In answering essay questions in Blackboard, students may type answers directly into the question's text field or copy and paste answers from a word processing program into the text field.

Answers

Answer 1

Yes, that is correct. When answering essay questions in Blackboard, students have the option

to type their answers directly into the text field provided by the platform, or they can compose their answers in a word processing program and then copy and paste the text into the text field in Blackboard. Both options are commonly used by students, and it is up to the student's personal preference which method they choose to use. However, it is important for students to ensure that their answer is complete and correctly formatted regardless of which method they choose to use. Additionally, students should make sure to check for any formatting errors or typos that may occur when pasting text into Blackboard to ensure that their answer is properly submitted.

To learn more about Blackboard click on the link below:

brainly.com/question/15012892

#SPJ11


Related Questions

What do borrowers use to secure a
mortgage loan? Check all that apply.
a credit card
a down payment
a house
V land
O a vehicle

Answers

Answer:

Credit Card & Down Payment

Choose a key competitor of Costco. Highlight key differences in performance between Costco and their key competitor in the following areas:
1. Stock structure
2. Capital structure
3. Dividend payout history
4. Key financial ratios
5. Beta
6. Risk

Answers

Costco, a leading retail company, faces competition from several key competitors in the industry. One of its main competitors is Walmart.

While both companies operate in the retail sector, there are notable differences in their performance across various areas. In terms of stock structure, capital structure, dividend payout history, key financial ratios, beta, and risk, Costco and Walmart have distinct characteristics that set them apart.

1. Stock structure: Costco has a dual-class stock structure, with two classes of shares, while Walmart has a single-class stock structure, with one class of shares available to investors. This difference affects voting rights and ownership control.

2. Capital structure: Costco maintains a conservative capital structure with a focus on minimizing debt, while Walmart has a relatively higher debt-to-equity ratio, indicating a more leveraged capital structure.

3. Dividend payout history: Costco has a consistent track record of paying dividends and increasing them over time. Walmart also pays dividends, but its dividend growth has been more modest compared to Costco.

4. Key financial ratios: Costco tends to have higher gross margin and return on equity (ROE) compared to Walmart, indicating better profitability and efficiency. However, Walmart generally has a higher net profit margin and asset turnover ratio, indicating effective cost management and asset utilization.

5. Beta: Beta measures the sensitivity of a stock's returns to the overall market. Costco typically has a lower beta compared to Walmart, indicating lower volatility and potentially lower risk.

6. Risk: While both companies face risks inherent in the retail industry, such as competition and economic conditions, Costco's membership-based business model and focus on bulk sales contribute to a relatively stable revenue stream. Walmart, being a larger and more diversified company, may face additional risks related to its international operations and product mix.

These differences in performance highlight the distinct strategies and approaches taken by Costco and Walmart in managing their businesses. It is important to note that the performance comparison may vary over time and should be analyzed in the context of industry dynamics and specific market conditions.


To learn more about operations click here: brainly.com/question/14316812

#SPJ11

Analyze the following output public class Test{ public static void main(String args[]){ int[] x={1,2,3,4}; //here declare array x with 1 2 3 4 int[] y=x; //here copy the x array into y array x=new int[2]; //here reintilized the array size which is 2 for(int i=0;i<.length;i++){ //here now array length is 2 it iterates 2 times System.out.print(x[i]+" ");

Answers

Answer:

The C language code is a class called Test that accepts an array, duplicates it, reinitializes the first array to the first two items of the previous array, and loops through the array to print both items.

Explanation:

public class Test{

   public static void main(String args[]){

       int[] x={1,2,3,4};         //here declare array x with 1 2 3 4

       int[] y=x;                   //here copy the x array into y array

       x=new int[2];           //here reintilized the array size which is 2

       for(int i=0;i<.length;i++){    //here now array length is 2 it iterates 2 times

           System.out.print(x[i]+" ");

       }

}

Which USMT software command copies settings and files from the source computer to a safe location? a) scanstate. b) usmtutils. c) copystate. d) loadstate.

