True/False 1. The FPU can perform operations on non-numbers (NaNs). (T/F) 2. All exceptions detected by the FPU are always handled automatically. (T/F) 3. SSE added XMM registers 128 bits wide. (T/F) 4. AVX is backward compatible with SSE. (T/F) 5. Generally, floating-point implementations can also operate on integers. (T/F)

Answers

Answer 1

1. The FPU can perform operations on non-numbers (NaNs). (False)

2. All exceptions detected by the FPU are always handled automatically. (False)

3. SSE added XMM registers 128 bits wide. (True)

4. AVX is backward compatible with SSE. (True)

5. Generally, floating-point implementations can also operate on integers. (True)

1.The FPU (Floating Point Unit) cannot perform operations on non-numbers (NaNs). It is a type of arithmetic unit which is specifically designed to perform floating-point arithmetic operations.

2.The FPU detects all exceptions, but the software or the program has to handle them. These exceptions are then notified to the programmer through interrupt handlers.

3.The SSE (Streaming SIMD Extensions) instruction set architecture added XMM registers that are 128 bits wide. These registers provide higher data processing capabilities compared to FPU.

4.The AVX (Advanced Vector Extensions) instruction set architecture is backward compatible with SSE instruction set architecture. This means that the processors which support AVX can execute SSE instructions too.

5.Generally, floating-point implementations can also operate on integers. Although the Floating Point Unit is specifically designed to handle floating-point numbers, it can also operate on integers.

Learn more about software at

https://brainly.com/question/20355032

#SPJ11


Related Questions

A PIN is easier for the account owner to use and remember because it is shorter than a password. However, a PIN can only be used once. However, it is also easier for hackers to steal. However, a password can safely be stored. However, it is more difficult for hackers to steal.

Answers

Answer:

Pin

Explanation:

Pin number works for me.

What is the output? void iseven(int num) { int even; if (num == 0) { even = 1; } else { even = 0; } } int main() { iseven(7); cout << even; return 0; }

Answers

The outpot based from the code is No output. It is because a compiler error occurs due to unknown variable even.

A compiler is a program that is used to convert code written in natural language processing so that it can be understood by computers. So, the main task of a compiler is to do conversion for the code. There are two types of compilers:

A cross compiler that runs on machine 'A' and generates code for another machine 'B'.Source-to-source compiler, which is a compiler that translates source code written in one programming language into source code in another programming language.

Learn more compiler https://brainly.com/question/28232020

#SPJ4

Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly

Answers

Explanation:

1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem

2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.

The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:

One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.

In conclusion, the above method will be used for the troubleshooting.

Read related link on:

https://brainly.com/question/18275236

What is remote viewing CCTV?

Answers

The full form of CCTV is generally known as closed circuit television.

What is CCTV?

CCTV is an abbreviation for closed circuit television and it can be defined as a television system that makes use of video cameras to privately transmit digital signals to a specific location (place), especially for the purpose of security surveillance and monitoring of an environment.

The importance of CCTV is that it ultimately implies that, a closed circuit television (CCTV) is primarily used for enhancing the security of a location wherein it is installed.

Therefore, The full form of CCTV is generally known as closed circuit television.

Learn more about CCTV on:

brainly.com/question/23348225

#SPJ1

Topic: Video Games.


What game is the song "Lost in Thoughts all Alone" from? I will give you a hint: It's a JRPG.


Please...No links or gibberish.

Answers

Answer:

Fire Emblem

Explanation:

what is combo chart ? how will you created a combo chart​

Answers

Answer:

A combo chart is a combination of two column charts, two line graphs, or a column chart and a line graph. You can make a combo chart with a single dataset or with two datasets that share a common string field.

Explanation:

A combo chart is a combination of two column charts, two line graphs, or a column chart and a line graph. You can make a combo chart with a single dataset or with two datasets that share a common string field.

On the Insert tab, in the Charts group, click the Combo symbol.

Click Create Custom Combo Chart.

The Insert Chart dialog box appears. For the Rainy Days series, choose Clustered Column as the chart type. For the Profit series, choose Line as the

Write a c program that uses iteration to find the sum of all multiples of 3
and all multiples of 4 between 3 and 150 inclusive. Print the sum.

