create a 4x4 array of elements and add the diagonal elements. write an assembly code for the program

Answers

Answer 1

Below is the assembly code for the program to create a 4x4 array of elements and add the diagonal elements.

Coding Part:

.data #variable declaration section

   #matrix of 4x4 size with 1-16 values

   matrix: .word 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16

                 

   sumStr: .asciiz "sum:"

.text #code section

   main: #main program starts from here

   

       li $s0,0 #$s0(sum of diagonal) = 0 

       li $s1,4 #$s1(rows)=4

       li $s2,4 #$s1(column)=4

       la $s3,matrix #$s3 = address of matrix

       li $t0,0 #outer loop counter $t0 =0

       

   forLoop:

       #if $t0(row counter) equal to number of rows($s1) jump to printSum label

       beq $t0,$s1,printSum

       li $t1,0 #column counter $t1=0

       InnerLoop:

           #if column counter $t1 equal to number of columns($s2) jump to endOfInnerLoop label

           beq $t1,$s2,endOfInnerLoop

           beq $t0,$t1,addElement #if row counter equal to column counter jump to add element label

           add $t2,$t0,$t1 #t2 = row counter +column counter

           addi $t2,$t2,1  #$t2 =$t2+1

           beq $t2,$s2,addElement #if $t2 equal to number of columns jump to add Element label

           j skip #jump to skip label

           

       addElement: #addElement label 

           mul $t3,$t0,4 #$t3 = rowCounter*4(4 is word size in bytes)

           mul $t3,$t3,$s1 #t3= $t3*number of rows

           addu $t3,$t3,$s3 #t3 = $t3+base address of matrix

           mul $t4,$t1,4 #$t4 = columnCounter*4(4 is word size in bytes)

           addu $t3,$t3,$t4#t3 = $t3+t4

           #final formula is t5 =  matrix[rowcounter][column counter]= base address+(rowCounter*num. rows)+colucoun

           lw $t5,0($t3)

           add $s0,$s0,$t5 #sum  =sum +$t5

       skip:

           addi $t1,$t1,1 #increment inner loop counter by 1

           j InnerLoop

       

   endOfInnerLoop:

       

       addi $t0,$t0,1 #increment outer loop counter by 1

       

       j forLoop #jump to forLoop label

   printSum:

       #print sum string on console

       la $a0,sumStr #$a0 = address of sumStr

       syscall

       #$a0 = s0 (sum)

       move $a0,$s0 

       li $v0,1 #syscall 1 is used to print an integer.

       syscall

       

       #terminate program

       li $v0,10 #syscall 10 is used to terminate the program

       syscall 

To know more about array of elements, visit: https://brainly.com/question/19634243

#SPJ4


Related Questions

universal containers wants the sales team to access information about closed won opportunities with a common competitor for all pending big deals. which features should the system administrator implement?

Answers

To enable Universal Containers' sales team to access information about closed-won opportunities with a common competitor for all pending big deals, the system administrator should implement the following features:

1. Custom Reports: Create custom reports focusing on closed-won opportunities that include details about the competitors. This will allow the sales team to access valuable insights into the factors that contributed to past successful deals.

2. Dashboards: Design dashboards that display key metrics and trends related to closed-won opportunities with the common competitor. This will provide an easy-to-understand visual representation of the data and help the sales team make informed decisions.

3. Shared Folders: Set up shared folders to store relevant documents and resources, such as competitor profiles and market analyses. This will ensure that the sales team has easy access to the information they need to effectively address pending big deals.

4. Custom Fields: Add custom fields to the opportunity object, capturing essential information about competitors, such as strengths, weaknesses, and potential strategies. This will help the sales team better understand the competitive landscape and tailor their approaches accordingly.

5. Collaboration Tools: Implement collaboration tools, such as Chatter, to facilitate communication among the sales team. This will enable team members to share insights and best practices related to the common competitor, ensuring a coordinated effort in addressing pending big deals.

By implementing these features, the sales team will be well-equipped to access and leverage the necessary information to successfully compete against the common competitor in pending big deals.

Learn more about Dashboards  here:

https://brainly.com/question/31843071

#SPJ11

All dual core or higher processors and all motherboards sold today support what technology capable of enhancing the processor support for virtual machines?

Answers

The hardware-assisted virtualization technology is capable of enhancing the processor support for virtual machines.

What is virtualization with hardware support?

