + first_name)  #returns first name and last_name in format: "Name: last_name, first_name"

   elif first_name != '' or last_name != '':  #checks if either of the first_name or last_name is not equal to " "

       return ("Name: " + last_name + first_name)  #returns first name and last_name in format: "Name: last_name" or "Name: first_name"

   else:  #if both names are blank

       return ''  #return ""

 

Explanation:

The working of the above function can be checked by using the following statements:

print(format_name("Ernest", "Hemingway"))  

print(format_name("Voltaire", ""))  

print(format_name("", "Madonna"))  

print(format_name("", ""))

The program has a function format_name which takes two strings i.e. the first_name and last_name as parameters and returns the formatted string.

The first if condition checks if both the first_name and last_name are blank. For example if first_name = "Ernest" and last_name= "Hemingway" this means both the first_name and last_name are not blank or empty. So If this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + ", " + first_name)

This returns the last_name string first followed by a comma in between and then first_name string in the last. For the above example the string is printed in the following format:

Name: Hemingway, Ernest    

The elif condition checks if either of the first_name or last_name is blank. For example if first_name = "Voltaire" and last_name= "" this means last_name is blank or empty. So if this condition evaluates to true then the following statement is returned:

return ("Name: " + last_name + first_name)  

This returns the last_name string. For the above example the string is printed in the following format:

Name: Voltaire          

IF none of the above condition is true and both the first_name and last_name are blank then the following statement is returned

return ''  

This will just print and blank space in output.

The program and its output is attached.            

Complete the body of the format_name function. This function receives the first_name and last_name parameters

can rank u r guys in rocket leagye

Answers

Ha ha ha ha ha ha ha ha

How to fix "files required to play gta online could not be downloaded"?

Answers

The way to fix "files required to play GTA online could not be downloaded" are given below.

What is the GTA Gaming  about?

Here are a few steps that you can try to fix the "files required to play GTA Online could not be downloaded" error:

Check your internet connection: Make sure that you have a stable internet connection and that you are not experiencing any connectivity issues.Restart the game: Close the game, and then reopen it to see if the error persists.Clear the game's cache: Go to the in-game settings and clear the game's cache. This can help to resolve any issues with corrupted or outdated files.Verify the game files: Use the game's built-in file verification feature to ensure that all of the game files are present and not corrupted.Update the game: Make sure that you are running the latest version of the game, and that all updates have been installed.Reinstall the game: If none of the above steps work, you may need to uninstall and reinstall the game.

Contact Rockstar Games Support: If you still have the issue, you can contact the Rockstar Games support team for further assistance. They may have a solution or a fix for the problem.

Therefore, it is vital to note that some of these steps may require a certain level of technical knowledge and experience. It's also important to keep in mind that the issue may not be related to the game or the user's device, but rather with the Rockstar Games

Learn more about Gaming from

https://brainly.com/question/28031867

#SPJ1



What spreadsheet tool could be used to add together the numbers in a
selected group of cells?

Answers

Answer:

=SUM(range)

example:

=SUM(A3:A9)

Explanation:

- range refers to a selected group of cells

- SUM is a function (predefined formula) for adding up cells or range

help plz

1. Write a function to return the larger of two numbers entered from two user inputted values, where the user inputs are entered after the displays of “First Entry =” and “Second Entry = ”. The numbers should be decimal values (not just integers).



2. Write a function to return the word that is first alphabetically from two user inputted text entries, where the user inputs that text by entering their own words after the displays of “First Entry =“ and “Second Entry =“. Remember that you can use the operators with strings. (You can assume that the user only inputs lower case words.)

Answers

1.

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

   return max(num1, num2)

print(func(first, second))

2.

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

   return sorted([word1,word2])[0]

print(func(first, second))

I hope this helps!

In this exercise we have to use the knowledge of computational language in python to write the following code:

The code can be found in the attached image.