Answers

#include<stdio.h>

int main()

{

int sum_3=0, sum_4=0; //Variable to store the sum of multiples of 3 and 4

for(int i=3; i<=150; i++) //Iterating from 3 to 150

{

if(i%3==0) //Checking if i is a multiple of 3

sum_3 += i; //Adding i to the sum of multiples of 3

if(i%4==0) //Checking if i is a multiple of 4

sum_4 += i; //Adding i to the sum of multiples of 4

}

printf("Sum of multiples of 3: %d\n", sum_3); //Printing the sum of multiples of 3

printf("Sum of multiples of 4: %d\n", sum_4); //Printing the sum of multiples of 4

return 0;

}

You are asked to optimize a cache design for the given references. there are three direct-mapped cache designs possible, all with a total of eight words of data:

Answers

Answer:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Explanation:

Computer Science. Computer Science questions and answers. You are asked to optimize a cache design for the given references. There are three direct-mapped cache designs possible, all with

Which one of the following is a type of network security?
a) Login Security
b) Rights Security
c) Both (a) and (b)
d) Neither (a), nor (b)


Answers

Answer:

I think it's (login security)

State true or false: for every high level language, there are certain grammatical rules, violation of which a comp

Answers

true pls make me brainlyest

I request that it is done in C++. Giving 100 points. To find the number of 100 dollar bills, 20 dollar bills, 10 dollar bills, 5 dollar bills, 1 dollar bills, quarters, dimes, nickels, and pennies that will make up an amount entered by the user.


Sample Output:


Enter Amount: 489.98


The number of 100 dollar bills: 4

The number of 20 dollar bills: 4

The number of 10 dollar bills: 0

The number of 5 dollar bills: 1

The number of 1 dollar bills: 4

The number of Quarters: 3

The number of Dimes: 2

The number of Nickels: 0

The number of Pennies: 3

I have this so far.(look at attachment)

Answers

A program that finds the number of 100 dollar bills, 20 dollar bills, 10 dollar bills, 5 dollar bills, 1 dollar bills, quarters, dimes, nickels, and pennies that will make up an amount entered by the user.

The Program

#include<iostream>

using namespace std;

int main () {

    double bill=0.0, twenty=0.0, ten=0.0, five=0.0, one=0.0, quarter=0.0, dime=0.0, nickel=0.0, penny=0.0, payment=0.0, cashBack=0.0;

    // We need to gather a value for the bill.

    while (bill==0) {

    cout << "Please enter the amount of the bill (ex. $15.67): \n";

    cin >> bill;

    cout << "Your bill is "<< bill << ".\n";

    }

    do {

    cout << "Please pay for bill by entering \nthe count of each dollar bill denomination and coin denomination.\n";

    // Gathers an amount for each denomination and then gives it a value equal to its monetary value.

    cout << "\nTwenty dollar bills:"; cin >> twenty;

    twenty *= 20.00;

    cout << "\nTen dollar bills:"; cin >> ten;

    ten *= 10.00;

    cout << "\nFive dollar bills:"; cin >> five;

    five *= 5.00;

   cout << "\nOne dollar bills:"; cin >> one;

    one *= 1.00;

    cout << "\nQuarters:"; cin >> quarter;

    quarter *= .25;

    cout << "\nDimes:"; cin << dime;

    dime *= .10;

    cout << "\nNickels:"; cin >> nickel;

    nickel *= .05;

    cout << "\nPennies:"; cin >> penny;

    penny *= .01;

          // Add the money together and assign the value to payment.

          payment = twenty + ten + five + one + quarter + dime + nickel + penny;

          cout << "\nYour payment totals: $" << payment << "\n";

          if (payment < bill) {

                 cout << "\nYou didn't pay enough money to cover the bill. \nPlease re-enter your amount.\n";  

          // If payment isn't greater than bill then they're asked to reenter their money.

          }

          // Determine the amount of cash to give back and assign the value to cashBack.

                 cashBack = payment - bill;

          } while (cashBack <= 0);

    cout << "\nI owe you $" << cashBack <<"\n";

    // Reset the values of each denomination to 0

    twenty = 0;

    ten = 0;

    five = 0;

    one = 0;

    quarter = 0;

    dime = 0;

    nickel = 0;

    penny = 0;

    // These while loops will subtract the monetary value from cashBack and add a value of 1 each time it is looped.

    while (cashBack >= 20) {

    cashBack -= 20;

    twenty += 1;

    }

    while (cashBack >= 10) {

    cashBack -= 10;

    ten += 1;

    }

    while (cashBack >= 5) {

    cashBack -= 5;

    five += 1;

    }

    while (cashBack >= 1) {

    cashBack -= 1;

    one += 1;

    }

    while (cashBack >= .25) {

    cashBack -= .25;

    quarter += 1;

    }

    while (cashBack >= .10) {

    cashBack -= .10;

    dime += 1;

    }

    while (cashBack >= .05) {

    cashBack -= .05;

    dime += 1;

    }

    while (cashBack >= .01) {

    cashBack -= .01;

    penny += 1;

