What settings does the available dual-occupant memory system retain in 2023 ariya?.

Answers

Answer 1
They’ve ithvs r to give the 4 point of negative hedgehog and bfhhehd hour

Related Questions

In a day, a car passes n
kilometers. How many days does it take to travel a route of length m
kilometers?

The program receives as input in the first line a natural number n
and in the second line a non-negative integer m
. Python code

Answers

#Calculate days.

def calculateDay(m, n):

   assert isinstance(m, int) and m >= 0, "m should be a natural number."

   assert isinstance(n, int) and n > 0, "n shouldn't be negative."

   return m/n

   

#Main function

def Main():

   m, n = input().split()

   print(f'Result: {calculateDay(int(m),int(n)):.2f} days.')

   

#Point.

if(__name__ == "__main__"):

   Main()

In a day, a car passes n kilometers. How many days does it take to travel a route of length m kilometers?The

how many words are in a direct-mapped cache with 32-bit addresses, 22-bit tags, 5-bit block offsets and a 2-bit byte offsets.

Answers

In a direct-mapped cache with 32-bit addresses, 22-bit tags, 5-bit block offsets, and 2-bit byte offsets, there are a total of 2^22 words.

The given cache configuration provides 22 bits for tags, which means that each cache line can store a unique tag value. Since each word in the cache corresponds to a unique tag, the total number of words in the cache can be calculated by raising 2 to the power of the number of bits allocated for tags, which is 2^22.

The block offset is used to determine the location within a cache line, and it is represented by 5 bits. The byte offset further refines the location within a word and is represented by 2 bits. However, these offsets do not affect the total number of words in the cache since they are used for indexing within a cache line and do not define the capacity of the cache itself. Hence, the total number of words in the cache remains determined by the number of bits allocated for tags, which is 2^22.

Learn more about cache configuration here: brainly.com/question/15022898

#SPJ11

What is the relationship between resist thickness and spin speed

b) Describe the effects on the device when photoresist is over-developed and under-developed?

c) Explain the difference between negative and positive resist?

Answers

a) Relationship between resist thickness and spin speed: The spin speed used in the process of lithography can affect the thickness of the photoresist coating on the silicon wafer. The thinner the resist layer required, the faster the spin speed used.

The resist thickness and the spin speed used are inversely proportional to each other. As the spin speed increases, the resist layer becomes thinner and the coating uniformity of the photoresist layer is reduced. Also, the film thickness uniformity is improved with lower spin speed as compared to higher spin speed. b) Effects on device when photoresist is over-developed and under-developed: Over-developed Photoresist: If the photoresist is over-developed, then it will lose the pattern and ultimately make it impossible to pattern the substrate. This will ruin the device, which will cause its malfunction.

Under-developed Photoresist :If the photoresist is under-developed, then the pattern will not be fully transferred to the substrate, which will cause the patterned device to malfunction.

c) Difference between Negative and Positive Resist: Positive Resist: In positive resist, the photoresist polymerizes when it is exposed to light. The regions exposed to light become more soluble in the developer and hence they are washed away.

Negative Resist: In negative resist, the photoresist is depolymerized when it is exposed to light. The exposed regions become less soluble in the developer and hence are not washed away. Instead, the unexposed regions are washed away.

To know more about spin speed visit:

https://brainly.com/question/15187868

#SPJ11

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted the wifi network....

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted

Answers

Answer:

if u r at school, then it might be blocked.

if not, get a vpn proxy.

(On Python/ Edhesive) Test if a date is a payday based on the day of the month (15th or the 30th).

Sample Run
Enter today's day numerically: 17
Sorry, not a payday.
Enter today's day numerically: 30
It's payday!

Answers

Answer:

day = input("Enter today's day numerically: ")

if "15" in day or "30" in day:

print("It's payday!")

else:

print("Sorry, not a payday.")

