In C, write a recursive function int Palindrome(char mystr[], int len) that checks whether the string char mystr[]="....." is a palindrome or not. If it is then print "Palindrome" and if not print "Not palindrome" to the console. A string being a palindrome has 2 cases:(i)if the string has an even length, then the first half is a mirroring of the second half; e.g., abccba is a palindrome, whereas abccab is not. (ii) if the string has an odd length, then disregard of the letter in the middle, the first half is a mirroring of the second half; e.g., abcvcba is a palindrome, whereas abccvba is not.

Answers

Answer 1

#include <stdio.h>

#include <string.h>

int Palindrome(char mystr[], int len)

{

   // base case: if the length of the string is 0 or 1, it is a palindrome

   if (len <= 1)

       return 1;

   // check if the first and last characters are the same

   if (mystr[0] != mystr[len - 1])

       return 0;

   // if the first and last characters are the same, check the substring that

   // lies between them (excluding the first and last characters)

   return Palindrome(mystr + 1, len - 2);

}

int main()

{

   char mystr[] = "abcba";

   int len = strlen(mystr);

   if (Palindrome(mystr, len))

       printf("Palindrome\n");

   else

       printf("Not palindrome\n");

   return 0;

}

This function works by checking the first and last characters of the string. If they match, it calls itself with a substring that excludes the first and last characters. This process continues until the length of the string is 0 or 1, at which point it returns 1 (indicating that the string is a palindrome). If any of the characters do not match, the function returns 0 immediately.

read more about this at https://brainly.com/question/12567947

#SPJ4


Related Questions

______ means locating a file among a set of file​

Answers

Answer:

computer files

Explanation:

How do you use the Internet? Think about your typical day. When are you using the Internet? For what purposes? What role does it have in your life?

Answers

Answer:

I use the internet for a variety of activities. In a typical day, I'd use the internet to do the following:

I check my emailfollow the latest trends and news on popular social media channelscommunicate with friends, family and clients via social media channelsI research business topicsI use it for my work as a management consultant

The internet is now a primary utility. I currently spend more on internet data subscription than on fuel, electricity, phone call credit, and even water. It now has a tremendous impact on my daily life.

Cheers

3. A file has 250 pages, each page contains 50 lines. Each line can be represented by
9 bits. Your network can download the whole file within 50 seconds. What is the
bit rate for your network?
(6 Points)​

Answers

Answer:

2,250b/s

Explanation:

50*250=12,500 (Lines in total)

12,500*9=112,500 (Bits in total)

12,500/50=2,250 (Bits per second)

Modify the Comments.java program from Programming Exercise 1-10 so at least one of the statements about comments is displayed in a dialog box. The dialog box may appear outside the desktop pane's viewport. You may need to expand the pane to view the dialog box. Grading Write your Java code in the coding area on the right. Use the Run Code button to execute and run the code. This lab is practice only. You will not be graded on this lab.

Answers

this isn’t even a question it’s just instructions for a question. can you elaborate???

When a computer is suffering from a virus, you can use a compiler to help remove the virus. True or false?

Answers

True I think because it helps right?

It is true that when a computer is suffering from a virus, you can use a compiler to help remove the virus.

What is a compiler?

Compilers are specialized software tools that convert the source code of one programming language into machine code, bytecode, or another programming language.

Usually, the source code is created in a high-level, readable language for humans, such Java or C++.

Programs that convert source code from a high-level programming language to a low-level programming language (such as assembly language, object code, or machine code) in order to produce an executable program are commonly referred to as "compilers."

The compiler, as we well know, transforms high-level source code into low-level code.

Low-level code is then executed on the target system. You can use a compiler to assist in virus removal when a computer is infected.

Thus, the given statement is true.

For more details regarding a compiler, visit:

https://brainly.com/question/28232020

#SPJ2

Are AWS Cloud Consulting Services Worth The Investment?

Answers

AWS consulting services can help you with everything from developing a cloud migration strategy to optimizing your use of AWS once you're up and running.

And because AWS is constantly innovating, these services can help you keep up with the latest changes and ensure that you're getting the most out of your investment.

AWS consulting services let your business journey into the cloud seamlessly with certified AWS consultants. With decades worth of experience in designing and implementing robust solutions, they can help you define your needs while executing on them with expert execution from start to finish! AWS Cloud Implementation Strategy.