The use of a computer's physical components to support the software that builds and maintains virtual machines is known as hardware-assisted virtualization (VMs). The concept of virtualization has roots in 1960s mainframe system architectures known as "legacy mainframe system designs."

Should I enable hardware-assisted virtualization?

The main advantage is that it is much easier to control a virtual machine than a physical server. Operating systems running on the machine appear to have their own memory and processor. Hardware virtualization can increase the scalability of your business while also reducing expenses at the same time.

What benefit does hardware virtualization offer?

The key advantages of hardware virtualization are better resource management, cheaper costs overall, higher uptime, and IT flexibility.

To know more about virtual machine visit:

https://brainly.com/question/28901685

#SPJ4

which word means the pattern of beats in a poem a personification b simile c rhythm d onomatopoeia

Answers

Answer:

C. rhythm

Explanation:

The easy defintion of rhythm is the following:

Pattern of beats or a series of stressed and. unstressed syllables in poem. • Poets create rhythm by using words in which. parts are emphasized or not emphasized

So hope this helps.

Answer:

rhythrm

Explanation:

fruits and vegetables are rich sources of----------------------- and -----------------------choose the correct answera.carbohydrates ,proteinsb.proteins,fatsc.proteins,mineralsd.vitamins,minerals

Answers

Answer:

vitamins and minerals

Explanation:

trust me bro

Answer: Vitamins and minerals

Explanation:

fruits and vegetables are rich sources of Vitamins and Minerals

how might b2b and b2c companies approach meeting customer needs differently

Answers

Businesses that cater to both B2B (business-to-business) and B2C (business-to-consumer) consumers frequently take a different approach to satisfying their demands because these customers have distinct needs.

What distinguishes B2B customers from B2C clients?

What distinguishes B2B e-commerce from B2C e-commerce? Business to business is known as B2B, whereas business to consumer is known as B2C. B2B ecommerce makes use of online channels to market to other businesses. B2C e-commerce focuses on individual customers.

How do the purchasing processes for B2B and B2C differ?

B2B: When purchasing a good or service involves business-related goals, the transaction requires a careful study, more thought, and continued support from the seller. Several business divisions are impacted by the choice. B2C: Typically, the sale is less logical

To know more about consumers  visit:-

https://brainly.com/question/28671114

#SPJ1

Dana is reviewing a coworker’s presentation and wants to make note of some questionable data on a chart. What steps should she take? Choose the correct answers from the drop-down menus.

1. First, select the_____.
a. review tab
b. object on the slide
c.new comment button
2. Go to the_____ tab.
a. home
b. insert
c. review
3. Click New Comment, and type in the observation.

4. The comment will appear in the Comment pane on the_________ of the slide.
a. top
b. bottom
c. left side
d. right side

Answers

Answer:

1. b.

2. c.

4. d.

Explanation:

Answer: object, review, right side

All queries combined using a union, intersect or except operator must have an equal number of expressions in their target lists.

a. True
b. False

Answers

The given statement exists true. The number of expressions in the target lists of all queries merged using the union, intersect, or except operators must be equal.

How are UNION INTERSECT and except used in SQL?

When used between two inquiries to create Boolean combinations between the results of the two queries, the operators UNION, EXCEPT, and INTERSECT function identically. When given the queries A and B, UNION delivers all of the results from both. EXCEPT returns all records in A but none in B.

Without sorting or eliminating duplicates, UNION ALL returns the aggregated rows from two queries.

The main difference between Union and Union All is that Union simply extracts the rows that are specified in the query, whereas Union All also extracts duplicate rows (rows with repeated values) from both searches.

When two queries with the identical set of attributes in the select clause return results, the union operation merges those results. Duplications are immediately removed.

To learn more about except operator refer to:

https://brainly.com/question/29554514

#SPJ4

Vani is trying to connect a microphone to her laptop. What are the two way she can connect the microphone?

Answers

Through the audio jack or via Bluetooth

Free computer games and free screen saver programs are typical carriers of _______.

A. DoS

B. worms

C. viruses

D. Trojan horses

Answers

Free computer games and free screen saver programs are typical carriers of Trojan horses. Therefore, the correct answer option is: D. Trojan horses.

What is a malware?

A malware is any type of software program such as a game or screen saver, that is designed and developed to be intentionally harmful to a host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan horse.