Answers

USMT or the User State Migration Tool is a Microsoft tool used for transferring user files and settings from one computer to another. This tool comes in handy when you are migrating from an old computer to a new one, or when you are upgrading your current operating system.

One of the essential features of USMT is the ability to copy settings and files from the source computer to a safe location. This feature ensures that your valuable data is not lost during the migration process. There are several commands available in USMT that allow you to perform this task. The command that is used to copy settings and files from the source computer to a safe location is called ScanState. This command scans the source computer and captures all user files and settings. It then stores them in a safe location, which can be accessed later during the migration process.

In conclusion, the correct answer to the question is a) ScanState. This command is essential for ensuring that your valuable data is not lost during the migration process. It is important to note that USMT is a powerful tool that can simplify the migration process, but it requires some technical knowledge to use effectively. Therefore, it is recommended that you seek professional help if you are not familiar with the tool.

To learn more about User State Migration Tool, visit:

https://brainly.com/question/31657756

#SPJ11

100 POINTS
When the Find and Replace dialog box is open to the Replace tab and you want to replace an underlined phrase, how can you access the dialog box that lets you tell Word to find the underlined instances of the phrase?
Select the phrase in the “Find what” field, then click More, then click Format, and then click Font.
Select the phrase in the main document, then click Spelling and Grammar, and then click AutoCorrect.
Click the “Replace with” field, then click Options, then click Special, and then click Symbols.
Click the Go To tab, then click Styles, and then click Find Styles.

Answers

Answer:

Select the phrase in the “Find what” field, then click More, then click Format, and then click Font.

Explanation:

Just the right answer

Write a C program to read temperature and display adequate information: Temperature <0-Freezing, Temperature 0-15 Very Cold weather, Temperature 15-25 Cold weather, Temperature 25-35 Normal in Temp, Temperature 35-45 Hot, Temperature >=45 Very Hot. Q2. WAP to find the factors of an input number. Q3. a. WAP to find the perimeter of a rectangle b. WAP to find the volume of a box (Ask dimensions from the user) Q4. WAP to print the number of digits in a number entered by the user.

Answers

1. To display the temperature in terms of adequate information, you can use the following C program. #include int main() { float temperature; printf("Enter the temperature: "); scanf("%f", &temperature); if(temperature < 0) printf("Freezing"); else if(temperature >= 0 && temperature < 15) printf("Very Cold Weather"); else if(temperature >= 15 && temperature < 25) printf("Cold Weather"); else if(temperature >= 25 && temperature < 35) printf("Normal in Temp"); else if(temperature >= 35 && temperature < 45) printf("Hot"); else printf("Very Hot"); return 0; }

2. To find the factors of an input number, you can use the following C program. #include int main() { int i, number; printf("Enter the number: "); scanf("%d", &number); printf("Factors of %d are: ", number); for(i=1; i<=number; ++i) { if(number%i == 0) printf("%d ", i); } return 0; }

3a. To find the perimeter of a rectangle, you can use the following C program. #include int main() { float length, width, perimeter; printf("Enter the length and width of rectangle: "); scanf("%f %f", &length, &width); perimeter = 2 * (length + width); printf("Perimeter of rectangle = %f units", perimeter); return 0; }

3b. To find the volume of a box, you can use the following C program. #include int main() { float length, width, height, volume; printf("Enter the length, width and height of the box: "); scanf("%f %f %f", &length, &width, &height); volume = length * width * height; printf("Volume of box = %f cubic units", volume); return 0; }

4. To print the number of digits in a number entered by the user, you can use the following C program. #include int main() { int number, count = 0; printf("Enter the number: "); scanf("%d", &number); while(number != 0) { number /= 10; ++count; } printf("Number of digits: %d", count); return 0; }

Learn more about program code at

https://brainly.com/question/33355523

#SPJ11

what are the most popular types of markup for providing syntax, which will help search engines identify a specific type of content on your website? select answer: microdata schema recipe text rdfa xml

Answers

The most prevalent syntax to help search engines recognize particular sorts of material on your website is the schema microdata markup type.

