Create a program that asks the user to input three integers. After saving the values, the
program should identify the maximum and minimum from the three numbers. The output
should read
The minimum number entered was….
The maximum number entered was….

Answers

Answer 1

Here is a Python program that asks the user to input three integers and then outputs the minimum and maximum number:

Create A Program That Asks The User To Input Three Integers. After Saving The Values, Theprogram Should

Related Questions

What type of light comes from reflections off other objects?

Answers

Light that comes from reflections off other objects is called reflected light.

Directions :: Write a Ship class. Ship will have x, y, and speed properties. x, y, and speed are integer numbers. You must provide 3 constructors, an equals, and a toString for class Ship.



One constructor must be a default.

One constructor must be an x and y only constructor.

One constructor must be an x, y, and speed constructor.

Provide all accessor and mutator methods needed to complete the class.

Add a increaseSpeed method to make the Ship speed up according to a parameter passed in.

Provide an equals method to determine if 2 Ships are the same(i.e. in the same location).

You also must provide a toString() method.

The toString() should return the x, y, and speed of the Ship.



In order to test your newly created class, you must create another class called ShipRunner. There you will code in the main method and create at least 2 Ship objects (although you can create more if you like), using the constructors you created in the Ship class. Then you will print them out using the toString method and compare them with the equals method.



I'm trying to make an equals method I just don't know how to​

Answers

Answer: Assuming this is in the java language.. the equals() would be

Explanation:

public boolean equals(Object o){

   if(o == this){

        return true;

   }

   if (!(o instanceof Ship)) {

     return false;

   }

   Ship s = (Ship) o;

   return s.x == this.x && s.y == this.y && s.speed == this.speed;

 }

Will mark brainliest if correct!
Code to be written in python

A deferred annuity is an annuity which delays its payouts. This means that the payouts do not start until after a certain duration. Notice that a deferred annuity is just a deposit at the start, followed by an annuity. Your task is to define a Higher-order Function that returns a function that takes in a given interest rate and outputs the amount of money that is left in a deferred annuity.

Define a function new_balance(principal, gap, payout, duration) that returns a single-parameter function which takes in a monthly interest rate and outputs the balance in a deferred annuity. gap is the duration in months before the first payment, payout is monthly and duration is just the total number of payouts.

Hint: Note that duration specifies the number of payouts after the deferment, and not the total duration of the deferred annuity.

def new_balance(principal, gap, payout, duration):
# Complete the function
return


# e.g.
# test_balance = new_balance(1000, 2, 100, 2)
# result = test_balance(0.1)

Test Case:
new_balance(1000, 2, 100, 2)(0.1) 1121.0

Answers

Answer:

def new_balance(principal, gap, payout, duration):

   def calculate_balance(interest_rate):

       balance = principal

       for i in range(gap):

           balance *= (1 + interest_rate/12)

       for i in range(duration):

           balance *= (1 + interest_rate/12)

           balance -= payout

       return balance

   return calculate_balance

Explanation:

Answer:

def new_balance(principal, gap, payout, duration):

   # convert monetary amounts to cents

   principal_cents = principal * 100

   payout_cents = payout * 100

   

   def balance(rate):

       # calculate the interest earned during the deferment period in cents

       interest_cents = principal_cents * (1 + rate) ** gap - principal_cents

       # calculate the balance after the first payout in cents

       balance_cents = interest_cents + principal_cents - payout_cents

       # loop through the remaining payouts, calculating the balance after each one in cents

       for i in range(duration - 1):

           balance_cents = balance_cents * (1 + rate) - payout_cents

       # convert the balance back to dollars and round it to the nearest cent

       balance_dollars = round(balance_cents / 100)

       return balance_dollars

   return balance

test_balance = new_balance(1000, 2, 100, 2)

result = test_balance(0.1)

print(float(result))

Which of the following devices can store large amounts of electricity, even when unplugged?
LCD monitor
DVD optical drive
CRT monitor
Hard disk drive

Answers

Even when unplugged, a CRT (Cathode Ray Tube) monitor can store a lot of electricity. The capacitors within CRT monitors can store enough power to be fatal, thus you should never open one.