In Computer technology, some examples of a malware include the following:

WormsRootkitRATAdwareTrojan horseSpywareZombiesViruses

In conclusion, a Trojan horse simply refers to a type of malware that has the ability to perform undocumented actions which are completely unapproved by an end user of the device and they are commonly found in free software such as computer games and free screen saver programs.

Read more on malware here: brainly.com/question/28260161

#SPJ1

How big of a role does social media play in the mental health of people? Does it do more harm or good? Explain why. in 400 words

Answers

The role that social media play in the mental health of people is big. The use of social media is one that is known to have c positive effects for example connecting people, giving a platform for self-expression, and others.

What is the  role that social media?

The  key bad  impacts of social media on mental health is one that is known to have the potential for addiction. Social media platforms are said to be set up to be a form of engaging, which can result to individuals spending excessive amounts of time going through their feeds and this may lead to depression.

Hence the negative impact of social media on mental health is the one that can also lead to cyberbullying that is Online harassment.

Learn more about  role that social media from

https://brainly.com/question/1163631

#SPJ1

What are your thoughts on the influence of AI on the overall progress of globalization? So far, globalization has been more beneficial to the developing countries than the developed. Do you think that may change in the future with the advances and expansion of AI in global business?

Answers

Answer:

Explanation:

The influence of AI on the overall progress of globalization is significant and multifaceted. AI technologies have the potential to reshape various aspects of global business and societal interactions. Here are a few key points to consider:

1. Automation and Efficiency: AI-driven automation can enhance productivity, optimize processes, and reduce costs for businesses across the globe. This can lead to increased efficiency in production, supply chains, and service delivery, benefiting both developed and developing countries.

2. Access to Information and Knowledge: AI-powered tools and platforms can facilitate the dissemination of information and knowledge on a global scale. This can bridge the knowledge gap and provide learning opportunities to individuals in developing countries, potentially narrowing the gap between developed and developing nations.

3. Economic Disruption and Job Transformation: The expansion of AI in global business may disrupt certain job sectors, particularly those involving repetitive or routine tasks. While this can lead to job displacement, it also creates opportunities for reskilling and upskilling the workforce. Adapting to these changes will be crucial for individuals and countries to ensure they can benefit from the evolving job market.

4. Technological Divide and Access: There is a concern that the advancement of AI could exacerbate the digital divide between developed and developing countries. Access to AI technologies, infrastructure, and resources can vary significantly, posing challenges for countries with limited resources to fully leverage AI's potential. Addressing this divide will be crucial to ensure equitable globalization and avoid further marginalization of certain regions.

5. Ethical Considerations: The ethical implications of AI, including privacy, bias, and accountability, need to be carefully addressed in the global context. International collaboration and regulation can play a significant role in ensuring responsible and inclusive deployment of AI technologies worldwide.

While globalization has historically had varying impacts on developed and developing countries, the future influence of AI on this trend is complex and uncertain. It will depend on how AI is harnessed, the policies and strategies implemented, and the capacity of countries to adapt and leverage AI for their development goals. A proactive and inclusive approach can help mitigate potential risks and maximize the benefits of AI in global business and globalization as a whole.

AI has been changing the face of globalization by its advances and expansion in global business. The influence of AI is expected to continue to shape globalization in the future.

AI and its technologies are becoming increasingly popular in different areas of globalization. These technologies offer cost-effective and efficient solutions that enable businesses to expand across borders. AI-powered business intelligence, predictive analytics, and automation technologies are allowing companies to streamline operations, reduce costs, and make more informed decisions. While AI may initially offer more benefits to developed countries, it is expected that developing countries will begin to adopt AI technologies more extensively as well. AI has the potential to help bridge the gap between developed and developing countries by improving access to information, resources, and opportunities. This will be especially beneficial in the areas of healthcare, education, and infrastructure development.

Know more about globalization, here:

https://brainly.com/question/30331929

#SPJ11

using the what-if function in excel to make a decision is considered a type of __________.

Answers

Using the 'what-if' function in Excel in order to make a decision is considered a kind of forecast and scenario model.

In Microsoft Excel, the 'what-if' function permits the changing of the values in cells to analyze how these changes affect the outcomes or results. When in Excel the 'what-if' function is used to check many results of decisions to be taken based on different values on provided input, it is considered a kind of forecast and scenario model.  

