Which individual is generally considered the first computer programmer?
A. Bill Gates
B. Grace Hopper
C. Larry Page
D. Lady Ada Lovelace

Answers

Answer 1

Answer:

D. Lady Ada Lovelace

Explanation:

Answer 2

The Answer you're looking for is:

D. Lady Ada Lovelace

Explanation:

Augusta Ada King, Countess of Lovelace was an English mathematician and writer, chiefly known for her work on Charles Babbage's proposed mechanical general-purpose computer, the Analytical Engine. She was the first to recognize that the machine had applications beyond pure calculation, and to have published the first algorithm intended to be carried out by such a machine. As a result, she is often regarded as the first computer programmer.

Proof Of Answer:

The image below I hope this helped you.

Which Individual Is Generally Considered The First Computer Programmer?A. Bill GatesB. Grace HopperC.

Related Questions

Suppose you wish to run two different operating systems on one computer, you can accomplish it by using _______.
a. a multi-processor operating system
b. an embedded system
c. the system utilities
d. virtualization software

Answers

Suppose you wish to run two different operating systems on one computer, you can accomplish it by using option d. virtualization software.

What is software for virtualization?

To imitate hardware functions and build a virtual computer system, virtualization uses software.

Note that this makes it possible for IT companies to run different operating systems, applications, and virtual systems on a single server. Greater efficiency and scale economies are two advantages that follow.

Hence the use of virtualization software will help you better accomplish the task above.

Learn more about virtualization software from

https://brainly.com/question/14472242
#SPJ1

Without the use of protocols:

A. The internet would be insecure
B. Networks couldn’t function at all
C. Only businesses would be able to use the internet
D. Severs couldn’t store data

Answers

(A)

Explanation:

The Internet will be insecure

The answer would be B or ether D

What is this line called that appears and disappears in the search box

WILL MARK BRAINLIEST

What is this line called that appears and disappears in the search boxWILL MARK BRAINLIEST

Answers

Answer:

that is called the cursor.

Explanation:

A cursor is the position indicator on a computer display screen where a user can enter text.

Hope this helped!

Sort the options for formatting a table under the tab where they are located.

Sort the options for formatting a table under the tab where they are located.

Answers

Answer:

yes those are the correct order

Explanation: post protected

This type of cable is used to connect the keyboard and mouse to the computer:

PS/2 cable
Ethernet cable
HDMI cable
DVI cable​

Answers

Answer:

I'm going to have to go with PS/2 cable

Explanation:

did some research

it's the ps/2 cable

ethernet cables are for wifi

hdmi connects computer to the monitor

dvi connects to an older type of monitor

which is true regarding accessing elements of arrays and vectors? group of answer choices any arbitrary array element can be accessed, but vector elements must be accessed sequentially an access to an out-of-range index will generate an error for vectors but not necessarily for arrays any arbitrary vector element can be accessed, but array elements must be accessed sequentially an access to an out-of-range index will generate an error for arrays but not necessarily for vectors

Answers

The following statement is true regarding accessing elements of arrays and vectors is an access to an out-of-range index will generate an error for arrays but not necessarily for vectors. Option D is correct.

Both arrays and vectors are used to store and manipulate collections of elements of the same data type. However, there are differences in how they handle element access.

For arrays, any arbitrary element can be accessed by using its index, which is an integer value that identifies the position of the element in the array. However, accessing an element outside of the defined range of the array will result in an error.

For vectors, elements are stored sequentially in memory, and they must be accessed in order. Unlike arrays, vectors can dynamically resize themselves to accommodate additional elements, so attempting to access an out-of-range index may not always result in an error. Instead, the vector may resize itself to include the new element or throw an out-of-range exception.

Therefore, option D is correct.

Learn more about arrays https://brainly.com/question/31605219

#SPJ11

. List in order of priority the various gaps (factors) you would like to address in the context of your country?

Answers

Answer:

hjhjjj

Explanation:

need some points sorry emergency

task 1: add three methods: union, intersection, and difference to the interface baginterface for the adt bag. the detailed description of the three methods and how to call the three methods could be found on pages 2 and 3 of this assignment. note: the three methods to implement are for bags, not for sets.