    }

    // For each denomination that has a value greater than 0, the person is payed back the amount.

    if  (twenty > 0) {

         cout << "\n" << twenty << " Twenty dollar bills.\n";

    }

    if  (ten > 0) {

          cout << "\n" << ten << " Ten dollar bills.\n";

    }

    if  (five > 0) {

          cout << "\n" << five << " Five dollar bills.\n";

    }

    if  (one > 0) {

          cout << "\n" << one << " One dollar bills.\n";

    }

    if  (quarter > 0) {

          cout << "\n" << quarter << " Quarters.\n";

    }

    if  (dime > 0) {

          cout << "\n" << dime << " Dimes.\n";

    }

    if  (nickel > 0) {

          cout << "\n" << nickel << " Nickels.\n";

    }

    if  (penny > 0) {

          cout << "\n" << penny << " Pennies.\n";

    }

}

Read more about C++ programming here:

https://brainly.com/question/20339175

#SPJ1

Which of the following are addressed by programing design? Choose all that apply.

Who will work on the programming
The problem being addressed
The goals of the project
The programming language that will be used

Answers

Answer:

Its B, D, and E

Explanation:

Hope this helps

Answer:

3/7

B

D

E

4/7

Just a page

5/7

B

C

6/7

Page

7/7

A

B

D

Advanced persistent threat (APT) attackers want to ________. Select one: a. create awareness for their causes b. remain unnoticed so they can continue to steal data c. conduct cyberwarfare d. reveal weaknesses in business and government websites and then force them offline

Answers

Answer:

Option b (remain unnoticed so they can continue to steal data) is the right approach.

Explanation:

APT seems to be sustained but instead designed to target coordinated attack whereby an attacker achieves network access including a longer length of time impossible to conceive.Usually, APT assaults become targeted at organizations throughout fields including such national security, engineering, as well as the financial services industry, as they make increased-value details.

There are 3 other possibilities not relevant to just the given case. So that the option here was the right one.

What is the danger of open-source software when it comes to military robotics?

Answers

Answer:

The issue with open source software is that it is usable (and editable) by anyone. When it comes to military robotics, the software that is used to run the robots must remain confidential. If it is not, anyone could take the software that the military is using to make their robots function and replicate it, which could be extremely dangerous.

Explanation:

Open source software is available to the general public.

Feel free to copy and paste this or put it into your own wording. Have a nice day!

the strip method returns a copy of the string with all leading and trailing whitespace characters removed. group of answer choices true false

Answers

The given statement is true because Strip() method is a built-in method in Python.

It is used to remove the whitespaces or spaces from the beginning and end of a string. It is a string method, which is used to strip or remove the leading and trailing characters from a string. These characters can be any whitespace or any other specified characters.

It does not modify the original string, but it returns a new string. The syntax of the strip() method is as follows: string. strip([chars])Here, string is the required input string. And chars are the optional parameters. It specifies the characters to be removed.

It removes the whitespace characters. If the character is not present in the input string, it will not be removed. The return value of the strip() method is a string without leading or trailing whitespace characters. The original string remains unchanged. Example: String = "  Hello World  "Stripped_string = String.strip()print(Stripped_string)Output: Hello World

In this example, we are using the strip() method to remove the leading and trailing whitespaces from the string. We get a new string, which is a copy of the original string without the leading and trailing whitespaces.

for more such questions on Python.

https://brainly.com/question/28989594

#SPJ11

Write a program code to accept the names of 3 users and generate a user name as shown in the example. Accept the name of 3 user in the format – Firstname Last name (eg. Anan Gupta). Select the first 3 characters from the first name, add # and then add last 3 characters of the last name. Display the newly generated user name along with the names that were input.

Answers

Answer:

Explanation:

The following code is written in Python and is a function that loops three times asking for the last name and first name. Then it uses this information to create a username. Finally, each of the names and usernames is printed on the screen.

def userName():

   for x in range(3):

       last_name = input("What is your last name: ")

       first_name = input("What is your first name: ")

       username = first_name[:3] + "#" + last_name[-3:]

       print(last_name + ", " + first_name)

       print(username)

Which of the following can you use to judge source legitimacy?
A. The location the work was published in
B. How popular the author is
C. Date

Answers

Answer:

The answer is A

Explanation:

To judge a sources legitimacy is to find factual evidence on a page. Does the page use sources as well? Does the source come from a domain such as: .edu .gov etc.? Does the author show non opinions? If the answer to these questions is yes then your credible resource is accurate.