That way, to find it more easily we have the code like:

First code:

first = float(input("First Entry = "))

second = float(input("Second Entry = "))

def func(num1, num2):

  return max(num1, num2)

print(func(first, second))

Second code:

first = input("First Entry = ")

second = input("Second Entry = ")

def func(word1, word2):

  return sorted([word1,word2])[0]

print(func(first, second))

See more about python at brainly.com/question/26104476

help plz1. Write a function to return the larger of two numbers entered from two user inputted values,
help plz1. Write a function to return the larger of two numbers entered from two user inputted values,

instructions a milk carton can hold 3.78 liters of milk. each morning, a dairy farm ships cartons of milk to a local grocery store. the cost of producing one liter of milk is $0.38, and the profit of each carton of milk is $0.27. write a program that prompts the user to enter: the total amount of milk produced in the morning. the program then outputs: the number of milk cartons needed to hold milk. round your answer to the nearest integer. the cost of producing milk. the profit for producing milk.

Answers

If you want the user to enter a value, you use a prompt box. The user will have to either "OK" or "Cancel" in order to continue after a prompt box appears.

What exactly does a programming prompt mean?

A text-based operating system (OS) or program's command prompt is its input area. The question aims to compel a response. A short text string and a blinking cursor make up the command prompt, where the user writes commands.

According to the given information:

public static void main(String[] args) {

   Scanner scanner = new Scanner(System.in);

   System.out.println("Enter total amount of milk: ");

   double totalAmountOfMilk = Double.parseDouble(scanner.nextLine());

   System.out.println("The number of milk cartons needed to hold milk:");

   int numberOfMilkCartoons = (int) (totalAmountOfMilk / 3.78);

   System.out.println(numberOfMilkCartoons);

   System.out.println("The cost of producing one liter of milk:");

   double cost Of Producing One Liter Of Milk = totalAmountOfMilk * 0.38;

   System.out.println(costOfProducingOneLiterOfMilk);

   System.out.println("The output of the profit for producing milk:");

   double profitForProducingMilk = numberOfMilkCartoons * 0.27;

   System.out.println(profitForProducingMilk);

}

To know more command prompt visit:

https://brainly.com/question/2555135

#SPJ4

In a paragraph of 125 words, identify one value you are looking for in an employer and explain why it is important to you. For instance, is it important to you that your employer support a leave of absence for the purpose of humanitarian efforts such as those that resulted from the 2010 earthquake and hurricane in Haiti? Please answer fast

Answers

Answer:

An important value I have for an employer is empathy mostly due to my experience with employers. In previous employers they are very not understanding of anyone’s situation regardless of what it is, they don't care about what's going on in your life all they care is that you work. They don’t want to give you the time off, they don’t care about your concerns, they just overall do not care. Some employers are just kind of like that, and that's okay. Not every employer is going to be a perfect fit for me. Overall if I could have an employer that is understanding and isn't going to fire me or scream at me the second I make even the slightest mistake was and is always the dream.

Answer:

I think it’s an important value for employer to have empathy. employers are not always very understanding of other peoples situation/homelife, they don't care about what's going on in your life all they care is that you work for them.They don’t want to give you the time off or money, they don’t normally care about your concerns. Some employers can be rude but that there job to find the best employeesthat's Not every employer is going to be a perfect fit.Overall having an employer that is somewhat understanding and isn't going to fire me for a little mistake or yell at me If I don’t do something the exact way they wanted it to be. In the end we all make mistake human and hopefully the employer gives you the benefit of the doubt

Explanation:

6. As explained in our classes the Dark Web is: A safe online place to access. Not a safe online place to access. Is not real. O Does not exist online.

Answers

The Dark Web is not a safe online place to access. It refers to a part of the internet that is intentionally hidden and inaccessible

How can this be explained?

It pertains to a section of the web deliberately concealed and not readily available via regular search engines. Notorious for facilitating unlawful transactions, including the illegal trade of narcotics, firearms, pilfered information, and other illicit offerings.