Explanation:

Ask the user what day it is and store it in a variable called, day. Write a simple if else statement to check if ut is payday or not. This program can be more advanced by having payday be a variable.

You are an intern at Lucerne Publishing.
The company needs to use multiple versions of Microsoft Once on each machine in the editing department.
Which virtualization strategy should the company use?

Answers

Answer:

jvgbicgbvhkvfvuncj gjvfjvfk fj

For your spring campaign, you're trying to influence consideration with your users. Which ad format would best support this goal?

Answers

To influence consideration with your users for your spring campaign, the best ad format to use would be video ads. Video ads can provide a more immersive experience for users and can showcase the benefits and features of your product or service in a visually engaging way.

Additionally, video ads can help build brand awareness and establish an emotional connection with your target audience, ultimately leading to increased consideration and conversion rates.

For your spring campaign, if you aim to influence consideration among users, the ad format that would best support this goal is the "Native Advertising" format. Native ads blend seamlessly with the surrounding content, making them less intrusive and more engaging for users, which can effectively drive consideration.

Learn more about video ads here:-

https://brainly.com/question/31140172

#SPJ11

How does a fully integrated Data and Analytics Platform enable organizations to convert data into consumable information and insight?

Answers

Answer: How are you

Explanation:como estas meaning

select the entire absolute phrase in the sentence. to interact with this question use tab to move through the text tokens. use space or enter to select or deselect the relevant tokens

Answers

Some examples of an absolute phrase is given below:

Weather permitting we shall meet in the evening.God willing we shall meet again.The weather being fine, we went out for a picnic.The sun having risen, we set out on our journey.It being a stormy day, we stayed inside the house.

This is because your question is incomplete as you did not include a sentence where we would have to find the absolute phrase and thus I gave you a general overview which contains some examples of an absolute phrase

What is an Absolute Phrase?

This refers to the type of phrase that contains a noun or pronoun with a participial phrase and modifies the whole sentence, unlike a participial phrase.

Hence, we can see that some examples of an absolute phrase is given below:

Weather permitting we shall meet in the evening.God willing we shall meet again.The weather being fine, we went out for a picnic.The sun having risen, we set out on our journey.It being a stormy day, we stayed inside the house.

This is because your question is incomplete as you did not include a sentence where we would have to find the absolute phrase and thus I gave you a general overview which contains some examples of an absolute phrase

Read more about absolute phrase here:

https://brainly.com/question/2182726

#SPJ1

Answer: She published her first short story, “John Redding Goes to Sea,” in the Howard University campus literary society’s magazine Stylus.

She published her first short story, John Redding Goes to Sea, in the Howard University campus literary society's magazine Stylus.

Explanation: If your looking for the answers on the quiz this is it :)

it is necessary to separate page numbers with a _____ when printing multiple pages of a document

A. Comma
B. Space
C. Period​

Answers

Answer:

A. Comma

Explanation:

In computer technology, a printer is an electronic output device (peripheral) that is used for the printing of paper documents (texts and images).

Generally, the standard text procedure for printing is to use sans-serif fonts for headlines and serif fonts for body text. This ultimately implies that, for any printed work such as novels, books, newspapers etc, it is a general rule for a printer to use sans-serif fonts for headlines and serif fonts for body text in order to enhance readability.

Also, it can be reversed in some instances by using a serif font for headlines and a sans-serif font for the body of a text.

Sometimes, when printing a document, an end user may wish to print multiple pages at a goal without any break. In order to achieve this, the user should enter the number of the pages while separating them with a comma in the print dialog box such as 1, 3, 15, 20.

Hence, it is necessary to separate page numbers with a comma when printing multiple pages of a document.

Additionally, you should use a comma for a non-sequential page (1, 3, 7, 15) and a dash for a sequential page (1-9) when printing multiple pages of a document.

HELP PLS ASAP!!!!