The goal of AWS consulting is to assist in planning AWS migration, design and aid in the implementation of AWS-based apps, as well as to avoid redundant cloud development and tenancy costs. Project feasibility assessment backed with the reports on anticipated Total Cost of Ownership and Return on Investment.

Learn more about AWS consulting, here:https://brainly.com/question/29708909

#SPJ1

A text that is arranged in a one letter column is called a?

Answers

A text that is arranged in a one-letter column is called a "one-letter-per-line" format.

It is a style of formatting where every letter or word in a text is written on a separate line, usually used for emphasis or aesthetics in writing. One-letter-per-line formatting is a writing style that has been used throughout history and has become more popular in modern times, particularly with the rise of the internet and social media.

One-letter-per-line format can be used to create a variety of effects in writing. For example, it can be used to create a sense of emphasis or to draw attention to a particular word or phrase. It can also be used to create a sense of rhythm or to give a text a more visual or artistic quality. One-letter-per-line formatting can be used in poetry, prose, or any other type of writing, and it can be used to create a wide range of effects.

In conclusion, one-letter-per-line formatting is a writing style that is used to create emphasis, rhythm, or visual effects in writing. It can be used in a wide range of contexts, including poetry, prose, and social media, and it can be used to create a variety of effects depending on the writer's intentions.

For more such questions on one-letter, click on:

https://brainly.com/question/12435728

#SPJ8

Describe the procedure for creating a table or spreadsheet in a presentation slide.

Answers

Answer:

Use a slide layout containing the desired icon.

Double-click on the icon.

Enter and format text; add borders if desired.

Click outside of the object to view it in the slide.

what are the codes to 6.4 codehs

Answers

The code that computes the median is given as follows;


import java.util.*;

public class Median

{

   public static void main(String[] args)

   {

       int[] numbers1 = {12, 75, 3, 17, 65, 22};

       System.out.print("The median value of the EVEN array is " + median(numbers1));

       

       int[] numbers2 = {12, 75, 3, 17, 65, 22, 105};

       System.out.print("\nThe median value of the ODD array is " + median(numbers2));

       

   }

   public static double median(int[] arr)

   {

       // your code goes here!

       Arrays.sort(arr);

       if (arr.length % 2 == 1)

       {

           return arr[arr.length / 2];

       }

       else

       {

           return (arr[(arr.length - 1) / 2] + arr[arr.length / 2]) / 2.0;

       }

   }

}

How doe the above code work?

This segment outlines a program featuring a class called "Median." It has two functions - one being main while the other is labeled as "median".

Main handles specific orders by way of requesting two different integer arrays (even/odd), thereafter requiring information regarding their corresponding medians from within via invoking on “median”.

In turn “Median” works by receiving user-inputted numerical data in form of array format before utilizing Arrays.sort sorting method so as to achieve ascending order numerically.

Learn more about Coding:
https://brainly.com/question/16757242
#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

6.4.6 Find the Median

I have a global variable that I want to change and save in a function (in python). I have an if statement contained in a while loop where the code will pass the if and go to the elif part first, and runs the code with certain numbers, and changes some of them. Because of the changed numbers when the while loop runs again it should enter the if part, but it doesn't It uses the old values as if the function has not been run. FYI I am returning the values at the end of the function, it still doesn't work

Answers

From the above scenario, It appears that you could be facing a problem with the scope of your global variable. So It is essential to declare a global variable within a function before modifying it, to avoid creating a new local variable.

Why does the code  not work?

For instance, by using the global keyword within a function, such as my_function(), Python will know that the aim is to change the my_global_variable variable defined outside the function's boundary.

Therefore, When the my_function() is invoked in the while loop, it alters the global variable that is subsequently assessed in the if statement.

Learn more about  code  from

https://brainly.com/question/26134656

#SPJ1

I have a global variable that I want to change and save in a function (in python). I have an if statement

What are acenders? What are decenders?

Answers

Answer:

Explanation:

An ascender is the part of a lowercase letter that extends above the mean line of a font, or x-height

The descender is the part that appears below the baseline of a font.

Answer: Ascenders are lowercase letters that are written above or pass the mean line. Meanwhile descenders are below the baseline.

Explanation: An example of ascender letters are: b, h, and l. Examples of decenders are: g, p, and y.

A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?

Security and risk management

Security architecture and engineering

Communication and network security

Asset security

Answers

The responsibilities of a  security professional described above belong to the security domain of option D: "Asset security."

What is the servers?

Asset safety focuses on identifying, classifying, and defending an organization's valuable assets, containing sensitive personally capable of being traced information (SPII) stored on guest servers.