The Dark Web's ability to shield identities allures wrongdoers and places users in considerable danger. Interacting with the Dark Web may result in legal repercussions, exposure to online dangers, and jeopardizing one's confidentiality and safety.

Read more about the dark web here:

https://brainly.com/question/23308293

#SPJ4

psyc 181 reconstruction of automobile destruction: an example of the interaction between language and memory

Answers

It is true to state that reconstruction of automobile destruction is an example of the interaction between language and memory to recall an event.

How is this so ?

A witness or   victim of an automobile accident is required to submit a statement outlining   what transpired in this case .

As the person tries to recall the events,   they may use language to fill in gaps in their memory, resulting in a reconstructed version that may or may not be totally correct.

Many elements  impact the process of recalling an event, including the individual's own biases, emotions, and the passage of time since the incident  occurred.

Language is   important in the  process since it is the primary tool for people to convey and arrange their memories.

Learn more about language and memory at:

https://brainly.com/question/31445035

#SPJ1

the method of slicing digital messages into​ parcels, transmitting them along different communication​ paths, and reassembling them at their destinations is called​ ________.

Answers

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called packet switching. This process is used in computer networking to efficiently transmit large amounts of data over a network.

Packet switching works by breaking down the message into smaller packets, each with its own header that includes information about the destination and origin addresses, the packet number, and other relevant information. These packets are then sent out on various paths to their destination, with each packet potentially taking a different route. This allows for more efficient use of network resources, as multiple packets can be sent simultaneously on different paths.At the destination, the packets are reassembled into the original message using the information in their headers. This process ensures that the entire message is received intact, even if some packets are lost or delayed along the way.Packet switching is used in a variety of applications, including email, file transfers, and internet browsing. It is an essential component of modern communication networks and has revolutionized the way we share information.

For such more questions on packet switching

https://brainly.com/question/28090820

#SPJ11

Why do you want to be part of the Royal Grenadiers Guards? (3+ sentences)

Answers

Our part. One of the oldest infantry regiments in the British Army is the Grenadier Guards. They are quick and nimble, specializing in Light Role Infantry operations, and they frequently travel by light vehicles like quad bikes. They are equipped to quickly deploy anywhere in the world.

What  part of the Royal Grenadiers Guards?

Grenadier, a soldier chosen and trained specifically to throw grenades. Early grenadiers (from the late 16th century) were not organized into distinct units, but by the middle of the 17th century, they had created specialized battalions.

Therefore, The ceremonial dress of the Swedish Army's Life Guards' grenadier company currently includes a bearskin headgear. Instead of being constructed from actual bearskin, the bearskin is nylon.

Learn more about Grenadiers here:

https://brainly.com/question/10518463

#SPJ1

Which one is the microscope unicellular prokaryotic organisms? i.monera ii.animalia iii.protist iv.fungi

Answers

The answer is iv.fungi.

Question 2 you can use either the rest api or the azure client library to programmatically access a storage account. What is the primary advantage of using the client library?

Answers

When compared to code that uses the REST API, client library code is substantially shorter and easier to write.

What kind of permission should be applied to the Azure storage API?

Identity-based authorization over SMB through AD is supported by Azure Files. Both on-premises machines and Azure virtual machines can host your AD domain service. Using AD credentials from domain-joined machines, whether on-premises or in Azure, SMB access to Files is supported.

The data saved in an Azure storage account can be accessed using which of the following tools?

Blob Storage objects can be accessible through HTTP or HTTPS from any location in the world. Blobs can be accessed by users or client programs using URLs, an Azure Storage client library, an Azure Storage REST API, Azure PowerShell, or an Azure CLI.

to know more about the client library here:

brainly.com/question/14788379

#SPJ1

Dave owns a soda and cookie shop. Match the businesses to the correct competition type

Answers

Answer: Bakery= direct competition

Shaved Ice Truck= Indirect competition

Fast Food Restaurant = Indirect competition

Convenience Store= Direct competition

Explanation: Bakery also makes cookies.