The forecast and scenario model indicates a strategic process for businesses that is used to plan various potential decisional outcomes. These situations are forecasted as per the visible risks and assumed uncertainties that exist in a set of plausible situations. Simply, it can be said that the forecast and scenario model assists to model multiple 'what-if' scenarios that prepare for the future.

You can learn more about MS Excel at

brainly.com/question/19295387

#SPJ4

what is the term for sending emails that imitate legitimate companies?

Answers

Answer:

phishing,,,, it imitates the company email so that when you get on the mail it can collect all your data and then can begin to hack using your information such as password

Phishing refers to the malicious attack method by attackers who imitate legitimate companies in sending emails in order to entice people to share their passwords, credit card or other sensitive personal information. ... If you do surrender such information, the attacker will immediately capture your personal information.

when the group by clause is used without aggregate functions it will give you the same result as what keyword?

Answers

When the group by clause is used without aggregate functions it will give you the same result as distinct keyword.

What are aggregate function?

Aggregate function is defined as the function involves the operations carried out on a set of data to produce a single figure that precisely reflects the underlying data.

Only when a WHERE clause is a subquery of a HAVING clause and the column name supplied in the phrase is a correlated reference to a group is it possible to employ an aggregate function. Although GROUP BY is typically used in conjunction with aggregate operations, it can still be used independently to locate distinct entries.

Thus, when the group by clause is used without aggregate functions it will give you the same result as distinct keyword.  

To learn more about aggregate function, refer to the link below:

https://brainly.com/question/27994092

#SPJ1


Name three major types of computer systems with which students are likely to be
engaged on a day-to-day basis.

Answers

Answer:

Analogue, digital, and hybrid computer systems.

In Word, you can format the font, size, and alignment but not the color of text.

Answers

Answer:

You can change color of text as well.

Explanation:

It is false that in word one can format the font, size, and alignment but not the color of text.

What is text formatting?

In computing, formatted text, styled text, or rich text, as opposed to plain text, is digital text that contains styling information in addition to the bare minimum of semantic elements: colors, styles, sizes, and special HTML features.

Formatted text is text that is displayed in a specific manner. Formatting data may be associated with text data in computer applications to generate formatted text.

The operating system and application software used on the computer determine how formatted text is created and displayed.

In Word, you can change the font, size, alignment, and even the color of the text.

Thus, the given statement is false.

For more details regarding text formatting, visit:

https://brainly.com/question/766378

#SPJ2

Using more than one array to store related data is called _____________ arrays.

Answers

Answer:

Using more than one array to store related data is called parallel arrays.

Explanation:

I just did it and got 100% on the quiz

Using more than one array to store related data is called parallel arrays.

What is array?

An array is a type of data structure used in computer science that holds a set of elements that are all uniquely recognised by at least one array index or key.

An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.

In parallel arrays, a collection of data is represented by two or more arrays, where each corresponding array index represents a field that matches a particular record.

For instance, the array items at names and ages would explain the name and age of the third person if there were two arrays, one for names and one for ages.

Thus, the answer is parallel array.

For more details regarding parallel array, visit:

https://brainly.com/question/27041014

#SPJ6

a constraint that dictates which specific values can be stored in a column is called a/an constraint.

Answers

The constraint that dictates which specific values can be stored in a column is called a "CHECK" constraint.

A CHECK constraint is a type of constraint in a relational database management system (RDBMS) that is used to limit the values that can be stored in a column or a group of columns. It specifies a condition that must be satisfied before a value can be inserted or updated in the column. For example, a CHECK constraint can be used to ensure that the values in a "salary" column of an employee table are not negative.  If a negative value is entered or updated, the RDBMS will reject the change and return an error message.

Learn more about constraint: https://brainly.com/question/14309521

#SPJ11

2.
Solve each equation.
a)
3n - 8 = 2n + 2
b)
4n + 75 = 5n + 50

Answers

Answer:

A) n=10

B) n=25

Explanation:

Mind marking me brainliest?

Why is it never a good idea to touch the lens or the LCD on your camera?
A. because the heat from your fingers will melt the LCD screen
B. because the oils from your skin can cause permanent smudging
C. because your finger will get in the way of your shot
D. because your fingernails will scratch the lens

Answers

Answer:

D. because your fingernails will scrach the lens

When configuring VLANs on a switch, what is used to identify VLAN membership of a device? Hostname IP address. Switch port. MAC address.

Answers

The switch port is used to identify VLAN membership of a device when configuring VLANs on a switch.  Option C is the correct answer.