Answers

Here's an updated Bag Interface interface with the union(), intersection(), and difference() methods added:

                             

from abc import ABC, abstract method

class Bag Interface(ABC):

  abstract method

   def add (self, item):

       pass

abstract method

   def remove (self, item):

       pass

abstract method

   def count (self, item):

       pass

abstract method

   def __ len __ (self):

       pass

abstract method

   def clear (self):

       pass

abstract method

   def __ iter __( self):

       pass

abstract method

   def union (self, other_ bag):

       pass

abstract method

   def intersection (self, other_ bag):

       pass

abstract method

   def difference ( self, other_ bag):

       pass

The union ( ) method takes another bag as input and returns a new bag that contains all the items from both bags. If an item appears in both bags, it should appear in the new bag with a count equal to the sum of its counts in both bags. The intersection ( ) method takes another bag as input and returns a new bag that contains only the items that appear in both bags. The count of each item in the new bag should be equal to the minimum of its counts in the two bags. The difference ( ) method takes another bag as input and returns a new bag that contains only the items that appear in the first bag but not in the second bag. The count of each item in the new bag should be equal to its count in the first bag minus its count in the second bag.

To learn more about BagInterface click here

brainly.com/question/30880773

#SPJ4

Aaron will only go outside if the temperature is between 62 and 78 degrees inclusive. If cell B2 contains the current temperature, write a formula that will display "may go outside" if the temperature is within the range; otherwise, it will display "will not go outside".
=IF(OR(B2>=62, B2<=78), "may go outside", "will not go outside")
=IF(AND(B2>=62, B2<=78), "may go outside", "will not go outside")
=IF(B2>=62, IF(NOT(B2<=78), "may go outside"), "will not go outside")

Answers

The formula =IF(AND(B2>=62, B2=78), "may go outside," "will not go outside,") will display "may go outside," unless the temperature is inside the range, in which case it will display "will not be going outside."

For people, how hot should it be?

A 2010 study that established 35 C as the maximum acceptable temperature—95 F at 100% humidity or 115 F at 50% humidity—is commonly cited. At this point, the body can no longer regulate its own temperature via evaporating sweat from the skin.

Is 37 degrees Fahrenheit hot or cold?

A normal temperature is between 36 and 37 degrees Celsius, but this fluctuates according to things like age, level of activity, day of the week, and method of measurement. respiratory viral illnesses, such as

To know more about display visit:

https://brainly.com/question/14413434

#SPJ1

which is NOT something that a game producer needs to do?

A- make sure the team has the tools that they need to be successful
B- create and support ways for the team to collaborate
C- plan the script, characters, and how the game is played
D- choose the programming language that will be used to develop the game

Answers

Answer:

Plan the script, characters, and how the game is played

An action that a game producer needs not to do is to plan the script, characters, and how the game is played. Thus, the correct option for this question is C.

What are the actions that a game producer needs to do?

The actions that a game producer needs to do are as follows:

They choose the programming language that will be used to develop the game.They considerably create and support ways for the team to collaborate on the same mission. They always make sure the team has the tools that they need to be successful togetherly.

Apart from this, video game producers have to manage a lot of things. Such as constructing video games, playing an executive role during each development phase, ensuring the quality of the project, managing the timeliness of the teams working on the same project (duration), etc.

Therefore, an action that a game producer needs not do is plan the script, characters, and how the game is played. Thus, the correct option for this question is C.

To learn more about Game producers, refer to the link:

https://brainly.com/question/3863314

#SPJ2

What is meant by Information Retrieval?

Read it carefully.

Hint: Join the white highlighted letters for better understanding.

:D

❌No Spam! Otherwise you will be reported❌

What is meant by Information Retrieval?Read it carefully. Hint: Join the white highlighted letters for

Answers

information retrieval is searching for information of an unstructured nature from a larger number of quantity of information

Which loop(s) would happen after another loop of movement?

Answers

The loop(s) that would happen after another loop of movement differs.

What is the  loop of movement?

In the above case, It is difficult to accurately answer this question without having more context.