The desktop is
A. the application that finds everything on the computer
B. the main work area of a Mac
C. the table on which you set your Mac
D. the place to store files on a Mac

Answers

Answer:

B. the main work area of a Mac

Answer:

it is the main work space of a Mac

Explanation:

b

How to get DataGridView cell value into TextBox in C#?

Answers

To get DataGridView cell value into TextBox in C#, Set TextBox.Text property to DataGridView.SelectedCells[0].Value.ToString() in DataGridView.CellClick event handler.

To get the value of a selected cell in a DataGridView control and display it in a TextBox control in C#, you can follow these steps:

1) Subscribe to the CellClick event of the DataGridView control.

2) Inside the event handler, get the value of the selected cell using the Value property of the SelectedCells collection of the DataGridView control.

3) Convert the value to a string using the ToString() method.

4) Assign the converted value to the Text property of the TextBox control.

Here's an example code snippet:

private void dataGridView1_CellClick(object sender, DataGridViewCellEventArgs e)

{

   DataGridViewRow row = dataGridView1.Rows[e.RowIndex];

   textBox1.Text = row.Cells[e.ColumnIndex].Value.ToString();

}

This code gets the selected cell value from the row and column indices provided in the event arguments, and assigns it to the Text property of the TextBox control.

For more such questions on TextBox:

https://brainly.com/question/29607389

#SPJ11

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.
Online Content: Site 1

Describe the ways in which the speakers can cause difficulty in the listening process. (Site 1)

Answers

Ways in which speakers can cause difficulty in the listening process are speaking indistinctly, rapidly, or impolitely, leading to disinterest and intimidation.

Challenges in the listening process

We must explain here that we do not know which site we should access to obtain information for this question. Therefore, we will provide you with an answer that will likely help you, containing the most common difficulties and challenges concerning the listening process.

It can be challenging to listen to someone who speaks softly, indistinctly, curtly, rapidly, tediously, or in a discourteous tone. Moreover, if the speaker expresses something contentious or impolite or loses concentration while speaking, it can lead to the listener feeling uneasy or disinterested in what is being conveyed.

Learn more about the listening process here:

https://brainly.com/question/806755

#SPJ1

The lost boy gave the correct
(A)
adress
(B)
addres
addrest
address
to the policeman.

Answers

Answer:

address to the police man

The lost boy gave the correct ADDRESS to the policeman

What is/are the correct increasing order of downlink of satellite bands? Select one or more: □ a. L < Ku ​

What is/are the correct increasing order of downlink of satellite bands? Select one or more: a. L &lt;

Answers

The correct increasing order of downlink satellite bands is -  L < S < C < Ku < Ka (Option B).

How is this so?

It is to be noted that the   order of downlink satellite bands is based on their frequencies,with lower frequencies being assigned to longer wavelengths.

In this case,   L-band has lower frequency thanS -band, C-band has lower frequency than both L-band and S-band, and so on, resulting in the order L < S < C < Ku < Ka.

The   downlink satellite bands,in increasing order of frequency are:

L-bandS-bandC-bandKu-band and Ka-band.

Learn more about Satellite bands:
https://brainly.com/question/31384183
#SPJ1

Why is feedback from other people important when you create software?

Feedback connects your software to programming libraries.
Feedback helps you know what is good or bad about your program.
Feedback automatically fixes the errors in your code.
Feedback tells users how to use your software program in the right way.

Answers

The reason why feedback from other people is important when you create a software application (program) is: B. Feedback helps you know what is good or bad about your program.

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software programs (applications).

Basically, there are six (6) main stages involved in the creation of a software program and these are;

Planning.Analysis.Design.Development (coding).Deployment.Maintenance.

After the deployment of a software program, the developers usually take feedback from end users, so as to know what is good or bad about their program.

In conclusion, feedback is very important and essential for software developers because it help them to know what is good or bad about a software.

Read more: https://brainly.com/question/18369405

Answer:

k

Explanation:

Compiler software has a stepping function that

A. runs code line by line to help developers find bugs.
B.translates the software program code into machine language.
C.fixes syntax errors as it compiles.
D. finds and removes the loops in the software program.
It’s not B

Answers

Answer:

Runs code line by line to help developers find bugs.