What does CRT stand for?

An electron beam striking a phosphorescent surface creates images in a cathode-ray tube (CRT), a specialized vacuum tube. CRTs are typically used for desktop computer displays. The "picture tube" in a television receiver is comparable to the CRT in a computer display.

What characteristics does CRT have?

Flat screen, touch screen, anti-reflective coating, non-interlaced, industrial metal cabinet, and digital video input signal are typical features of CRT monitors. As opposed to the typically curved screen found in most CRT displays, the monitor's screen can be (almost) flat.

To learn more about CRT monitors visit:

brainly.com/question/29525173

#SPJ1

Answer:

CRT monitor

Explanation:

A cathode ray tube (CRT) monitor can store large amounts of electricity, even when unplugged. You should never open a CRT monitor, as the capacitors within the CRT can store enough electricity to be lethal.

LCD monitors do not use large capacitors and are much safer to work on than CRT monitors (although the CCFL backlight has mercury vapor in it, which could be harmful if the tube is broken).

DVD optical drives and hard disk drives do not store electricity in sufficient quantity to be harmful.

Accenture is one of several hundred companies that has signed on to the United Nations Global Compact (UNGC) Business Ambition pledge.

Answers

Answer: True

Explanation:
Accenture is one of several hundred companies that has signed on to the United Nations Global Compact (UNGC) Business Ambition pledge. The UNGC is a voluntary initiative that encourages businesses to align their operations and strategies with ten universally accepted principles in the areas of human rights, labor, environment, and anti-corruption. The Business Ambition pledge is a component of the UNGC that invites businesses to set ambitious, science-based targets to reduce greenhouse gas emissions in line with the goals of the Paris Agreement. Accenture is one of many companies that have committed to this pledge and to taking action to combat climate change and support sustainable development.

Why did Madison recommend a server-based network for SEAT?

A) It provides centralized access to resources.
B) It is simpler to expand.
C) It is easier to operate.
D) It is less expensive.
E) It provides more security.

Answers

I think the answer is E

What did the police threaten to do?

Answers

Answer:

fire?

Explanation:

use router,switches and Hubs to design a simple network for maendeleo institute of Technology having 240 employees.The institute have five department: computer science has 100 employees ,information technology 60 employees ,Account 40 employees ,Human resource has 20 employees and marketing has 20 employees . Require: .network topology showing five network that corresponding to five department .use class C IP addresses (example 192.168.10.0/24) to show subnet ID and broadcast ID of each department , the IP address must not overlap .consider scalability .Give reason for your choice /decision​

Answers

Answer:

To design a simple network for Maendeleo Institute of Technology with 240 employees, we could use a combination of routers, switches, and hubs.

Our network would consist of five separate networks, one for each department at the institute. We would use class C IP addresses, with a subnet mask of /24, to create the following subnets:

Computer Science department: 192.168.10.0/24

Information Technology department: 192.168.11.0/24

Account department: 192.168.12.0/24

Human Resource department: 192.168.13.0/24

Marketing department: 192.168.14.0/24

Each department would be connected to the network via a switch, which would allow for communication within the department and with other departments as needed. A router would be used to connect the individual department networks to the wider internet, and would also serve as a firewall to protect the network from external threats.

We would also include a hub in the network to allow for communication between devices within a department, as well as to provide additional connectivity and scalability.

Overall, our network design would provide each department with its own separate network, with the ability to communicate with other departments as needed. It would also be scalable, allowing for the addition of new devices and departments as the institute grows. The use of class C IP addresses and a /24 subnet mask would ensure that IP addresses do not overlap, ensuring efficient and reliable communication within the network.

MTBF is a measurement of

A) the speed at which a storage device can read and write data
B) the number of digits used to store a computer file
C) the average length of a time a storage device can reliably hold data without it beginning to degrade
D) the average length of time between failures on a device

Answers

MTBF is a measurement of the average length of time between failures on a device. Thus, the correct option for this question is D.

What is MTBF in computers?