Loops in programming are used to execute a block of code multiple times, and the specific order in which they are executed can depend on a variety of factors, such as the structure of the code, the values of variables, and the conditions specified within the loop.

Without more information about the specific loops in question, it is not possible to determine which loop(s) would happen after another loop of movement.

Learn more about loop from

https://brainly.com/question/19344465

#SPJ1

a website forum that has user posted comments might be vulnerable to which type of cross site scripting attack?

Answers

A website forum that has user-posted comments may be vulnerable to a reflective cross-site scripting (XSS) attack.

What is cross-site scripting (XSS) attack?

In this type of attack, an attacker injects malicious code into a website by posting it as a comment on the forum. When other users view the comment, their web browser executes the code, allowing the attacker to steal sensitive information or perform other malicious actions.

To protect against reflective XSS attacks, it is important to properly sanitize and encode user-generated content before displaying it on the website. This involves removing or escaping any potentially dangerous characters, such as HTML tags or JavaScript code, that could be used to inject malicious code. It is also a good idea to implement input validation and use content security policies to further secure the website.

To learn more about cross-site scripting (XSS) attack, visit: https://brainly.com/question/17205820

#SPJ4

algorithm and flowchart and c program to display sum of 5 different number​

Answers

The algorithm and flow chart and c program to sum of 5 different number is given below.

Describe C programming?

C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.

One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.

Here's the algorithm to display the sum of 5 different numbers:

Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.

Here's the flowchart for the same:

          Start

             ↓

Initialize sum = 0

             ↓

Prompt user for first number

             ↓

Add first number to sum

             ↓

Prompt user for second number

             ↓

Add second number to sum

             ↓

Prompt user for third number

             ↓

Add third number to sum

             ↓

Prompt user for fourth number

             ↓

Add fourth number to sum

             ↓

Prompt user for fifth number

             ↓

Add fifth number to sum

              ↓

Output sum

               ↓

            End

Here's the C program to display the sum of 5 different numbers:

#include <stdio.h>

int main() {

   int num1, num2, num3, num4, num5, sum;

   printf("Enter the first number: ");

   scanf("%d", &num1);

   printf("Enter the second number: ");

   scanf("%d", &num2);

   printf("Enter the third number: ");

   scanf("%d", &num3);

   printf("Enter the fourth number: ");

   scanf("%d", &num4);

   printf("Enter the fifth number: ");

   scanf("%d", &num5);

   sum = num1 + num2 + num3 + num4 + num5;

   printf("The sum of the numbers is %d\n", sum);

   return 0;

}

This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.

To know more about sum visit:

https://brainly.com/question/13437666

#SPJ9

For which task would you most likely use word-processing software? question 5 options: formatting text with various fonts, sizes and styles placing text in rows and columns for sorting and filtering creating slides and displaying them in a continuous loop placing numeric data in rows and columns for statistical analysis.

Answers

Answer:

Option 1, Option 2, Option 4

Explanation:

Word processors like Word and Docs can be used to format text and create visually appealing works for presentation, and, while it is used for presentation, it is not used for slideshows, meaning all of the options except making slides are correct.

The tasks for which word-processing software is required are formatting text with various fonts, sizes and styles, placing text in rows and columns for sorting and filtering, and placing numeric data in rows and columns for statistical analysis. The correct options are A, B, and D.

What is word processing software?

A word processor is a hardware or computer program that allows for the input, editing, formatting, and output of text, along with other functions.

The act of creating, editing, saving, and printing documents on a computer is referred to as word processing. Word processing requires the use of specialized software known as a Word Processor.

Word processing software is used to edit text documents such as resumes and reports. You basically enter text by typing, and the software provides tools for copying, deleting and various types of formatting.

Today, the word processor is one of the most frequently used software programs on a computer, with Microsoft Word being the most popular word processor.

Thus, the correct options are a, b, and d.

For more details regarding word processing software, visit:

https://brainly.com/question/20910519

#SPJ2

java is not preferred for programming fast-executing, native desktop applications.
a.true
b.false

Answers

The given statement that "java is not preferred for programming fast-executing, native desktop applications" is false.