Explanation:

I took the test.

Answer:

a on edge 2021 took test .

Jen's laptop that is wirelessly connected to the home network router and turned on; her husband's PC, which connects to the router by a cable that is turned off; her mother's virus-infected computer that has been unplugged from the router; and her daughter's smartphone that is wirelessly connected to the router.

Answers

Answer:

The network is a LAN.

Explanation:

Computer networks are interconnection and intercommunication of computer devices to share resources. There are several types of computer networks, they are, LAN or local area network, WAN or wide area network, PAN or personal area networks, etc.

A LAN is a network of computer devices ranging from a floor of a building to the building of more. WAN is a network of LANs while a PAN is just a short 10-meter network between two Bluetooth connected devices.

The network described in the question is a wireless LAN or WLAN which is still a local area network.

Answer:

a LAN

Explanation:

Which of the following statements is true of the impact of the Internet on global marketing? a. In all respects, going global on the Internet is harder than it has ever been before. b. The global "Internet economy" is no longer restrained by the old brick-and-mortar rules, regulations, and habits. c. Opening an e-commerce site on the Internet immediately puts a company in the international marketplace. d. An e-commerce site of a firm in one country cannot be accessed by people in another country.

Answers

The statement that is true of the impact of the Internet on global marketing is option  b. The global "Internet economy" is no longer restrained by the old brick-and-mortar rules, regulations, and habits.

The Internet has revolutionized global marketing by eliminating many of the traditional barriers and limitations of brick-and-mortar businesses. It has created a global "Internet economy" that operates in a more flexible and borderless manner, allowing businesses to expand their reach and engage with customers worldwide.

Unlike option a, going global on the Internet can be easier in some aspects due to the accessibility and global reach provided by online platforms. Option c is partially correct as opening an e-commerce site does put a company in the international marketplace, but it doesn't guarantee immediate success or prominence. Option d is false as an e-commerce site can be accessed by people in different countries as long as there are no regional restrictions or limitations imposed by the company itself.

In summary, option b accurately describes the transformative impact of the Internet on global marketing, empowering businesses to transcend traditional boundaries and operate in a more dynamic and unrestricted digital landscape.

Learn more about Internet here;

https://brainly.com/question/30426819

#SPJ11

system of knotted strings for record-keeping and communication

Answers

The system of knotted strings for record-keeping and communication is called Quipu.

What is the quipu

Quipu was used by several ancient civilizations, most notably the Inca civilization in pre-Columbian South America. It consists of a series of strings made from cotton or camelid fibers, such as llama or alpaca, with knots tied at different intervals and positions along the strings. The knots and their arrangement represented various types of information, including numerical data, accounting records, historical events, and even narratives.

The complexity of the quipu system allowed for the encoding and storage of a wide range of information. Different colors, types of fibers, and knot patterns were used to convey specific meanings.

Reda more on communication  here https://brainly.com/question/28153246

#SPJ4

Why is it important to take precautions such as turning off a computer and discharging electricity before
opening the case on a computer?
O The case requires battery operation only when being opened.
O The case is locked until the computer is unplugged.
/
O Memory will be lost if the case is removed while connected to electricity.
O The internal components are static sensitive.

Answers

The reason why is it important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer is: "The internal components are static sensitive." (Option D)

What is the rationale for the above response?  

It is important to take precautions such as turning off a computer and discharging electricity before opening the case on a computer because the internal components of a computer are sensitive to static electricity.

Static electricity can build up in the body or in clothing and can cause a discharge of electricity when in contact with sensitive electronic components. This discharge can damage or destroy the components, leading to the malfunctioning or failure of the computer.

By turning off the computer and discharging any residual electricity, the risk of a static discharge is minimized.