Shaved Ice truck & Fast Food Restaurant don’t make cookies or sell soda pop

Convenience Store sells soda pop and cookies.

Answer:d

Explanation: i just did the test

Ana is a music lover. She loves to download songs and videos on her computer every time she hears a new song. One day, her computers started to malfunction, and all her files were no longer accessible. What do you think happened to Ana’s computer and what can you do to avoid the same problem​

answer pleasssseeee

Answers

Answer:

Storage outage

As many new songs are released to the Internet every day, Anna might have download thousands of them, which made her computer ran out of storage and RAM(random access memory )

which action taken by a teacher best illustrates a benefit digital learning

Answers

Cooperative learning, behaviour management, inquiry based instructions

A program is written to prompt the user and accept input until a negative value is entered. What is the common term for this special value?

Answers

I’m pretty sure it’s while loop

Mention five(5) businesses that needs computer to apperate.

Answers

Answer:

1. Accounting

2. software developing

3. Website designing

4. Online transaction

5. Advertising

You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
A. Your developers will have ready access to the source code.
B. The open-source solution is in the public domain.
C. The code for the open-source solution can be viewed by a community of open-source developers.
D. Maintenance of an open-source solution relies on developers who volunteer to work on the code.

Answers

Answer:

honestly I think the other one is correct

Explanation:

What data type would you use for a decimal number?* ​

Answers

Answer:

numeric

Explanation:

The decimal data type is an exact numeric data type defined by its precision (total number of digits) and scale (number of digits to the right of the decimal point).

I hope this answers your question.

What best describes proprietary file format?
A format that is closed but free of cost.
A format that is owned by a person or group.
A format that is not bound by copyright law.
A format that is open and free of cost.

Answers

Answer:

A format that is closed but free of cost.

Answer:

A

✔ free

format is not bound by copyrights, trademarks, patents, or restrictions.

A

✔ proprietary

format is considered to be intellectual property, which means it is owned by an individual or organization.

An open file format

✔ can be free or proprietary

A closed file format

✔ is unpublished

Explanation:

People in which computer science career design and supervise the manufacture and installation of computer systems? Pls, I have till tomorrow.

a
Programmer

b
Hardware engineer

c
User interface designer

d
Cybersecurity analyst

Answers

the answer to this question is b.

Answer:

A) Programmer

Explanation:

People in which computer science career design and supervise the manufacture and installation of computer

range paramters - for loop
question in picture

range paramters - for loopquestion in picture

Answers

Answer:

start,stop,step_size

Explanation:

Starting at 5 to for loop will count backward by 1 (hence the step_size being -1) until it reaches 0 (stop).

identify one key takeaway you have from looking at the latest identity theft trends.

Answers

As an AI language model, I don't have access to the latest identity theft trends.

However, in general, one key takeaway from identity theft trends is that it is an ongoing and evolving threat that affects individuals and organizations of all sizes and in all industries. It is essential to take proactive steps to protect personal and sensitive information, such as using strong and unique passwords, enabling two-factor authentication, monitoring financial statements and credit reports regularly, and being cautious about sharing personal information online or with unfamiliar individuals or organizations. It is also important to stay up-to-date on the latest trends and best practices for preventing identity theft and responding to it if it does occur.

To learn more about AI language
https://brainly.com/question/25523571
#SPJ11

What are three types of audio editing techniques?
Sound Forge, Audacity, and Pro Tools
burning, copying, and fading
non-destructive, destructive, and constructive
professional, open-source, and free

Answers

Answer:

non-destructive, destructive, and constructive

Explanation:

The three audio editing techniques involve sound forge, audacity, and pro tools. Thus, option A is correct.

What is audio editing?

The audio editing is given as the change in the audio, volume, with the length, speed of the audio or other manipulations.

The audio editing is performed with the use of the software in the computer that enables the generation of the audio data.

The three types of audio editing techniques involves:

Sound Forge: It mediates the edit in the sound files with playback. Audacity: It is a free software that has been used for long with multi-track audio editor and recorder.Pro Tools: It enables the use of the view and edit of the track.