What is Java?

Java is a high-level, object-oriented, class-based programming language designed to run on any computer with the Java Virtual Machine (JVM) installed. It is a general-purpose programming language that is used for developing mobile applications, games, web-based applications, and other software that can be run on a variety of hardware platforms. Java is a fast, secure, and reliable language that is widely used by programmers all over the world.

Why Java is preferred?

Java is the best option for creating fast-executing, native desktop applications because of its platform independence, scalability, and security features. Java is also the preferred language for developing web-based applications because it has the ability to run on a variety of operating systems, including Windows, Mac OS X, and Linux. This makes it a great choice for developers who need to build applications that can run on a variety of devices, from desktops to smartphones. So, Java is preferred for programming fast-executing, native desktop applications.

Therefore, the given statement is false.

Learn more about Java: https://brainly.com/question/12978370

#SPJ11

Which of the following was (and still is) used by computer programmers as a first test program?

Answers

Answer:

The "Hello World!" program

Explanation:

Options are not given, However, the answer to the question is the "Hello World!" program.

For almost all (if not all) programming language, this program is always the test program.

In Python, it is written as:

print("Hello World!")

In C++, it is:

#include <iostream>

int main() {

   std::cout << "Hello World!";

   return 0; }

Answer:

the following was (and still is) used by computer programmers as a first test program is "Hello world!".

and its computer program is:

Explanation:

\(\:{example}\)

#include <stdio.h>

int main()

{

/* printf() displays the string inside

quotation*/

printf("Hello, World!");

return 0;

}

What software maintain and increase the efficiency of a computer system?

Answers

Answer:

Computer maintenance software

Explanation:

Computer maintenance software perform optimization tasks such as the removal of files that are not used in the operation of the system or by the applications in the system such as memory dumps, temporary files, and old log files

Computer maintenance software can also perform cleaning of the registry of the computer such that clutter in the computer registry is removed

Select all that apply.
Select all elements that a piece of writing needs to be effectively organized.
an interesting title
a reference list
an interesting introduction
a clear, summarizing concluding paragraph
well-organized body paragraphs

Answers

Giving your reader a broad overview of the subject should be the first step.

Explain about the Clear introduction?

The topic should be focused in the center of the introduction so that your reader can see how it relates to your paper's overall goal.

Your beginning serves as a crucial guide for the remainder of your essay. Your introduction gives your viewers a lot of information. They can learn what your issue is, why it is significant, and how you intend to move the conversation along.

It should begin your essay and make the reader interested in what you have to say. When crafting a hook, stay away from generalising your arguments or utilising rambling, complex words. Start your essay with an exciting sentence that is easy to understand, succinct, and memorable.

To learn more about Clear introduction refer to:

https://brainly.com/question/15224091

#SPJ1

When troubleshooting a problem for a user, what type of questioning is best to use in order to gather more details about the problem?

Answers

When troubleshooting a problem for a user, what type of questioning is best to use in order to gather more details about the problem?

The best type of questioning to use in order to gather more details about the problem is open-ended questioning.

1. Open-ended questions allow the user to provide more information and explain the issue in detail.

2. This helps the troubleshooter understand the problem better and identify potential solutions.

3. Open-ended questions typically start with words like "what," "how," or "why."

4. By using open-ended questioning techniques, the troubleshooter can gather the necessary information to effectively diagnose and resolve the problem.

#SPJ11

Learn more about open-ended questioning techniques here:

brainly.com/question/24318910

I need help please hurry!!!!!!! jay works in the it department. his main responsibility at work is to keep all equipment working. he needs to know what maintenance to perform and when. he should _____.



inventory all equipment


copy the user's manual and distribute it to all the employees


read the manuals


update the software in the office


establish the frequency of maintenance tasks


identify individuals to complete the tasks


set up auto reminders


list the maintenance tasks


create a log to document maintenance

Answers

Jay is employed with the it division. Maintaining the functionality of all equipment is his primary duty at work. He must understand what upkeep to execute and when  to decide to perform maintenance.