Learn more about static sensitive at:

https://brainly.com/question/18354578

#SPJ1

Months Write a program that will ask the user for a month as input in numeric format and print out the name of the month. Here is a sample run: Enter the Month: 9 It is september!

Answers

The program prompts the user to enter a month in numeric format and then prints the corresponding name of the month. For example, if the user enters 9, the program will output "It is September!" as the result.

To implement this program in Python, we can define a dictionary that maps numeric month values to their corresponding names. The program will ask the user to input a numeric month value. It will then retrieve the corresponding month name from the dictionary and print it along with a message. Here's an example implementation:

def print_month_name():

   month_dict = {

       1: "January",

       2: "February",

       3: "March",

       4: "April",

       5: "May",

       6: "June",

       7: "July",

       8: "August",

       9: "September",

       10: "October",

       11: "November",

       12: "December"

   }

   month_number = int(input("Enter the Month: "))

   if month_number in month_dict:

       month_name = month_dict[month_number]

       print("It is", month_name + "!")

   else:

       print("Invalid month number.")

print_month_name()

In this program, the dictionary month_dict maps numeric month values (keys) to their corresponding month names (values). The program prompts the user to enter a month number. If the entered number exists as a key in the dictionary, the corresponding month name is retrieved and printed along with the message "It is [month name]!". If the entered number is not found in the dictionary, an error message is displayed.

Learn more about Python here: https://brainly.com/question/30427047

#SPJ11

Currently, the enforcement of hipaa privacy and security rules is the responsibility of the:_________

Answers

Currently, the enforcement of HIPAA privacy and security rules is the responsibility of the Office for Civil Rights (OCR) within the U.S. Department of Health and Human Services (HHS).

The OCR is responsible for ensuring that healthcare providers, health plans, and healthcare clearinghouses that handle protected health information (PHI) comply with the HIPAA Privacy, Security, and Breach Notification Rules. The HIPAA Privacy Rule establishes national standards for protecting individuals' PHI, while the Security Rule establishes standards for securing electronic PHI (ePHI). The Breach Notification Rule requires covered entities to notify individuals in the event of a breach of their unsecured PHI. The OCR carries out its enforcement responsibilities through a variety of activities, including investigating complaints filed with the agency, conducting compliance reviews, and providing technical assistance to covered entities to help them understand and comply with the HIPAA Rules.

Learn more about agency here-

https://brainly.com/question/15129864

#SPJ11

in zen cart, what is not a type of catalog restriction? A.store-wide B.authorization-based C.login-based D.authentication-based

Answers

A.store-wide is not a type of catalog restriction in Zen Cart. Zen Cart has excellent plug-ins and integrations as well as a lot of flexibility for technical users.

What is the Zen Cart process?

Businesses can highlight featured and special products using the software, in addition to the category and product navigation features. The address, payment, and final order confirmation will all be collected during the checkout process after a product has been added to the shopping cart.

Zen Cart has excellent plug-ins and integrations as well as a lot of flexibility for technical users. The fact that it is unable to provide services to users with no prior technical experience is a drawback, which results in a lower overall score.

To learn more about Zen visit :

https://brainly.com/question/28154516

#SPJ1

Write a python program using "Nested if statement" that will

ask the users to enter their age and if they are registered to

vote. Then print a message informing them that they can vote,

or a message explaining why they cannot vote (underage or not.

registered)

They can vote only if they are over 17 years of age and

registered to vote.

o

O

Answers

The Python program using nested if statements that will ask the user for their age and if they are registered to vote. The program will then print a message to inform them if they can vote or not.

The program first asks the user to input their age as an integer using the `input()` function and converting it to an integer using the `int()` function. The program then asks if the user is registered to vote using the `input()` function. The program uses a nested if statement to check if the user is eligible to vote.