This domain encompasses the secure management, storage, memory, and disposal of sensitive dossier, ensuring that appropriate controls are in place to safeguard the secrecy, integrity, and availability of property.

Learn more about servers  from

https://brainly.com/question/29490350

#SPJ1

“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

D) Both A and C

Explanation:

Answer:

D

Explanation:

You have a field that will be taking a fixed-length-width text entry in different languages, including Russian. Which data type should you likely use?
A. varchar
B. nchar
C. nvarchar
D. char

Answers

If you have a field that will be taking a fixed-length-width text entry in different languages, including Russian, The data type should you likely use is: "nvarchar" (Option C).

What is nvarchar?

In SQL, specifies the string size in byte pairs and can range from 1 to 4,000. max denotes that the maximum storage capacity is 230-1 characters (2 GB). The storage capacity is two times n bytes plus two bytes.

Any Unicode data can be stored in a nvarchar column. A varchar column can only have an 8-bit codepage. Some argue that varchar should be utilized since it uses less space.

Learn more about data type:
https://brainly.com/question/26352522
#SPJ1

3. Rearrange the mixed up process of logging into an email account in the right order.
a. Click on sign in
b. Type the website address of the email service provider.
c. Enter your ID and password
d. Open the web browser.
e. Click on the mail link.

Answers

To log into an email account, the following steps should be taken in order:

The Steps to be takenOpen the web browser.Type the website address of the email service provider.Click on the mail link.Click on sign in.Enter your ID and password.

First, open the web browser and type the website address of the email service provider into the address bar. Then, click on the mail link to go to the email login page.

Next, click on the sign-in button to access the login page. Finally, enter your ID and password in the respective fields to log in successfully.

Read more about emails here:

https://brainly.com/question/29515052

#SPJ1

Read string integer value pairs from input until "Done" is read. For each string read, if the following integer read is less than or equal to 45, output the string followed by ": reorder soon". End each output with a newline.

Ex: If the input is Tumbler 49 Mug 7 Cooker 5 Done, then the output is:

Mug: reorder soon
Cooker: reorder soon

Answers

The program to Read string integer value pairs from input until "Done" is read. For each string read, if the following integer read is less than or equal to 45, output the string followed by ": reorder soon" is given below.

Here's a Python program solution to your problem for given input:

while True:

   # Read string integer pairs from input

   try:

       name = input()

       if name == "Done":

           break

       value = int(input())

   except ValueError:

       print("Invalid input format")

       continue

   # Check if the value is less than or equal to 45

   if value <= 45:

       print(name + ": reorder soon")

Thus, this program reads string integer pairs from input until "Done" is read. For each pair, it checks if the integer value is less than or equal to 45.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ1

Microsoft Excel is an example of a(n) application.

entertainment
education
communication
productivity

Answers

Answer:

d

Explanation:

Answer:

productivity

Explanation:

u cant just say "A, B, C, or D" cause all the choices are randomized

just for future reference

Select the correct answer from each drop-down menu. What data types can you suggest for the given scenario? Adja is working in a program for the school grading system. She needs to use a(n) (First drop down) to store the name of the student and a(n) array of (Second drop down) to store all the grade of each subject of each student.
Options for the first drop down are- A. Integer, B.String, C.Character.
Options for the second drop down are- A.Floats, B.Character, C.String.

Answers

Based on the given scenarios, the data types that would be best suited for each is:

C. Character.A. Floats

What is a Data Type?

This refers to the particular type of data item that is used in order to define values that can be taken or used in a programming language.

Hence, it can be seen that based on the fact that Adja is working in a program for the school grading system, she would need to use a character to store the name of the student and a float to store all the grades of each subject of each student because they are in decimals.

With this in mind, one can see that the answers have been provided above.,

In lieu of this, the correct answer to the given question that have been given above are character and floats.

Read more about data types here:

https://brainly.com/question/179886

#SPJ1

Answer:

A- String

B- Character

In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.

Ex: If the input is 100, the output is:

After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.