When configuring VLANs on a switch, you need to assign each port on the switch to a specific VLAN. A device's VLAN membership is determined by which switch port it is connected to. So, the switch port is used to identify VLAN membership of a device. The other options, such as hostname, IP address, and MAC address, are not used for VLAN membership identification. Option C, switch port, is the correct answer.

You can learn more about VLANs  at

https://brainly.com/question/25867685

#SPJ11

You supect that the power supply in your desktop PC is failing. You want to use a multimeter to test the power supply. Which multimeter setting should you use?

Answers

We should use the DC volts multimeter setting.

Most modern multimeters do polarity detection automatically. It is not necessary for the black lead to touch the negative terminal or the red information to touch the positive terminal while measuring dc voltage. Just be aware that a negative symbol will appear in the display if the probes hit the opposite terminals. Red leads should always touch a positive terminal on an analog multimeter, while black leads should always touch a negative terminal. Otherwise, the meter will sustain damage. According to the function that has been chosen on the dial, modern DMMs default to Autorange. Press the RANGE button several times until the appropriate range is selected to select a specific fixed measurement range.

Know more about Multimeter here:

https://brainly.com/question/30809641

#SPJ4

What step must be taken to use external discrete I/O devices to control a 3 wire VFD motor control system?
a. Wire the VFD directly from its digital I/O terminals to the motor power leads
b. Program the VFD for 3 wire control mode
c. Interface the VFD to the motor power leads with discrete I/O relays
d. Set the VFD to manual I/O mode

Answers

To use external discrete I/O devices to control a 3 wire VFD motor control system, the correct step is Interface the VFD to the motor power leads with discrete I/O relays. Option c is correct.

In a 3 wire control system, a single set of wires is used to supply power and control signals to the motor. The control signals are sent through the same wires that carry power to the motor, so external devices cannot be connected directly to these wires without disrupting the motor control circuit.

To connect external devices to control a 3 wire VFD motor control system, the VFD must be interfaced to the motor power leads with discrete I/O relays. These relays act as an interface between the VFD's digital I/O terminals and the motor power leads, allowing external control signals to be sent to the motor without interfering with the VFD's internal control circuitry.

Therefore, c is correct.

Learn more about control system https://brainly.com/question/31452507

#SPJ11

Which phrase is the best definition of a play?

a story that focuses closely on key details of setting
a story with lots of dialogue and very little description of setting
a story that only makes sense when read aloud by actors
a story told one verse at a time, using lines and sometimes stanza

Answers

A phrase that represents the best definition of a play is a story that focuses closely on key details of a setting. Thus, the correct option for this question is A.

What is a phrase?

In literature, a phrase may be defined as the collection or group of words that significantly work together in a sentence but do not contain a subject or a verb.

According to the dictionary of literature, a play is a work of drama, usually consisting mostly of dialogue between characters and intended for theatrical performance rather than just reading.

Therefore, a phrase that represents the best definition of a play is a story that focuses closely on key details of a setting. Thus, the correct option for this question is A.

To learn more about Phrases, refer to the link;

https://brainly.com/question/27892321

#SPJ1

Which type of data does a packet-filtering firewall inspect when it decides whether to forward or drop a packet

Answers

A packet-filtering firewall is one of the earliest firewall types, which works by examining packets that are sent to and from a computer network. The packet filtering firewall is used to analyze data at the network layer, which is known as layer 3 of the OSI model.

It identifies the destination and source IP addresses for a packet and decides whether to forward or drop a packet. Packets that meet the security rules configured are allowed, and those that don't are blocked. Packet filters operate with predefined sets of rules that can be customized to suit the specific security needs of a network. They are used to restrict traffic based on a range of criteria like the source, destination, and protocol used.

Packet filters are effective against low-level attacks, but they are not very good at providing security for applications. They cannot detect attacks that occur at the application level, like cross-site scripting, and SQL injection. As a result, newer firewall types, such as application-level gateways and stateful inspection firewalls, have been introduced to offer more robust security for modern applications. Packet filtering firewalls remain useful today as they are inexpensive and easy to configure.

To know more about filtering visit:

https://brainly.com/question/31945268

#SPJ11

how do you make a ringtone on earsketch

Answers

Haven't used earsketch, but here we go.

Answer:

1). Make a track in earsketch, make it like 6/7 seconds

2.) export your track as an .mp3, .wav, or  .ogg (your choice!)