The outer if statement checks if the user is 18 years or older. If the user is 18 years or older, the inner if statement checks if the user is registered to vote. If the user is registered to vote, the program prints a message informing them that they can vote. If the user is not registered to vote, the program prints a message explaining why they cannot vote.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11



The CPU is a 8-bit computer with 16 bit address lines. You must connect 8 KB of ROM and 16KB of RAM to the CPU. 2. few constraints: a. Memory chip size for both the ROM and RAM chips is 4 KB. b. You can choose any chip select circuit that you want to use. 3. The design must look nice and have the following components: a. The ROM address has to start from 0000H. You must figure out the various address ranges and show them clearly in your design. b. The design should be legible and must clearly show all the components including CPU, memory chips, CS circuit(s), ALE signals etc. c. The design must use the least number of resources. d. Write a short memo of the various decisions that you took for the design, and why you took them

Answers

The design requires connecting an 8-bit CPU with 16-bit address lines to 8 KB of ROM and 16 KB of RAM. The memory chips are 4 KB in size, and a chip select circuit needs to be implemented.

To design the memory layout for the given constraints, we can divide the ROM and RAM chips into multiple sections to cover the required address ranges.

For the ROM, since it is 8 KB in size and each chip is 4 KB, we can use two ROM chips. The first chip can be connected to the lower address range, 0000H to 3FFFH, and the second chip can be connected to the upper address range, 4000H to 7FFFH.

For the RAM, since it is 16 KB in size and each chip is 4 KB, we can use four RAM chips. The first chip can be connected to the lower address range, 0000H to 3FFFH, and the remaining three chips can be connected to the higher address ranges, 4000H to BFFFH.

To ensure proper chip selection, a chip select circuit can be implemented using decoding logic. This circuit will generate the chip select signals based on the address lines from the CPU.

The design should be presented in a clear and organized manner, visually depicting the CPU, memory chips, chip select circuit, and address ranges. A short memo explaining the design decisions should be included, highlighting the rationale behind the choices made to meet the given requirements.

Learn more about memory design here:

https://brainly.com/question/33326330

#SPJ11

does anyone know what type of Honda this is and the year of it lol this isn’t school related

does anyone know what type of Honda this is and the year of it lol this isnt school related

Answers

my car guy boyfriend said that he thinks its a van due to the space and its definitely a newer Honda but not sure what year. he said don't quote him on it  tho lol

1. how many records does this file contain? 2. what problem would you encounter if you wanted to produce a listing by city? how would you solve this problem by altering the file structure?

Answers

There is not a field for city, only manager's address. In order to get a listing by city, you would have to break up the address into address, city, state, zip, file format.

What is file structure?

A file structure is a combination of data models stored within files. It is also a set of operations for gaining access to data. It allows programs to read, write, and modify data. File structures can also aid in the discovery of data that meets specific criteria. An improvement in file structure can make applications hundreds of times faster.

The primary goal of creating file systems is to minimize the number of disk trips needed to retrieve desired data. It ideally corresponds to obtaining what we require in as few 's database as possible.Although slow, disks provide enormous capacity at a lower cost than memory. They also retain the data stored on them even when turned off. The main driving force behind file structural system is the slow access time of a disk and its enormous, nonvolatile capacity.

To learn more about file structure refer to:

brainly.com/question/30332434

#SPJ4

which array definition is illegal (even if it may compile on some compilers)? int size = 3; int a1[size]; int a2[3]; int a3[3]{}; int a4[] = {1, 2, 3}; int a5[3] = {1, 2};

Answers

The illegal array definition among the given options is int a5[3] = {1, 2};.

In C++, when specifying the size of an array during initialization, the number of elements provided in the initializer list must match the specified size. In the case of int a5[3] = {1, 2};, the initializer list contains only two elements (1 and 2), which is fewer than the specified size of 3. This will result in a compilation error because the number of elements provided does not match the size of the array.  To fix this issue, either the size of the array should be reduced to match the number of elements in the initializer list, or the initializer list should be extended to include the appropriate number of elements.

learn more about illegal array here :  

https://brainly.com/question/31787826

#SPJ11

How to you convert (both positive and negative integers) denary to Two’s complement and vice versa?