Answers

To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:

Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))

Here's the Coral Code to calculate the caffeine level:

function calculateCaffeineLevel(initialCaffeineAmount) {

 const halfLife = 6; // Half-life of caffeine in hours

 const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);

 const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);

 const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);

 return {

   'After 6 hours': levelAfter6Hours.toFixed(1),

   'After 12 hours': levelAfter12Hours.toFixed(1),

   'After 18 hours': levelAfter18Hours.toFixed(1)

 };

}

// Example usage:

const initialCaffeineAmount = 100;

const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);

console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');

console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');

console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');

When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:

After 6 hours: 50.0 mg

After 12 hours: 25.0 mg

After 18 hours: 12.5 mg

You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.

for similar questions on Coral Code Language.

https://brainly.com/question/31161819

#SPJ8

a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.


b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.


Hierarchy chart and pseudocode required

Answers

The Hierarchy Chart for the program needed by Hometown Bank is given below:

                Main Program

                   |

               -------------

              |             |

      Housekeeping module  Detail module

              |             |

     Prompts for balance   Computes fee

         and accepts input  and displays result

              |

        -----------------

       |                 |

   End-of-job module    Detail loop (while balance >= 0)

       |

   Displays message "Thanks for using this program"

Pseudocode for Main Program:

Declare global variables

Call Housekeeping module

Call Detail module

Call End-of-job module

Pseudocode for Housekeeping Module:

Prompt for balance

Accept input for balance

Pseudocode for Detail Module:

Detail loop:

  while (balance >= 0)

     Prompt for number of overdrafts

     Accept input for number of overdrafts

     Compute fee: 1 percent of balance - 5 dollars * number of overdrafts

     Display result

     Prompt for balance

     Accept input for balance

Pseudocode for End-of-job Module:

Display message "Thanks for using this program"

Read more about pseudocode here:

https://brainly.com/question/24953880

#SPJ1

is a workforce trend brought about by advancements in technology.
Workforce diversity
Flextime
Telecommuting
Teamwork

Answers

Teamwork I believe not sure what you’re asking

Answer:

telecommuting is the answer your looking for.

Explanation:

Why because I got this answer right.

The following code does sum of the triples of even integersfrom 1 through 10

int total = 0;

for (int x = 1; x <= 10; x++){

if (x % 2 == 0)

{ // if x is even

total += x * 3;

}

}// end of for

Please rewrite the above code using InStream

Answers

Answer:

Explanation:

Using Java, I have recreated that same code using intStream as requested. The code can be seen below and the output can be seen in the attached picture where it is highlighted in red.

import java.util.stream.IntStream;

class Brainly

{

   static int total = 0;

   public static void main(String[] args)

   {

       IntStream.range(0, 10).forEach(

               element -> {

                   if (element % 2 == 0) {

                       total += 3;

                   }

               }

       );

       System.out.println("Total: " + total);

   }

}

The following code does sum of the triples of even integersfrom 1 through 10int total = 0;for (int x

What characteristics are common among operating systems

Answers

The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.

Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.

1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).

2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.

3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.

4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.

5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.

6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.

This includes user authentication, access control mechanisms, and encryption.

7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.

These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.

For more such questions characteristics,click on

https://brainly.com/question/30995425

#SPJ8

Different between embedded computer &
Micro controllers

Answers

An embedded computer is a product that uses a microprocessor as a component. Ie a relationship between a car and its engine. A Microcontroller is a microprocessor that is packaged with RAM, program storage and interface circuitry to make it simple to use

Match the parts of a CPU to their fuctions

Answers

Any picture ? To show the cpu

is Cycle and share electric vehicles is agree or dis agree?why?

Answers

Utilizing more energy-efficient vehicles, such as hybrid and electric models, promotes the American economy and contributes to the fleet's diversification.

What are major safety in electric vehicles?

Like any latest tech, EVs have been the subject of some scepticism, trepidation, and uncertainty. sometimes, even rumours. Certainly, some individuals are worried about the safety using electric automobiles. Even though there have been some reasons for worry, it's crucial to see the truth through the smoke. While EVs may have a special set of issues, many of them have been resolved because to the significant R&D and industry knowledge hired by OEMs, who daily work to advance EV technology. EV batteries are safeguarded in a tamper- and crash-proof construction. EVs include a technology that immediately disengages the battery during collisions to increase safety.

To know more about major safety in electric vehicles visit:

https://brainly.com/question/28222772

#SPJ1

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

what is the difference between hydra and hadoop?​

Answers

Hadoop is batch oriented whereas Hydra supports both real-time as well as batch orientation.

The Hadoop library is a framework that allows the distribution of the processing of large data maps across clusters of computers using simple as well as complex programming models. batch-oriented analytics tool to an ecosystem full of multiple sellers in its own orientation, applications, tools, devices, and services has coincided with the rise of the big data market.