Thus, option A is correct.

Learn more about audio editing, here:

https://brainly.com/question/24228690

#SPJ2









Which of the following is not a type of external data? a) Demographics b) Household c) Socioeconomic d) Promotion History Q8 Does a data warehouse? a) Improve data access b) Slow data access c) Makes

Answers

The answer to the first question is "d) Promotion History" as it is not typically categorized as a type of external data.  Regarding the second question, a data warehouse is designed to improve data access rather than slow it down

External data refers to information that is obtained from sources outside of an organization. It provides valuable insights into external factors that can influence business operations and decision-making. The options provided in the question are all types of external data, except for "d) Promotion History." While demographic data, household data, and socioeconomic data are commonly used to understand consumer behavior, market trends, and target audience characteristics, promotion history typically falls under internal data. Promotion history refers to the records and data related to past promotional activities, campaigns, and strategies employed by the organization itself.

Moving on to the second question, a data warehouse is a centralized repository that is specifically designed to improve data access. It is a large-scale storage system that integrates data from various sources, such as transactional databases, spreadsheets, and external data feeds. The purpose of a data warehouse is to provide a structured and optimized environment for data storage, organization, and retrieval. By consolidating data into a single location, a data warehouse facilitates efficient access to information for analysis, reporting, and decision-making. It eliminates the need to query multiple systems and allows for faster and more streamlined data retrieval and analysis processes. Therefore, the correct answer to the question is "a) Improve data access."

Learn more about external data here : brainly.com/question/32220630

#SPJ11

What are the special features of fifth generation that makes it different from the other generations?​

Answers

Answer:

The answer to this question is given below in this explanation section.

Explanation:

               "features of fifth generation"

The fifth generation computer system was an initiative by japans ministry of international trade and industry,begun in 1982,to create computer using massively parallel computing and logical programming.It was to be the result of massive government industry research project in japan during the 1980.It aimed to create an epoch making computer with supercomputer liked performance and to provide a platform for future development in artificial intelligence.There was also an unrelated Russian project also named as the fifth generation computer.

The term fifth generation was untended to convey the system as being a leap beyound existing machines.In the history of computing hardware,computer using vacuum tubes were called the first generation;transistors and diodes,the second;integrated circuits,the third;and those using microprocessors,the fourth.Whereas previous computer generation had focused on increasing the number of logic elements in a single CPU,the fifth generation,it was instead turn to massive numbers of CPU for added performance.

Jenny is working on a laptop computer and has noticed that the computer is not running very fast. She looks and realizes that the laptop supports 8 GB of RAM and that the computer is only running 4 GB of RAM. Jenny would like to add 4 more GB of RAM. She opens the computer and finds that there is an open slot for RAM. She checks the other module and determines that the module has 204 pins. What module should Jenny order? a. SO-DIMM DDR b. SO-DIMM DDR 2 c. SO-DIMM DDR 3 d. SO-DIMM DDR 4
A friend has asked you to help him find out if his computer is capable of overclocking. How can you direct him? Select all that apply.
a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.
b. Show him how to access BIOS/UEFI setup and browse through the screens.
c. Explain to your friend that overclocking is not a recommended best practice.
d. Show him how to open the computer case, read the brand and model of his motherboard, and then do online research.

Answers

Answer:

1. She Should Order C. SO-DIMM DDR 3

2. a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.

Explanation:

Jenny should order a SO-DIMM DDR3 module.

To determine overclocking capability, access BIOS/UEFI setup and research or check system information.

What is the explantion of the above?

For Jenny's situation  -

Jenny should order a SO-DIMM DDR3 module since she mentioned that the laptop supports 8 GB of RAM and the computer is currently running 4 GB of RAM. DDR3 is the most likely type that would be compatible with a laptop supporting 8 GB of RAM.