Well, I think it would depend... I would say it's B. since if it's a popular author, people must know that person as being a certain way, such as if they are credible, or they are a satire source. It could technically be date too, but I feel like it's more logically to go with B. the popularity of the author.

Do you think more devices connect to the internet wirelessly or wired? Why?

Answers

Answer:

yes morr devices connect to the internet wirelessly b cos no wire in BTW dat can cos destruction like if d wire has been peeled

Explanation:

plz give me brainiest

help
If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van" how many binary decision variables would we need to code this data into a usable format?

Answers

If we are looking at the predictor "car type," which can take on the values "sedan" "coupe" "truck" "suv" "van", we would need 4 binary decision variables to code this data into a usable format.

A binary decision variable is a variable with only two possible values: 1 or 0. The variable is referred to as a binary variable, a binary indicator, or a 0-1 variable .The binary variable is used to answer yes/no questions. the binary variable " the binary variable is set to 0.To code the car type data into a usable format, we can use the binary decision variables.

We can use four binary variables to code the data into a usable format. We can use one variable for each category of car type. The values of the binary variables for the different categories are as follows:Sedan - 1000Coupe - 0100Truck - 0010SUV - 0001Using this format, if a car is a sedan, its binary decision variable would be set to 1000. If a car is a coupe, its binary decision variable would be set to 0100, and so on.

To know more about sedan visit:

https://brainly.com/question/24286177

SPJ11

of the two encryption modes supported by ipsec, what mode is more secure, and why?

Answers

The encryption mode that is more secure in IPsec is the tunnel mode.

Explanation:

Tunnel mode provides a higher level of security compared to the transport mode because it encrypts not only the payload (data), but also the original IP header. This provides additional protection against attacks like IP address spoofing, as the attacker would not be able to access the original IP header. Tunnel mode is typically used for gateway-to-gateway VPNs, where the entire original packet needs to be encrypted before being sent across the network.

On the other hand, transport mode only encrypts the payload (data) and leaves the original IP header intact. It is used for end-to-end communication, where the source and destination hosts are both participating in the IPsec VPN. While transport mode is faster and more efficient than tunnel mode, it is less secure as it leaves the original IP header unencrypted, which can be vulnerable to certain attacks.

To know more about  IP address spoofing click here:

https://brainly.com/question/15179149

#SPJ11

the y axis is plotted in what direction microsoft powerpoint

Answers

Answer :
the x-axis runs left and right and the y-axis runs up and down.

Hope this helps :)

plzzz help i need this today :(

plzzz help i need this today :(

Answers

Answer:

C

Explanation:

Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?

Answers

Answer:

See explanation

Explanation:

Irrespective of the programming language, the input() function will allow Cheri's program to be able to accept user input.

Take for instance, the programming language is python, an expample of how the input function can be used is:

userinput = input("Enter a word: ")

The above instruction will allow her program to accept a string value.

The input() function can be used alongside different variable types.

Answer:

give the other guy brainliest

Explanation:


Which of the following are peripherals?
Rasterize
Sneaker-net
Media access control
None of the above

Answers

Answer:

D

Explanation:

A peripheral or peripheral device is ancillary device used to put information into and get information out of the computer.

Answer: D

Explanation:

The range function must have two parameters?

True
False

Answers

Answer: False

Explanation:

Hi there,

I hope you and your family are staying safe and healthy!

The answer is False because the range must have 3 parameters.

Happy to help! All the best this semester!

Which of the following is true?
Results of analyses (such as frequencies and means) will appear in the Console window.
Opening an R script will result in the program being shown in the bottom right corner of the RStudio screen.
One way to open an R script in RStudio is to click on the History tab in the top right corner of the RStudio screen.
Plots (such as boxplots and histograms) will appear in the Results window

Answers

The statement "Plots (such as boxplots and histograms) will appear in the Results window" is true. In RStudio, when generating plots using R code, the resulting plots are typically displayed in the Plots pane or window, which is located by default in the bottom right corner of the RStudio screen. The Plots pane provides a convenient and interactive way to view and manipulate plots.

The Console window, on the other hand, is where R code is executed and where the results of analyses, such as frequencies and means, are displayed. It shows the output generated by R when executing commands or running scripts.

The History tab mentioned in one of the options is not accurate. The History tab in RStudio displays a list of previously executed commands or lines of code from the current R session, allowing users to review and re-execute them if needed.

Opening an R script in RStudio can be done by using the File menu or toolbar options, or by opening a plain text file with the ".R" extension. Once opened, the R script appears in the Source pane or window, which is typically located in the top left corner of the RStudio screen. This pane provides a text editor specifically designed for editing and executing R code.