The language of search engines, known as schema markup or structured data, uses a special semantic vocabulary. It is a type of coding that helps search engines better understand your content by giving them information. The most popular markup language in use today, HTML has become the primary language for developing web pages and other content that can be viewed in a web browser. The World Wide Web Consortium (W3C) has made HTML a formal guideline, and most popular web browsers, including those for desktop and mobile devices, generally follow this proposal.

Learn more about browser here-

https://brainly.com/question/28504444

#SPJ4

with a two-phase commit strategy for synchronizing distributed data, committing a transaction is faster than if the originating location were able to work alone. T/F

Answers

The statement "With a two-phase commit strategy for synchronizing distributed data, committing a transaction is faster than if the originating location were able to work alone" is False.

A two-phase commit strategy is used to ensure data consistency across distributed systems, but it introduces additional communication and coordination overhead. This can result in a slower transaction commitment process compared to a single-node system where the originating location works alone.

The two-phase commit protocol involves two phases: the prepare phase and the commit phase. In the preparation phase, all participants in the distributed transaction agree to commit or abort the transaction. If all participants vote to commit, then the commit phase is initiated, and the transaction is committed at all locations. However, if any participant votes to abort or if a failure occurs during the process, the transaction is aborted.

The two-phase commit protocol adds coordination and communication overhead, which can introduce delays compared to a single location working alone. The purpose of this protocol is to provide a reliable and consistent outcome for distributed transactions, ensuring that all participants reach a consensus on the transaction's outcome.

Learn more about the communication:

https://brainly.com/question/28153246

#SPJ11

How are the internet and the web related?

A.
They are not related.
B.
They are the same thing.
C.
The internet runs on the web.
D.
The web runs on the internet.

Answers

Answer:

hi

Explanation:

i think it is it is C

hope it helps

have a nice day

The___
button is present in the Records group on the Home tab.​

Answers

Answer:

Access Ribbon

Explanation:

Answer:

Access ribbon.

Pls mark it as brainlist.

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

Exam Instructions
Question 6 of 20:
Select the best answer for the question.
6. Which of the following would most likely indicate the sequence in which milk
travels through a production plant to each stage of a cheese manufacturing
process?
OA. A single-line diagram
OB. A piping schedule
OC. Manufacturer's drawings
OD. A process schedule
Mark for review (Will be highlighted on the review pago)

Answers

A diagram which indicates the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process is: D. A process schedule

What is a process schedule?

A process schedule can be defined as a type of diagram (schematic) which is designed and developed to illustrate the various processes and stages (steps) that are associated with manufacturing of a particular product.

In this context, a process schedule is a diagram which would most likely indicate the sequence in which milk travels through a production plant to each stage of a cheese manufacturing process.

Read more on cheese manufacturing here: https://brainly.com/question/21148228

#SPJ1

__ allow(s) users with mobility issues to control the computer with their voice.

Speech input software

Tracking devices

Head pointers

Text-to-speech

Answers

Answer:

Speech input device

Explanation:

I think this is the answer

Answer: speech input software

Explanation: got it right on edgen

Each hour, a grandfather clock chimes the number of times that corresponds to the time of day. for example, 3:00, it will chime 3 times. how many times does the clock chime in a day.

Answers

In this problem, we are tasked with determining the total number of chimes a grandfather clock makes in a day, considering that it chimes according to the time of day (e.g., 3 chimes at 3:00). The grandfather clock chimes a total of 600 times in a day.