For the friend's situation  -

To help the friend determine if his computer is capable of overclocking, the following options can be suggested  -

a. Show him how to find System Summary data in the System Information utility in Windows and then do online research.

b. Show him how to access BIOS/UEFI setup and browse through the screens.

c. Explain to your friend that overclocking is not a recommended best practice.

Option d is not necessary for determining overclocking capability, as the brand and model of the motherboard alone may not provide sufficient information.

Learn more about BIOS at:

https://brainly.com/question/1604274

#SPJ6

Other Questions
(02.04 LC)The term federalism describes (3 points) convincing rivals not to enter a price war, protection from customer pressure to lower prices, and the ability to better withstand cost increases from suppliers characterize which type of competitive strategy? group of answer choices overall low-cost leadership strategy differentiation strategy focus strategy overall high-quality leadership strategy Evaluate: 2(5-1)+4 (7-5) The following transactions are for Pharoah Company.1. On December 3, Pharoah Company sold $536,100 of merchandise to Ivanhoe Co., terms 3/10, n/30. The cost of the merchandise sold was $317,400.2. On December 8, Ivanhoe Co. was granted an allowance of $24,800 for merchandise purchased on December 3.3. On December 13, Pharoah Company received the balance due from Ivanhoe Co.Prepare the journal entries to record these transactions on the books of Pharoah Company. Pharoah Company uses a perpetual inventory system. gabby comes from a culture where life traditionally revolved around the sea and what could be harvested from it. although her culture has changed with the rise of the internet and other technologies, a large percentage of families still own boats and work in industries such as fishing, canning, or shipping. there are also yearly festivals celebrating the start of various fishing seasons. gabby's culture best exemplifies how often affects culture. question 11 options: geography history religion education technology DZs Ltd has a current dividend growth rate of 10% per annum. It is expected that this rate can only be maintained for the next 2 years, from which time it is expected to be 6% per annum and remain at that level indefinitely. The investors required rate of return is 25%. The latest dividend per share was $0.60 and was paid yesterday. What is the value of DZss shares? Considering particles at the subatomic level, carrying out this experiment would help to identify the metals given that: Ca has the Choose. atomic radius. In chemical reactions, it would be Choose. for it to lose its valence electrons to form ions. This means it has comparatively Choose. ionization energies and would react more Choose. with the water Determine whether the given set of numbers can be the measures of the sides of a triangle. If so, classify the triangle as acute, obtuse, or right. Justify your answer. (Lesson 8-2) 8,15,17 what landform covers roughly two thirds of the australian continent HELP ASAP Emma created a table to describe the weather conditions in her area on a specific day. What units of measurement can be used for precipitation with mm or inches being correct?Precipitation Air Temperature25 CSunny 7 mm and 25 kg 24 mph and 5 mm West and 20 mph 10 inches and 50% Shelia works at the ice cream shop and makes $8.00 an hour during the day, and one and a half times that rate in the evening. last week she worked 12 hours during the day and 6 hours at night. how much was her paycheck? $168 $144 s192 $120 a uniformly charged ring of radius 10.0 cm has a total charge of 63.5 ????c. find the electric field on the axis of the ring at the following distances from the center of the ring. (choose the x-axis to point along the axis of the ring.) Which expression is equal to 1/6 ,6x1,1x6,6 divided by 1,1 divided by 6 prothrombin complex concentrate before urgent surgery in patients treated with rivaroxaban and apixaban psychsim A person with attention deficit hyperactivity disorder (ADHD) may have problems with their: oxygen must diffuse through which structure listed below on its way from the alveolus to the hemoglobin of a red blood cell? What is a paragraph? Click the "draw structure" button to launch the drawing utility. Draw the product of the following reduction reaction. According to david garland (1990), ancient societies and primitive social groups often invested the penal process with a(n) ______ meaning. The following statements discuss the relationship between media technologies and society. Which of the following statements is not an example of a "technologically determinist" argument?The invention of television created an obsession with visual culture and caused the decline in the seriousness of rational public discourse.