3.) (If on android) Navigate to settings, now search for an entry for ringtone.

4.) If you have no luck, look up how to set ringtone on your desired phone brand (iOS, Android, etc.)

5.) Test out your new ringtone

6.)Profit

Although digital cameras today are pretty sturdy, they still require basic care and maintenance. Create a basic list of care and maintenance standards and procedures that any digital camera owner would be smart to follow. Briefly explain each item on your list.

Please help! Thank you!

Answers

Answer:

Avoid dirt and sand. Use care when cleaning dirt particles and sand from your digital camera. Do not use canned or pressurized air to clean the sand, as you might just drive the particles into the camera case. Avoid liquids. Keep all liquids away from the camera unless you own a model with a waterproof case. Avoid touching the lens and LCD. Oils from your skin smudge the lens and LCD, eventually causing permanent damage. Clean the lens and LCD with a microfiber cloth when you see a smudge from your fingertips. The lens and sun don't mix. Sunlight focused through the lens of the camera could damage the image sensor or even start a fire inside the camera. Use cleaning liquids with care. Avoid using an excessive amount of cleaning liquid with your camera. You should be able to clean the camera with a dry microfiber cloth. If a liquid is needed, place a few drops of the liquid on the cloth, rather than directly on the camera. Vacuum the bag. Dirt and sand inside your camera bag could damage your camera, so vacuum the bag regularly to keep it clean and protect your camera. Watch the temperature. Do not leave your camera in a sunny vehicle, where temperatures quickly can exceed 100 degrees Fahrenheit. Avoid leaving the camera in direct sunlight, which can damage the plastic. Finally, avoid extreme cold, too, which could damage the LCD. Use neck straps and wrist loops. If you slip while hiking, or if you lose the grip on your camera near the pool, the straps can save your camera from a potentially disastrous fall.

Explanation:

these are the exact words that I used on my assignment that I just completed I hope this helps! Enjoy your class!

The main 3 ways to care for your digital Camera  is that:

Always bag it when you are not using it. Always use lens caps to cap it.Dust it regularly.

What are the maintenance methods for the digital camera?

Know that there are ways to care for a camera. It is essential therefore to always clean at all times.

Conclusively, do use a dry and clean cloth in the wiping the physical body of the camera and note the type of cleaners or solvents that you use in the clean  up  as it needs to be a  blower, brush, etc.

Learn more about cameras from

https://brainly.com/question/26320121

PLEASE HELP ME HELP ME NO IM NOT OKAY AND ITS NOT EASY FOR ME.....Vladimir is reworking an old slideshow. He needs to delete some of the text, combine or summarize other parts, and create a few new slides as well. He wants to only look at the text. Is there any easy way to do that?

A.
Yes, he can use the Outline view to see all the text in one place.
B.
Yes, he can use the Slide Master to view all the text in one place.
C.
No, he'll have to use the Slide pane to navigate the slides one by one.
D.
No, he'll have to copy all the text out into a word processor.

Answers

Answer:

Outline view

Explanation:

This is a formatted window that shows all text, headers, and titles in a popup on the left side of the screen. Slide master shows all the slides but includes slide details such as inserted images and smart art.

Create an informational slide using ethical Internet research and citation practices.


Choose a topic on anything you think would be interesting to research - for example, a famous or historical person, a place, an animal, or a device or invention. You will use the Internet to complete your research. With this research, you will create an informational presentation slide that describes


your topic. Your informational slide should contain the following elements: An introductory image- it can be a direct picture of the person/place/thing, or a photo that


relates to it in some way. This photo must be free to use, meaning you will have to check


the copyright details for any photo you select. (10 points) • A 200-to 300-word explanation of the topic. Use Internet sources to research the topic, and then write an explanation in your own words based on what you have learned (10 points)


• Properly cited Internet sources for both the image and written section (5 points)

Answers

Here is an example of an informational slide using ethical internet research and citation practices on the topic of Marie Curie:

Marie Curie was a Polish-born scientist who made groundbreaking discoveries in the field of radioactivity. She was the first woman to win a Nobel Prize and the only person to win two Nobel Prizes in different fields.Key Facts:Born on November 7, 1867, in Warsaw, PolandStudied physics and mathematics at Sorbonne University in ParisDiscovered two new elements, radium and poloniumAwarded the Nobel Prize in Physics in 1903 and the Nobel Prize in Chemistry in 1911Died on July 4, 1934, in Savoy, France, due to radiation exposureCitations:Encyclopædia Britannica. (2021, February 22). Marie Curie. In Encyclopædia Britannica. Retrieved from

To know more about ethical click the link below:

brainly.com/question/14948046

#SPJ11

Edmentum Question- Consumer and Credit Loans

When would someone be restricted from filing for bankruptcy?