MTBF stands for Mean time between failures. It is often utilized in order to measure the overall failure rates, for both repairable and replaceable/non-repairable products.

It governs the simplest equation for mean time between failure. It is as follows:

MTBF = total operational uptime between failures/number of failures.

It is the predicted elapsed time between inherent failures of a mechanical or electronic system during the normal functioning of the computer system in order to detect an error.

Therefore, MTBF is a measurement of the average length of time between failures on a device. Thus, the correct option for this question is D.

To learn more about MTBF, refer to the link:

https://brainly.com/question/22231226

#SPJ1

write flow chart pseudocode and algorithm for a computation that perform balance,interest, withdrawal,in bank for Ethiopia?​

Answers

Answer:

Flowchart:

Start

Input customer information (name, account number, etc.)

Calculate balance

Calculate interest

Prompt user to enter withdrawal amount

Calculate new balance

Print new balance

End

Pseudocode:

START

// Declare variables

DECLARE customerName

DECLARE customerAccountNumber

DECLARE customerBalance

DECLARE customerInterest

DECLARE withdrawalAmount

// Get customer information

INPUT customerName

INPUT customerAccountNumber

// Calculate balance

SET customerBalance = customerAccountNumber * customerInterest

// Calculate interest

SET customerInterest = customerBalance * 0.05

// Prompt user to enter withdrawal amount

INPUT withdrawalAmount

// Calculate new balance

SET customerBalance = customerBalance - withdrawalAmount

// Print new balance

PRINT customerBalance

END

Explanation:

Describe what social engineering is and explain its existence and prevalence.
Explain why SE is an important part of an information technology security course.
Perform statistical research in the social engineering area providing the following: (1) Describe the current percentage of cyber attacks relying on social engineering and the percentage of attacks from both internal and externa sources; and (2) Describe how these percentages impact the current corporate social engineering incident response effort.
Discuss employee and management responsibilities with regard to information security and combating SE. Make sure your work clarifies your opinion as to who carries more responsibility for preventing SE-the employees or management. Provide examples to back up your statements.

Answers

Social engineering is a tactic used by attackers to manipulate individuals into divulging sensitive information or performing actions that may be harmful to the organization.

Social engineering attacks exploit human psychology, emotions, and trust to trick people into revealing sensitive information or performing actions that they otherwise wouldn't. The attacks can take many forms, such as phishing emails, phone scams, pretexting, and baiting.

What is social engineering?

The prevalence of social engineering attacks has increased in recent years, as attackers have become more sophisticated and creative in their methods.

According to the Verizon Data Breach Investigations Report (DBIR) in 2020, social engineering is used in 84% of successful cyber attacks and the most common form of social engineering is phishing. It is also reported that around 30% of phishing messages are opened and 12% of recipients click on the malicious link.

When it comes to combating social engineering, both employees and management carry some level of responsibility. Employees are the first line of defense and play a vital role in protecting the organization's sensitive information. They should be educated and trained on how to identify and avoid social engineering attacks. Management, on the other hand, is

Learn more about social engineering  from

https://brainly.com/question/29024098

#SPJ1

Hey tell me more about your service. I have a school assignment 150 questions and answers on cyber security,how can I get it done?

Answers

Answer:

Explanation:

I have knowledge in a wide range of topics and I can help you with your school assignment by answering questions on cyber security.

However, I want to make sure that you understand that completing a 150 question assignment on cyber security can be time-consuming and it's also important that you understand the material well in order to do well on exams and to apply the knowledge in real-world situations.

It would be beneficial to you if you try to work on the assignment by yourself first, then use me as a resource to clarify any doubts or to check your answers. That way you'll have a deeper understanding of the material and the assignment will be more beneficial to you in the long run.

Please also note that it is important to always check with your teacher or professor to ensure that getting assistance from an AI model is in line with your school's academic policies.

Please let me know if there's anything specific you would like help with and I'll do my best to assist you.

Which company gave Apple its big break in the business market?

Commodore Business Machines
Software Arts
Tandy Corporation
Microsoft

Answers

Answer:

Microsoft

Explanation: I’m not a computer fanatic, but everybody should know this. And if anything else is the answer, then that’s because it would’ve been in the text that I DON’T have.