He needs to decide how often to perform maintenance. The number of jobs that must be completed in a certain amount of time is referred to as maintenance frequency. Its periodicity can also vary based on the set time, from daily to weekly. Work equipment comprises a working platform, fall arrest devices, and any gear, computers, apparatus, tools, or installations used exclusively or mostly for work-related purposes. Task analysis examines how a task is carried out and includes a thorough description of both manual and mental processes, the lengths of the task and its elements, and task frequency.

Learn more about computers here

https://brainly.com/question/20414679

#SPJ4

HELP FAST
Question
You found pictures and videos online about the Great Depression. You want to teach others about what happened and decide to create a digital story using what you found. Look at the tools below. Select the one that would NOT be an effective way to combine the pictures and videos to create your digital story.

spreadsheet software
spreadsheet software

blog
blog

web tool
web tool

presentation software
presentation software

Answers

Answer:

the answer for the question is "blog"

A. Convert the following 1-byte (8-bits) binary numbers: • (1001 01102 to decimal using the following types: a) Unsigned binary number b) Signed 2's complement binary number c) BCD number

Answers

The conversions showcase the different interpretations and representations of the same binary number in decimal form, depending on the type of conversion being applied.

A. Convert the following 1-byte (8-bits) binary number: (1001 0110)₂ to decimal using the following types:

a) Unsigned binary number:

To convert an unsigned binary number to decimal, we calculate the sum of the decimal values of each bit position that is set to 1.

(1001 0110)₂ = (1 × 2^7) + (0 × 2^6) + (0 × 2^5) + (1 × 2^4) + (0 × 2^3) + (1 × 2^2) + (1 × 2^1) + (0 × 2^0) = 150

Therefore, the decimal representation of (1001 0110)₂ as an unsigned binary number is 150.

b) Signed 2's complement binary number:

To convert a signed 2's complement binary number to decimal, we consider the most significant bit (MSB) as the sign bit. If the sign bit is 0, the number is positive, and if the sign bit is 1, the number is negative. For negative numbers, we first invert all the bits and then add 1 to the result.

(1001 0110)₂ is a negative number since the MSB is 1.

First, invert all the bits: (0110 1001)₂

Then, add 1 to the result: (0110 1001)₂ + 1 = (0110 1010)₂

Now, convert the resulting binary number to decimal:

(0110 1010)₂ = (0 × 2^7) + (1 × 2^6) + (1 × 2^5) + (0 × 2^4) + (1 × 2^3) + (0 × 2^2) + (1 × 2^1) + (0 × 2^0) = -86

Therefore, the decimal representation of (1001 0110)₂ as a signed 2's complement binary number is -86.

c) BCD number (Binary-Coded Decimal):

BCD is a binary representation of decimal digits, where each decimal digit is encoded using 4 bits.

(1001 0110)₂ can be split into two BCD digits: (1001)₂ and (0110)₂.

For the first BCD digit, (1001)₂:

(1001)₂ = (9)₁₀

For the second BCD digit, (0110)₂:

(0110)₂ = (6)₁₀

Therefore, the BCD representation of (1001 0110)₂ is 96 in decimal.

The conversion of the 8-bit binary number (1001 0110)₂ to decimal using different types yields the following results:

a) Unsigned binary number: 150

b) Signed 2's complement binary number: -86

c) BCD number: 96

Learn more about 2's complement visit:

https://brainly.com/question/30885327

#SPJ11

The current chief executive and financial officers have only been employed by ABC Company for the past five months of year 2. ABC Company is presenting comparative financial statements on Years 1 and 2, both of which were audited by William Jones, CPA. For which year( s) should Jones obtain written representations from these two individuals?

Answers

Answer:

Explanation:

Jones should obtain written representations from the current chief executive and financial officers for Year 2

Written representations are obtained to confirm the completeness and accuracy of financial statements and to ensure that all necessary information has been disclosed. In this scenario, since the current chief executive and financial officers have only been employed for the past five months of Year 2, they can provide representations for their tenure during that year.

As the financial statements for both Year 1 and Year 2 are being presented, it is important to obtain written representations specifically for Year 2 to ensure that any changes or significant events during that period are properly addressed and disclosed in the financial statements.