A. if the debtor fails the asset test

B. if the debtor fails the income-liability test

C. if the debtor fails the credit-overload test

D. if the debtor fails the means test

Answers

Answer:

D, if the debtor fails the means test

Explanation:

i took the test on platos and got it right

Other Questions
Complete the table by adding the purpose audience instruction of your informational text Suzannes school are painting a rectangular mural outside the buillding that will be 15 feet by 45 feet the students are also going to paint a smaller mural inside the building the scale is 1 unit = 3 feet the ____ area is a box in the publication into which you can insert field codes. group of answer choices repeatable tracking catalog importing Coral reefs are marine ecosystems with a lot of vertical complexity. This means that they also have ____________.[Select all that apply] options:high biodiversitylittle impact from normal disturbanceshigh ecosystem stabilitythe ability to conserve much more than 10% of the energy between trophic levels few trophic levels Which statement(s) concerning the completion and signing of standard preprinted sale documents is/are correct? (i) It is essential that the parties sign the document in the spaces allocated for their signatures. (ii) All amendments to pre-printed clauses should be initialled by both the buyer and seller. (iii) All blank spaces that have not been filled in must be initialled by both the buyer and seller. Select one: a. all of the above b. none of the above c. (i) and (ii) only d. (iii) only e. (ii) and (iii) only The north and south held different views toward slavery in 1850. what were they? Find the points at which the graph of the equation has a vertical or horizontal tangent line. 81x^2 + 49y^2 + 1134x 882y + 3969 = 0 quizlet Putting the patient at the center of the decisions, resources, and desired outcomes and providing the necessary information that empowers patients to become involved in making decisions regarding their own treatment. Cullumber Corp. is considering purchasing one of two new diagnostic machines. Either machine would make it possible for the company to bid on jobs that it currently isnt equipped to do. Estimates regarding each machine are provided here.Machine A Machine BOriginal cost $75,700$189,000Estimated life 8 years8 yearsSalvage value 00Estimated annual cash inflows $19,800$39,800Estimated annual cash outflows $4,990$10,100Calculate the net present value and profitability index of each machine. Assume a 9% discount rate. (If the net present value is negative, use either a negative sign preceding the number eg -45 or parentheses eg (45). Round answer for present value to 0 decimal places, e.g. 125 and profitability index to 2 decimal places, e.g. 10.50. For calculation purposes, use 5 decimal places as displayed in the factor table provided.)Machine A Machine BNet present value enter a dollar amount rounded to 0 decimal placesenter a dollar amount rounded to 0 decimal placesProfitability index enter the profitability index rounded to 2 decimal placesenter the profitability index rounded to 2 decimal placesWhich machine should be purchased?select a machine Machine BMachine A should be purchased. Consider the quadratic equation x(x-b)=0. Solve this equation. For what value(s) of b are there more than one solution? For what value(s) of is there only one solution? Explain your reasoning. A group of concepts linked or connected together by related concepts is a conceptual hierarchy.a. trueb. false Help me to answer this math please Cul es el objetivo principal del discurso de Emma Watson y la campaa HeForShe? Explain what you think the March on Washington indicates about Kings methods of nonviolent protest? 9) 8.081 ++ 0.6 = 10.20110)- 3.328 = 0.96 Mamadou drove 168 miles in 8 hours. If he continued at the same rate, how longwould it take to travel 126 miles? Which of the following can be classified as a separable differential equation? (Choose all that applies)dy/dx= 18/x2y3(2y+3)dy-ex+y dxOy=y(3x-2y)02y3 tanx dy=dxOdy dx -= secx - siny when a manager is aware of the needs of their employees and has the ability to influence them to work toward the organization's goals, the manager is exhibitingleadership Speech bidding farewell to my high school teacher Suppose that you are conducting a field experiment with plants. You are testing the hypothesis that plants grow faster when mulch covers the soil. Plan how you would conduct the experiment. Include the types of evidence you would gather. Then plan how you would repeat it.