Answer: software arts

Explanation:

i just did it

protocol layering can be found in many aspect of our lives such as air travelling .imagine you make a round trip to spend some time on vacation at a resort .you need to go through some processes at your city airport before flying .you also need to go through some processes when you arrive at resort airport .show the protocol layering for round trip using some layers such as baggage checking/claiming,boarding/unboard,takeoff/landing.​

Answers

Answer:

Baggage checking/claiming:

Check in at the city airport and check your baggage

Claim your baggage at the resort airport


Boarding/unboarding:

Board the plane at the city airport

Unboard the plane at the resort airport


Takeoff/landing:

Takeoff from the city airport

Land at the resort airport

Takeoff from the resort airport

Land at the city airport

Question 2
An example of something that operates at the application layer is:

Answers

Answer:

HTTP, FTP, SMTP- These are protocols at the application layer

Explanation:

This type of network may not be connected to other networks.


A) LAN
B) MAN
C) WAN

Answers

Answer:

LAN

Explanation:

brainliest?:(

Answer:

A) LAN (Local Area Network)

Next, you begin to clean your data. When you check out the column headings in your data frame you notice that the first column is named Company...Maker.if.known. (Note: The period after known is part of the variable name.) For the sake of clarity and consistency, you decide to rename this column Company (without a period at the end).

Assume the first part of your code chunk is:

flavors_df %>%

What code chunk do you add to change the column name?

Answers

Answer:

You can use the rename function to change the column name. Here is an example code chunk:

flavors_df %>%

rename(Company = Company...Maker.if.known.)

This will rename the Company...Maker.if.known. column to Company. Note that the old column name is surrounded by backticks () because it contains a period, which is a special character in R. The new column name, Company`, does not need to be surrounded by backticks because it does not contain any special characters.

Explanation:

Grayson is creating a program to keep track of how much money he earns and spends each week.he earns and spends each week. He wants to know if he has enough for ice cream? What data should he use to store his answer

Answers

Since Grayson uses a program that allows him to keep track of how much money he earns and spends each week. The type of data that will be used to give him the answer to the question is option A: "Boolean".

What is the program  about?

A Boolean variable can hold only two values: true or false.

He can use a conditional statement to check if the amount of money he has left over after subtracting his expenses from his earnings is greater than or equal to the cost of the ice cream. If it is, he can set the Boolean variable to "True", indicating that he has enough money for ice cream. If it is not, he can set the Boolean variable to "False", indicating that he does not have enough money.

Therefore, Grayson can compare the value of his remaining money to the cost of the ice cream, if the remaining money is greater than or equal to $4, he can set the Boolean variable to "True" which means he has enough money.

Learn more about program from
https://brainly.com/question/24613235

#SPJ1

See full question below

Grayson uses a program that allows him to keep track of how much money he earns and spends each week. Which type of data will be used to give him the answer to the following question?

"Do I have $4 to buy ice cream?"

Boolean

Images

Numbers

Text

Try it
Drag and drop each example under the appropriate heading.
taking breaks
reading in a crowded room
having resources nearby
cramming at the last minute
getting plenty of rest
starting your homework late at night
Intro
Good Study Habits
Bad Study Habits
Done

Answers

Bad habits include reading in a crowded room, starting your schoolwork late at night, and cramming right before the exam. Good habits include taking breaks, having resources close by, and getting lots of rest.

What are some poor study habits?

Being uncoordinated. Being disorganized will simply make studying much more difficult because there are so many things to do and think about. Don't merely jot down notes and post reminders in random locations.

Why do I lose track of what I learn?

If a student stays up all night studying for the test, they usually forget the material during it. The ability of the brain to retain information increases with regular study schedules and thoughtful revision, and the material is ingrained much more deeply.

To know more about Study Habits visit:-

https://brainly.com/question/28393347

#SPJ1

In what ways does a computer network make setting appointments easier?