1. We need to calculate the chimes for each hour and then sum them up for a full day (24 hours).
2. For each hour, the clock chimes equal to the hour number (1 chime at 1:00, 2 chimes at 2:00, and so on).
3. We can express the total chimes in a day as the sum of chimes for each hour:

Total chimes = 1 + 2 + 3 + ... + 24

4. To calculate this sum, we can use the formula for the sum of the first n positive integers:

Sum = n * (n + 1) / 2

Here, n = 24 (number of hours).

5. Now, let's calculate the total chimes:

Total chimes = 24 * (24 + 1) / 2
Total chimes = 24 * 25 / 2
Total chimes = 600

To learn more about integers, visit:

https://brainly.com/question/9035397

#SPJ11

một số được gọi là thác đổ nếu phần tử biểu diễn thập phân của nó nhiều hơn một chữ số đồng thời theo chiều từ trái qua phải chữ số đứng trước lớn hơn chữ số đứng sau
dữ liệu vào tệp THACDO.INP gồm nhiều dòng,mỗi dòng chứa số nguyên N
kết quả ra tệp THACDO.OUT gồm nhiều dòng thông báo,mỗi dòng ghi "CO" nếu N là thác đổ và ngược lại thông báo "KHONG" nếu N không phải

Answers

I don’t understand this

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

In batch operating system three job J1 J2 and J3 are submitted for execution each job involes an I/O activity a CPU time and another i/o activity job a requires a total of 20 ms with 2 ms CPU time J2 requires 30 ms total time with 6 ms CPU time J3 requires15 ms total time 3 ms CPU time what will be the CPU utilization for uniprogramming and multiprogramming

Answers

Answer:

(A) The CPU time for J1 is =2 ms other time is =18 ms, for J2 CPU time =6 ms other time = 24 ms, for J3 CPU time = 3 ms and other time = 12 ms (B) The CPU Utilization for uni-programming is 0.203 or 20.3% (C) For Multi-programming, when a program is not free and busy with an operation, the CPU is allocated to other programs.

Explanation:

Solution

Given that:

A(1)Job J1 = CPU time = 2ms  

Other time =18 ms

Total time = 20 ms

(2)Job J2 = CPU time 6ms

Other time = 24 ms

Total time = 30 ms

(3)Job J3 = CPU time = 3ms

Other time =12ms

Total time = 15 ms

(B) For the CPU Utilization for uni-programming, we have the following as follows:

CPU utilization =The total time of CPU/The total real time

Thus,

=(2 +6+3) / (18+24+12)

= 11/54

=0.203 or 20.3%

(C) For the CPU utilization for multi-programming,  when a program is not available that is busy in an operation, such as the input and output the CPU can be allocated or designated to other programs

BRAINLEST PLEASE HELP
Which action is an example of networking?

meeting other business students from other schools at an FBLA conference
helping organize donations at a food pantry
entering your program in a contest
taking the exam for a certification

Answers

meeting other business students because networking is meeting with other and discussing information

Answer:

A (First one)

Explanation:

Meeting other business students from other schools at an FBLA conference.

In keyboarding there are 2 sides to a keyboard
True or false

Answers

Answer:

true

Explanation:

True, also know this because the your four fingers are supposed to line up one ASDF and JKL; and your thumbs on the Spacebar

cheryl, the network administrator, has been asked to create a virtual machine that can run an application without any modifications to the os. what is her best option to accomplish this task?

Answers

The best option to accomplish this task is installing virtual machine.

A network administrator who has been tasked with creating a virtual machine that can run an application without modifying the OS has the option of creating a virtual machine with the same OS as the physical computer. A virtual machine is a program that allows you to run an operating system in an application window on your desktop. One of the primary advantages of a virtual machine is the ability to run multiple operating systems on the same computer at the same time.

This is useful for a variety of reasons, such as testing software and operating systems, running old software and operating systems, and running software on an operating system that it was not designed for.