Answers

Answer:

To convert from decimal to binary, one approach is to repeatedly divide by 2 as integer division and write down the remainders from right to left:

example: convert 26 to binary

26 / 2 = 13, no remainder => write down 0

13 / 2 = 6, remainder 1 => write down 1

6 / 2 = 3, no remainder => write down 0

3 / 2 = 1, remainder 1 => write down 1

1 / 2 = 0, remainder 1 => write down 1

So 11010 is your result.

For 2's complement, you have to consider youre entire word size. Let's say you have 8 bit representations, then 11010 is really 00011010.

To get the 2's complement, you invert the binary represenation and add 1:

00011010 => 11100101

11100101 + 1 = 11100110 (understand binary addition for this)

So 11100110 is the binary representation of -26.

You can do this entire sequence in reverse, i.e. subtract one, invert and then go back to the decimal representation:

11010 in decimal is 1·2⁴ + 1·2³+ 0·2²+ 1·2¹+ 0·2⁰ = 26

Other Questions
-28 is 10 less than a number n Why was the school government created? Of the total number of books in a library, 50% are non fiction,. 30% are historical fiction, and the rest are science fiction. There are 102 science fiction books in the library. How many books in the library are historical fiction? PLEASE IDENTIFY THE COMMON NOUNS IN EACH OF THE FOLLOWING SENTENCES:Common Noun - a person, place, thing or idea that is not specific.1. Sally sells seashells by the seashore.2. Bob wants to buy a television and a computer.3. The table is tall.4. School is starting with distance learning this year.5. We can still learn a lot if we study and remember to do all of our work. The Drug Concept MapHarmful EffectsClassificationClassificationHarmfulEffectsHarmful EffectsClassificationRClassificationHarnsful EffectsSHarmful EffectsClassificationClassificationHarmful Effects Refer to A&B Foods. If the company estimates its bad debts at 4% of net credit sales, what amount will be reported asbad debt expense for 2012? HELP fast please! ill mark you how is conductive hearing loss different from sensory hearing loss? when landing after a spectacular somersault, a 25.0 kg gymnast decelerates by pushing straight down on the mat. calculate the force (in n) she must exert if her deceleration is 9.00 times the acceleration of gravity. (enter a number.) select the digit in the ten thousand place for 542,970 The owner of a small store buys coats for $ each. Answer parts a and b.a. sells the coats for $ each. What percent of the purchase price is the sale price?The sale price is Your answer is not correct. The correct answer is 140. You answered 55.% of the purchase price.b. The owner increases the sale price by the same percent that you found in part a when buys jackets for $25 and sells them. How many jackets must the owner buy for the total jacket sales to be at least $260 ? Explain your answer. I would like you identify ONE example of cash flow for each typeof activity (operating , investing, and financing) of a restaurantbusiness. Briefly justify your choices and state whether they arein CUAL FUE EL ROL QUE DESEMPEARON LAS MUJERES EN EL DESARROLLO DEL QUEHACER CIENTFICO: LA RELACIN ENTRE CIENTFICOS Y CIENTFICAS UNA RELACIN ASIMTRICA can someone please help me i will mark brainliest please help me asap if you know spanish i will give brai A ________ musical genre is a type of music that combines two or more previously existing styles. Rock music is considered the most famous example as it combined blues, country, western swing, rockabilly, and some jazz elements. The exam scores (out of 100 points) for all students taking an introductory Statistics course are used to construct the following boxplot. Box plot About 25% of the students scores exceeded The ratio of red jellybeans to purple jellybeans is 9:5. What fraction of the jellybeans are red?PLEASE HELP BEST ANSWER GETS BRAINLEST 1. A cylindrical metal bar 50cm long and bom indiameter is pulled out to form a wire of diameter3 ml.what's length is the wire . An atom with 8 protons is-