A) by providing a common calendar
B) by reassigning workloads to enable attendance
C) by sending out invitations
D) by telephoning those involved
E) by sending electronic reminders

Answers

The best option is A) by providing a common calendar. A common calendar can be used to check availability and schedule appointments, making the process of setting appointments easier.

However...

All of the options (A, C, D, and E) could potentially make setting appointments easier on a computer network.

A) A common calendar can be used to check availability and schedule appointments.

B) Workloads could be reassigned to enable attendance at appointments, but this is not directly related to the use of a computer network.

C) Invitations to appointments can be sent electronically through the network.

D) Telephone calls can be made through the network.

E) Electronic reminders can be sent through the network to help ensure that appointments are not forgotten.

You are given a design board with four input pins a 4-bit INDATA,
1-bit Load,Enable, and Clock; and one output, a 4-bit OUTDATA.
Build a sequential circuit that contains a register (Don’t forget to
trigger that register by the FALLING edge of the clock, Logisim’s default
is the opposite!).
The register is updated every clock cycle in which Enable is up. If
Load is down, the register is incremented, otherwise it is loaded with the
data asserted on the INDATA pin.
The register data output should be connected with the output pin
OUTDATA.

Answers

The steps to Build a sequential circuit that contains a register  is given below

The first step is to connect the 4-bit INDATA input to the data input of a 4-bit register.Next, we need to connect the Load and Enable inputs to a multiplexer. The multiplexer will be used to select between the INDATA input and the output of the register.The multiplexer output should be connected to the input of the register.We also need to create an AND gate that will be used to trigger the register on the falling edge of the clock. The AND gate should have the Clock input as well as the Enable input as its inputs.The output of the AND gate should be connected to the clock input of the register.The output of the register should be connected to the OUTDATA output.Create a NOT gate and connect the Load input to it, and connect the output of the NOT gate to one of the multiplexer input.Connect the output of the register to the second input of the multiplexer.

What is the design board about?

To build a sequential circuit that contains a register, we can use a combination of logic gates, flip-flops, and multiplexers.

In the above way, the register will be updated every clock cycle in which the Enable input is high. If the Load input is low, the multiplexer will select the output of the register and it will be incremented.

Otherwise, the multiplexer will select the INDATA input and the register will be loaded with the data asserted on the INDATA pin. The output of the register will be connected to the OUTDATA output, providing the register data.

Learn more about design board from

https://brainly.com/question/28721884

#SPJ1

A(n) ____ is a central computer that enables authorized users to access networked resources.

A) peripheral
B) server
C) application
D) LAN

Answers

Answer:

Server

Explanation:

Server is a central computer that enables authorized users to access networked resources.

what is primary key? List any two advantage of it.​

Answers

A primary key is a column or set of columns in a database table that is used to uniquely identify each row in the table. It is a fundamental element of database design, as it ensures that each row in a table can be uniquely identified and helps to enforce the integrity of the data.

There are several advantages to using a primary key in a database table:

Uniqueness: A primary key ensures that every row in a table has a unique identifier, which makes it easier to distinguish one row from another.
Data integrity: A primary key helps to ensure that the data in a table is accurate and consistent, as it can be used to enforce relationships between tables and prevent data inconsistencies.
Performance: A primary key can be used to optimize the performance of a database, as it can be used to quickly locate and retrieve specific rows of data.
Data security: A primary key can be used to secure sensitive data in a database, as it can be used to control access to specific rows of data.
A primary key is a column of set columns heft ref

what is the main objective of the administrator when creating and assigning storage accounts to users?

Answers

Note that the main objective of the administrator when creating and assigning storage accounts to Users is "to provide them with a secure and reliable method of storing and accessing their data, while also maintaining control and visibility over the data and its usage. "

What is an Administrator in IT?

IT administrators, also known as system administrators, configure and manage the computers, servers, networks, corporate software, and security systems of a business. They also assist the organization stay comply with cybersecurity rules by optimizing internal IT infrastructure for increased efficiency.

A competent administrator must understand networks and how to handle network problems. Basic hardware expertise is required. Understanding of backup, restoration, and recovery techniques. Excellent knowledge of permissions and user management

Learn more about Storage Accounts:
https://brainly.com/question/29929029
#SPJ1

Can you incorporate open-source code from a github forum into IP tool?