Learn more about code here:

https://brainly.com/question/1720419

#SPJ11

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

Routers operate at: (Select two answers)
1) Physical layer of the OSI model
2) Application layer of the OSI model
3) Layer 3 of the OSI model
4) Network layer of the OSI model
5) Layer 5 of the OSI model

Answers

Routers operate at the network layer (layer 3) and are responsible for directing data packets to their correct destination. They use routing tables and algorithms to determine the best path for each packet to take through the network.

Routers can connect different types of networks, such as Ethernet and Wi-Fi, and can also filter and prioritize traffic based on criteria such as source or destination address, type of service, or quality of service. They are essential for enabling communication between devices on different networks and for ensuring efficient and secure data transfer. However, routers do not operate at the physical layer or the application layer of the OSI model, which respectively deal with the physical transmission of data and the protocols and services that applications use to communicate with each other. Therefore, the correct answers to the question are 3) layer 3 of the OSI model and 4) network layer of the OSI model.

Learn more about Routers here:

https://brainly.com/question/29869351

#SPJ11

What do you type into an empty cell to start a formula?

An equal size (=)

A plus sign (+)

Number

Fx

Answers

Answer:The formula in MS Excel begins with an equal sign (=). ...

Constants, such as numerals or text values, can be directly entered into a formula.

Operators define the type of calculation that the formula executes.

Explanation: here hope it helps

Sunil’s basketball coach asks him to prepare a presentation for his teammates on the proper way to shoot a basketball. After researching the topic online, Sunil decides to add a visual aide to his report.

Which visual aide is the best fit for Sunil’s presentation?

a podcast describing how to shoot a basketball
a video tutorial showing how to shoot a basketball
a graph showing how many players shot a basketball
a sound bite describing a player shooting a basketball

Answers

Answer: a video tutorial showing how to shoot a basketball

Explanation:

It will show them how to shoot the basketball

Answer:

a video

Explanation:

Other Questions
3 Write an expressionto represent:"Twice a number 51increased by 51" What attitudes and activities do you encounter in today's popular culture that are similar to those supported by Marx and Smith? Are there any that are different? many physicians believe they have less control over medical decisions regarding treatment for their patients than they had in the past. Which journal entry would be made by an accountant for a business for a $1,000 purchase of inventory on 1-August?A. Inventory Cr 1,000B. Inventory Dr 1,000C. Cash Dr 1,000D. Cash Cr 1,000 Indicate the all of phrase structure rules needed for the following PPs. For example: at the store PPP NPNP Det Na. by car PP- (Det NP)b. to the zoo PP - (Detc. in this old housed. on the table in the corner of the room e. toward the end of the semester Write an equation that you can use to find the value of x'.Perimeter of triangle: 16 in. When we eat, our system takes in certain important nutrients from the food, which in turn provides us with what?carbon footprintsnutritionfood allergiesgluten What is software piracy? Check all of the boxes that apply.copying computer software or programs illegallyusing someones ideas without giving them creditmaking lots of copies and sharing with friendsbreaking the security on software so it can be used illegallyknowing the laws regarding copyright and intellectual property A scale drawing of a kitchen is shown below. The scale is 1 : 20.Show your work to determine the area of the room in square feet.SHOW YOUR WORK AND I WILL MARK BRAINLIEST T/F: Whether legitimate or otherwise, complaints are usually signs that something is wrong somewhere and deserving attention. A Boy and a Man summary What early practices strengthened and reinforced the Roman war ethos?correct - Roman soldiers stood to gain material benefitsland and valuablesas a result of successful military campaigns.--As the distribution of wealth became less equal in Rome, poor Roman citizens turned to military generals (rather than state institutions) for farmland and job opportunities.--The Romans conscripted huge numbers of young men for ten-year terms of military service, making fighting for the state a common experience and rite of passage for Roman citizens. once the lead investigator determines that all pertinent evidence at the crime scene has been located, the investigators must perform what? In December of 1865 the Thirteenth Amendment overturn the ______ decisions in the matter of slavery. what is an equation of the line that passes through the point (-3,-7) and is parallel to the line 3x-y=5 true or false: hayao miyazaki's film spirited away is impressive because it uses computer-generated imagery or cgi instead of cel animation. the pressure in the mesosphere is so low that a person could not be in this layer without a spacesuit. question 13 options: true false 1. Based on the information given in the passage, what does the author believe about Dr. Carlos Finlay? 93% of pupils receive a free school education in the UK. What do the other 7% do? The angle of elevation to the top of a tall building is found to be 14 from the ground at a distance of 1.5 mile from the base of the building. Using this information, find the height of the building.The buildings height is ? feet.Report answer accurate to 2 decimal places.