Learn more about network administrator: https://brainly.com/question/29039092

#SPJ11

_drugs have side effects

Answers

Answer:

yes

Explanation:

how many bits will you need to borrow from the host portion to create the required number of subnets? (each bit borrowed doubles the number of subnets.) 2. how many subnets will you create (2 to the power of the number of borrowed bits)? 3. what is the subnet mask for your new subnetted networks? 4. what is the total number of host addresses per subnet (2 to the power of the number of un- borrowed bits)? 5. how many host addresses per subnet are available for devices (the answer to the above question minus 2) 6. build the network ip address scope. if there are more than 8 subnets, show the first 8 and the last one. if there are 8 or fewer subnets, show all subnets. do not show more subnets than you need.

Answers

We can build twice as many subnets when we borrow a host bit, so if we borrow two host bits, we can create four subnets. The number of subnets you can build doubles for every host bit you "steal." 128 + 64 = 192 is the binary to decimal conversion. A new subnet mask of 255.255 will be used.

What is meant by decimal?

The accepted method for representing both integer and non-integer numbers is the decimal numeral system. It is the expansion of the Hindu-Arabic numeral system to non-integer values.A decimal numeral refers broadly to the notation of a number in the decimal numeral system (also frequently merely called a decimal or, less accurately, a decimal number). A decimal separator can occasionally be used to identify decimals (usually "." or "," as in 25.9703 or 3,1415).As in "3.14 is the approximate value of to two decimals," "decimal" may also refer specifically to the digits that follow the decimal separator. The function of zero-digits following a decimal separator is to denote the accuracy of a value.

To learn more about decimal refer to

https://brainly.com/question/26090574

#SPJ4

Select the correct responses to the questions from the drop-down menus. Which source contains most of Earth’s fresh water? Where is most of Earth’s usable fresh water found? Select the correct responses to the questions from the drop-down menus. Which source contains most of Earth’s fresh water? Where is most of Earth’s usable fresh water found? Select the correct responses to the questions from the drop-down menus. Which source contains most of Earth’s fresh water? Where is most of Earth’s usable fresh water found?

Answers

Answer:

1. ice sheets

2. ground water

Explanation: I got it correct in the quiz.

The source contains most of Earth’s fresh water is Ice Sheets. The most of Earth’s usable fresh water found is Groundwater.

Which source contains most of Earths freshwater?

The icecaps and glaciers are known to have about 68 percent of the world's fresh water and it is found to also have an approximate of 30 percent of ground water.

Conclusively, Note that the source that contains most of Earth’s fresh water is Ice Sheets and the  ice sheet is also called continental glacier.

Learn more about freshwater from

https://brainly.com/question/16339776

#SPJ5

Media planners operate with computer models of ________ that are used in decisions about media selection, scheduling, and weights (amount of budget).
A) animatics
B) media efficiency
C) heuristics
D) media optimization
E) wave analysis

Answers

Media planners operate with computer models of D) media optimization that are used in decisions about media selection, scheduling, and weights (amount of budget). Media optimization involves analyzing data to determine the best combination of media channels and placements to achieve the desired marketing goals. This includes considering factors such as audience reach, frequency, cost efficiency, and impact.

Computer models are used to simulate different media scenarios, allowing media planners to test and refine their strategies before committing to a final plan. These models can take into account various inputs, such as historical performance data, consumer behavior trends, and competitive activity. By running simulations, media planners can identify the most effective media mix and budget allocation, optimizing the campaign's impact while minimizing waste.

Media optimization is an ongoing process, with media planners continuously monitoring and adjusting their strategies based on performance data and market changes. This requires a deep understanding of both the media landscape and the target audience, as well as the ability to interpret and act on data insights. By leveraging technology and data, media planners can create more effective and efficient media plans that deliver measurable results.

Learn more about Computer models here-

https://brainly.com/question/17994947

#SPJ11

windows configuration designer can be used to completely automate the deployment of windows 10. true or false

Answers

Windows Configuration Designer is a tool provided by Microsoft to customize and automate the deployment of Windows 10 devices is True.