Answers

Answer:

No

Explanation:

Answer: No, Info does not allow the use of open-source components in proprietary software he contracts.

What is the difference between a baseline and an objective?

A baseline is a start, and an objective is an ending.

A baseline is measurable, and an objective is not measurable.

A baseline is a start, and an objective shows progression.

A baseline is a benchmark, and an objective is an ending.

Answers

The difference between a baseline and an objective is a baseline is a start, and an objective is an ending. Therefore, option A is correct.

What is the objective of baseline?

Regardless of the study topic, a baseline study is a descriptive cross-sectional survey that primarily offers quantitative data on the current condition of a specific situation in a given population. It seeks to quantify how various variables are distributed over time within a study population.

A baseline is a constant point of comparison that is employed in comparison studies. In business, a project's or product's success is frequently evaluated in comparison to a baseline figure for expenses, sales, or any other number of factors. A project may go over or under its predetermined benchmark.

Thus, option A is correct.

To learn more about the objective of baseline, follow the link;

https://brainly.com/question/15018074

#SPJ1

which function in the random library will generate a random integer within a range of specified by two parameters? the range is inclusive of the two parameters

Answers

Ran dint Python function is the function in the random library will generate a random integer within a range of specified by two parameters.

What is Ran dint Python function?

With both inclusive parameters, the randint Python method returns an integer that was created at random from the provided range.

The randint() method provides a selected integer number from the given range. Note that randrange(start, stop+1) is an alias for this technique.

A value from a list or dictionary will be generated by the random command. And the randint command will choose an integer value at random from the provided list or dictionary.

Thus, Ran dint Python function.

For more information about Ran dint Python function, click here:

https://brainly.com/question/29823170

#SPJ1

Create a program for the given problems using one-dimensional array. Program to identify the highest value in the given numbers.​

Answers

Answer:

Explanation:

Here's one way you could write a C program to identify the highest value in a given set of numbers using a one-dimensional array:

Copy code

#include <stdio.h>

int main() {

   int nums[10]; // Declare an array of 10 integers

   int i, max;

   printf("Enter 10 numbers: ");

   for (i = 0; i < 10; i++) {

       scanf("%d", &nums[i]); // Read in the numbers

   }

   max = nums[0]; // Initialize max to the first number in the array

   for (i = 1; i < 10; i++) {

       if (nums[i] > max) { // Compare each number to the current max

           max = nums[i];  // If a number is larger, update the max

       }

   }

   printf("The highest value is: %d", max);

   return 0;

}

Code to be written in Python
Will award brainliest automatically if correct!

Suppose that you have a list of numbers, and you need to normalize the list, i.e., the sum of all numbers in the list is equal to 1.

Tam came out with an implementation:

def normalize(lst):
s = sum(lst)
return list(map(lambda v: v / s, lst))


This code works correctly for normalize([1, 2, 5, 4]) but fails for normalize([1, 2, -7, 4]). What causes the second test case to fail?

Find out the error message and keep the list as it is when the error occurs by simply return the list. So without modifying the normalize function, implement this strategy in the safe_normalize function. Complete safe_normalize. You may assume that the normalize function has already been defined for you.

def safe_normalize(lst):
# handle the error
return normalize(lst)

Test Cases:

safe_normalize([1, 2, 2, 3]) [0.125, 0.25, 0.25, 0.375]
safe_normalize([1, 2, -5, 2]) [1, 2, -5, 2]

Answers

PYTHON

Here is an implementation of the safe_normalize function that catches the error and returns the original list if an error occurs:

def safe_normalize(lst):

try:

return normalize(lst)

except ZeroDivisionError:

return lst

This function calls the normalize function, which takes a list as input and returns a normalized list. However, if an error occurs (in this case, a ZeroDivisionError), the function will catch the error and return the original list instead.