What is Hydra?

It’s a distributing multi - task-processing management system that supports batch operations as well as streaming in one go. It uses the help of a tree-based data structure and log algorithms to store data as well as process them across clusters with thousands of individual nodes and vertexes.

Hydra features a Linux-based file system In addition to a job/client management component that automatically allocates new jobs to the cluster and re-schedules the jobs.

Know more about Big Data: https://brainly.com/question/28333051

In reinforcement learning, an episode:

Answers

In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.

The reinforcement learning

During an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.

The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.

Read more on reinforcement learning here:https://brainly.com/question/21328677

#SPJ1

Learning new skills will not help you become a better digital artist: True or false?

Answers

Answer:

false, it'll help a lot

Answer:

false

Explanation:

Other Questions
What conditions can cause a population to grow Trained professionals that can help you set reasonable physical activity goals based upon your current level of fitness are called. jasmine purchased an old chair for $150 she reupholster it and sells it for 65% more than what she originally purchased it for what was the profit jasmine made after selling the chair Guys its due in 3hrs help The credit remaining on a phone card (in dollars) is a linear function of the total calling time made with the card (in minutes). The remaining credit after 44 minutes of calls is $22.96, and the remaining credit after 68 minutes of calls is $19.12. What is the remaining credit after 81 minutes of calls?Calling Time In MinutesRemaining Credit In Dollars$ Which one is right?? Mini Problem #1Curtis Akers is a waiter at the Dine and Dance Inn. He did not keep any records of his tips because he never consulted with his tax advisor. Here is his W-2. What is the total amount of social security and Medicare tax (on unreported tip income) that will be reported on Form 4137, line 13?Select one:a. $174b. $313c. $386d. $741e. None of these plss help :((( What volume is indicated on each of the graduated cylinders below? The unit of volume is mL. Make sure to check the units of graduation to get the most accurate reading possible Rader Railway is determining whether to purchase a new rall setter, which has a base price of $380,000 and would cost another $32,000 to Install. The setter will be depreciated according to the MACRS 3-year class of assets, and it would be sold after three years for $180,000. Using the setter requires a $21,000 Increase in net working capital. Although it would have no effect on revenues, the setter should save the firm $149,000 per year in before-tax operating costs (excluding depreciation). Rader's marginal tax rate is 40 percent, and its required rate of return is 13 percent. Should the setter be purchased? Do not round Intermediate calculations. Round your answer to the nearest cent. Use a minus sign to enter a negative value, if any. The setter____be purchased because the net present value, that is____ $, is___zero Suppose translating quadrilateral ABCD by 8 units to the left and 8 units down results in a new quadrilateral A'B'C'D'. Which statements are correct?I think its A,B,D and E PLEASE HELP ILL GIVE BRAINLYIST In "The American Dream" the speakers argument that Americans must come together as equals is supported bythe fear that the American dream will end.the belief that people have a right to equality.the demand that Americans change their ways.the suggestion that people become more religious. Reflect the figure with the given vertices across the line.. WILL GIVE BRAINLIST!!!!- Since Robert Scott and his crew did not survive their trek to the South Pole, what unusual purpose(s) were served by the captains log? (Select all that apply.)A. It showed how the men behaved during their final days.B. It helped other explorers analyze the fate of the men.C. It explained to Scotts widow what happened to him.D. It provided a detailed map of his route to the South Pole. 4.Study Figure A and Figure B below.Figure AFigure BIn the table below, fill in the correct numberof faces, vertices, and edges for Figure A andFigure B.Figure AFigure BNumberof FacesNumberof VerticesNumberof Edges 22. What is Benjamin Franklin's opinion of the Constitution? How does hereconcile this opinion with his call for the Convention delegates to give it their unanimoussupport? What percent is modeled by the grid? A grid model with 100 squares. 33What percent is modeled by the grid? A grid model with 100 squares. 33 squares are shaded. 23% 30% 33% 40% squares are shaded. 23% 30% 33% 40% A buyer has agreed to pay the state taxes associated with a new second mortgage loan of $31,000. What is the total cost? O $62.00 O $170.50 O $217.00 O $108.50 The _____, where fibers connect the brain's left and right hemispheres, thickens in adolescence, and this improves adolescents' ability to process information For many teens, adolescence can be a __________ period characterized by __________. A. confusing . . . Emotional serenity B. fun . . . Stability C. difficult . . . Change D. difficult . . . Stability