By obtaining written representations from the individuals for Year 2, it helps to provide a comprehensive and accurate representation of the financial statements for that specific period.

Learn more about the importance of obtaining written representations from key individuals to support the accuracy and completeness of audited financial statements.

https://brainly.in/question/48936475

#SPJ11

How to create a checkerboard on Python turtle?
I need to create a generic checkerboard in that box, if anyone knows how to code this I would be absolutely grateful and grant you brainliest for sure!

Answers

Answer:

here is my crude attempt:

import turtle

t = turtle.Turtle()

t.speed(0)

colors = ["black", "yellow"]

SQUARES = 8

SQUARESIZE = 20

def rectangle(color, s):

 t.begin_fill()

 t.pendown()

 t.color(color)

 for i in range(4):

   t.forward(s)

   t.right(90)

 t.end_fill()

 t.penup()

for row in range(SQUARES):

 for col in range(SQUARES):

   t.setpos(row*SQUARESIZE, col*SQUARESIZE)

   rectangle(colors[(row+col)%2], SQUARESIZE)

Who ever answer will get brainliest pls answer quick

Who ever answer will get brainliest pls answer quick

Answers

Answer:

Merry go round and lever.  Window blinds and pulle.   Drilling machine and screw.  Knife and wedge.  Crowbar wheel and axle

Explanation:

Your employer has asked you to create a
presentation for a new product demonstration. You
are asked to include a slide that will show the
specs of your company's product stacked up
against specs of a competitor's product. Which
slide layout should you choose to
do this?
Otitle slide
O section header
Opicture with caption
O comparison

Answers

comparison bc you are showing your company’s products against other competitors products

What is the relation between a string's length and the string's last index? O lastIndex length + 1 lastIndex == length + 2 lastIndex == length lastIndex == length - 1

Answers

The relation between a string's length and its last index is that the last index is equal to length - 1. Strings are indexed from 0.

In most programming languages, strings are typically indexed starting from 0. This means that the first character of a string is at index 0, the second character is at index 1, and so on. The last character of the string is at index length - 1.

The reason for this is that the length of a string represents the number of characters it contains. For example, if a string has a length of 5, it means that there are 5 characters in the string. However, since indexing starts from 0, the last character will be at index 4 (length - 1).

To access the last character of a string, you would use the index length - 1. This ensures that you are accessing the correct character at the end of the string. If you were to use an index equal to the length of the string or length + 1, it would be out of bounds and may result in an error.

Therefore, the correct relation between a string's length and its last index is lastIndex == length - 1.

Learn more about string here:

https://brainly.com/question/32338782

#SPJ11

What do you understand by ISA? Does the external auditor follow
ISA or any regulatory body in conducting their audit? (150
words)

Answers

ISA stands for International Standards on Auditing. These standards are a set of globally recognized audit guidelines developed by the International Auditing and Assurance Standards Board (IAASB).

These standards aid in the achievement of international consistency and quality in auditing practices and provide for an objective methodology that auditors can use to measure the effectiveness of the audit process. It is relevant for both internal and external auditing.Internal auditors are in charge of verifying a company's accounts, processes, and systems. An internal auditor's function is to ensure that a company's financial data is correct, secure, and that all procedures are followed. Internal auditors should be familiar with ISA and use it to help guide their work.External auditors, on the other hand, are auditors who are not employed by the company they are auditing. External auditors must follow all ISA principles and guidelines to perform a fair and objective audit of a company's financial statements. External auditors are obliged to follow the auditing regulations and procedures of any regulatory body in addition to following ISA guidelines, as the auditing process is overseen by a number of regulatory bodies.In conclusion, the ISA provides guidelines that both internal and external auditors must follow. External auditors are required to comply with all ISA principles, regulations, and procedures in addition to the auditing guidelines of regulatory bodies.

To know more about Standards, visit:

https://brainly.com/question/31979065

#SPJ11

Who is obsessed with Stranger Things, and waiting for the new season?!?!