To test the safe_normalize function, you can use the following test cases:

print(safe_normalize([1, 2, 2, 3])) # Expected output: [0.125, 0.25, 0.25, 0.375]

print(safe_normalize([1, 2, -5, 2])) # Expected output: [1, 2, -5, 2]

The first test case should return the normalized list, while the second test case should return the original list, since the normalize function would fail with a ZeroDivisionError if passed a list with a negative sum.

Hope This Helps You!

How BFS takes more memory than DFS?

Answers

Answer:

The BFS have to track of all nodes on the same level

Other Questions
GH is dilated by a scale factor of to form G'H'. GH measures 36. What is themeasure of G'H'? Mr Paul has 4 bars of chocolate. He distributes 1/3of each bar to 4 children.a) Write the fraction of chocolate distributed.b) Write the fraction of cholates left with Mr. Paul Breaking the Confederate spirit and forcing the social reformation of the South proved Idealistic, and Northerners eventually gave up or lost interest.The troops were removed following the ______and the South rose again... re-implementing a racist culture with segregation anddisenfranchisement. Escoge la respuesta correcta.Which of the following animals would you find in a tortugario?birdsturtleslionsfish Why did the dodo become extinct A pizza shop sold 18 medium pizzas. The number of large pizzas sold was 3 times as many as the number of medium pizzas sold. How many pizzas did the pizza shop sell altogether? Which of the following IS one of the factors that determine a company's credit rating? a. The percentage of the net income the company allocates in the prior two years to paying back loans outstanding b. The company's average return on shareholders' equity over the most recent three years c. The size of a company's annual interest payments on debt d. The company's dividend payout ratio o Its debt-to-equity ratic HELP PLEASEUse the molar volume of a gas at SATP to determine thefollowing values at SATP:(a) the amount of nitrogen in 44.8 L of pure gas(b) the volume (in litres) of 4.8 mol of propane gas, C3H,(g)(c) the mass of carbon dioxide in 34.6 L of carbon dioxidegas, CO(g)(d) the volume (in mL) of 1250 g of methane, CH(g)(e) the amount of oxygen in 36.5 L of 02 gas The Grand Canyon has much more than pretty scenery. It contains an amazing diversity of rock formations with an abundance of fossils hidden within. These fossils provide clues about past environments. The sedimentary rocks exposed throughout the canyon are rich in fossils, including fossils of these marine (ocean) brachiopod shells.QUESTION: How does fossil evidence help you explain how the Grand Canyon formed? Write your answer A graph of the rate of inflation in the United States over the twentieth century shows: a constant rate of inflation in the first half of the century followed by an upward trend in the second half an overall upward trend interrupted by a large downturn in the 1930s. O a relatively steady, positive level throughout the century except for deflation in the 1930s. some periods of deflation mixed with mostly positive rates of inflation before 1955 but only positive rates of inflation after 1955. What does fixed rate mortgage means? What pricing concept considers the price that other providers charge for the same product? a. Demand-based concept b. Total cost concept c. Cost-plus concept d. Competition-based concept What is the purpose of the world on the turtle's back? in triangle ABC,AC=BC,CD is perpendicular to AB with D belonging to AB,AB=4 in. and CD=\sqrt(3) in.find AC What are the four elements of common law? Your Core i5 fan has a four-pin connector, but your motherboard only has a single three-pin header with the CPU_FAN label. Which of the following will be the easiest solution to get the necessary cooling for your CPU ?A. Plug the four-pin connector into the three-pin header.B. Add an extra chassis fan.C. Leave the plug disconnected and just use the heat sink.D. Buy an adapter. Maria finished with 160 percent of her original amount. If she finished with 7200, what was Maria's original amount What is the rule for quadrant 4? What is the point of intersection when the system of equations below is graphed on the coordinate plane?(1, 3)(1, 3)(1, 3)(1, 3) A culture of bacteria has an initial population of 7100 bacteria and doubles every 2 hours. Using the formula P_t = P_0\cdot 2^{\frac{t}{d}}P t =P 0 2 d t , where P_tP t is the population after t hours, P_0P 0 is the initial population, t is the time in hours and d is the doubling time, what is the population of bacteria in the culture after 15 hours, to the nearest whole number?