Answers

Answer:

Me

Explanation:

Answer:

ME I CANNOT WAIT I'VE BEEN WAITING EVER SINCE ME AND MY STRANGER THINGS OBSESSED REALLY CLOSE FRIEND AND I FINISHED SEASON 3 THE DAY IT CAME OUT

Explanation:

Other Questions
Alexa is researching a cure for the coronavirus. She needs 14 test tubes for 4 experiments. The first experiment requires 2 test tubes, and the remainder of the tubes are used evenly over the rest of the experiments. How many test tubes did she use for the last experiment? avery company has two divisions, polk and bishop. polk produces an item that bishop could use in its production. bishop currently is purchasing 25,000 units from an outside supplier for $14 per unit. polk is currently operating at less than its full capacity of 620,000 units and has variable costs of $9 per unit. the full cost to manufacture the unit is $11. polk currently sells 470,000 units at a selling price of $19 per unit. Two cities are 3500 miles apart. A plane leaves one of them, traveling towards the other at an average speed of 300 miles per hour. At the same time a plane leaves the other, traveling towards the first, at an average speed of 400 miles per hour. How long will it take them to meet? what is the initial pressure of a gas having an initial temperature of 905 k, an initial volume of 14.3 l, a final pressure of 0.83 atm, a final temperature of 154 k and a final volume of 2.7 l? Walter buys a bus pass for 30. Every time he rides the bus, money is deducted from the value of the pass. He rode 12 times and a value of 6 was left on the pass. How much does each bus ride cost? Which graph best represents a system of equations that has no solution? Which best states how the structure of each excerpt supports a different tone? anaya structures his text as an anecdote, which gives it a humorous tone, while nye structures her text as a counterclaim, which gives it a defensive tone. anaya structures his text as an explanation, which gives it an authoritative tone, while nye structures her text as an impression, which gives it a soothing tone. anaya structures his text as a theory, which gives it an academic tone, while nye structures her text as a list, which gives it an unemotional tone. anaya structures his text as a news report, which gives it a neutral tone, while nye structures her text as a critique, which gives it a judgmental tone. Bing Enterprises, Inc., has been considering the purchase of a new manufacturing facility for $274,000. The facility is to be fully depreciated on a straight-line basis over seven years. It is expected to have no resale value after the seven years. Operating revenues from the facility are expected to be $109,000, in nominal terms, at the end of the first year. The revenues are expected to increase at the inflation rate of 4 percent. Production costs at the end of the first year will be $34,000, in nominal terms, and they are expected to increase at 5 percent per year. The real discount rate is 7 percent. The corporate tax rate is 24 percent. Calculate the NPV of the project. (Do not round intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.) What is the roots of 3x 10x 8 0? Which of the following are examples of the rhythmic creation of beauty in Annabel lee? check the two best answersA) sound devices link Annabel Lee to Angels, stars, and other beautiful imagesB) sound devices link images of Annabel Lees death with images of beautyC) sound if Isis reinforce the speakers madness as he considers Annabel Lees beauty on monday morning there were 15 inches of snow on the ground. the temp warmed up and by tuesday morning 3 inches had melted. three more inches melted by wednesday morning and the pattern continued until no more snow was left. identify the variables in this situation. determine what kind of function models the data and write it. use the model to determine when all the snow will be melted. Graph the rate of decay of a radioactive substance, which is the amount of a radioactive substance versusthe number of half-lives. An object accelerates downward at a constant rate of 2.00 m/s2 while completely submerged in water. Neglect the viscosity (fluid friction) of the water. The average density of the object is ______ kg/m3. Use g 22. Explain in detail what happens to particles before, during, and after vaporization. Imagine you were drafting a policy to regulate the use ofantibiotics and growth promoters. Explain how you would identifystakeholders to engage with while drafting the policy text. discuss the value of a security practitioner equipped with the fundamental security design principles in preventing security issues during the sdlc. which man lived the longest in the bible ? Can someone answer this please!!!!!!! Hey guys- need help in this one List the sample space for rolling a fair eight-sided die. S = {1} S = {8} S = {1, 2, 3, 4, 5, 6} S = {1, 2, 3, 4, 5, 6, 7, 8}