Windows Configuration Designer (previously known as Windows Imaging and Configuration Designer or Windows ICD) is a graphical tool that allows IT professionals, system administrators, and device manufacturers to create custom Windows 10 provisioning packages. These packages contain configuration settings and customizations that can be applied during the deployment or setup process of Windows 10 devices.

With Windows Configuration Designer, you can create provisioning packages that automate tasks such as configuring settings, installing applications, joining domains, setting up network connectivity, and more. These packages can be deployed to new devices during initial setup or applied to existing devices to enforce standard configurations.

To know more about Windows visit: https://brainly.com/question/27764853

#SPJ11

Mario was surprised that the box that was supposed to tell him how many words he used in his document did not appear after the spelling and grammar check of his document was complete.

Which step did Mario forget to do in Word’s Options dialog box?

Click the Display tab.
Click the Custom Dictionaries button.
Click the Grammar checking option.
Click the Show the readability statistics option.

Answers

Answer:The Answer is d Click the Show the readability statistics option

Explanation:

Answer:

D. Click the Show the readability statistics option.

Explanation:

correct on edge

write a program which reads a string using input(), and outputs the same string but with the first and last character deleted. (you may assume the input string has length at least 2.) for example, on input fairy a correct program will print air.

Answers

The program should read a string using input() and output the same string with the first and last character deleted. Here is a Python program that accomplishes this:

```python
string = input("Enter a string: ")
result = string[1:-1]
print(result)
```

In this program, we first use the input() function to get a string from the user. Then, we use string slicing to remove the first and last characters from the string. The slicing notation [1:-1] specifies that we want all the characters from index 1 to the second-to-last index. Finally, we print the resulting string without the first and last characters.

Note: The program assumes that the input string has a length of at least 2, as mentioned in the question. If the input string has a length of 1 or less, the program will not work correctly.

Know more about Python here:

https://brainly.com/question/30391554

#SPJ11

How is bible research conducted?

Answers

Answer:

According to the Anchor Bible Dictionary," exegesis is the process of careful, analytical study of biblical passages undertaken in order to produce useful interpretations of those passages. Ideally, exegesis involves the analysis of the biblical text in the language of its original or earliest available form."

Bible research is conducted through scholarly investigation and analysis of the biblical texts, historical context, languages, archaeology, and theological interpretations.

How is Bible research conducted and what does it involve?

Bible research involves a multidisciplinary approach that combines textual analysis, historical research, linguistic studies, and archaeological findings. Scholars examine the original languages of the Bible, such as Hebrew and Greek, to gain a deeper understanding of the texts.

They also study the historical and cultural context in which the biblical events took place, using sources from that time period to provide insights into the text. Additionally, archaeological discoveries help to shed light on the ancient world and provide tangible evidence related to biblical accounts.

Read more about bible research

brainly.com/question/30438688

#SPJ2

Fault tolerance refers to

how a network fails.

how well a network recovers after a failure.

mirror operations.

servers.

Answers

Answer:

servers

Explanation:

because it good for servers

Answer: How well a network recovers after a failure.

Explanation:

Which statement is true about Location tracking in QuickBooks Online?
a. Locations affect only the source of a transaction
b. Location labels (for example, "Division" or "Territory") can be changed to suit the individual business
c. Location tracking is available in all subscription levels of QuickBooks Online
d. Sub-locations do not count toward QuickBooks Online usage limits
e. QuickBooks Online Advanced allows for unlimited hierarchical levels of locations

Answers

The statements about Location tracking in Quick Books Online are true are The Location can be selected on each row of a journal entry and The Location can be filtered on the Pay bills screen.

There are a few examples of how location sharing applications and features benefit our daily lives: Assist you in tracking down and recovering lost or stolen smart gadgets. When you phone 911, you are giving emergency responders your location. Allow you to avoid traffic.

The assertions concerning QuickBooks Online's location tracking are correct. On each row of a journal entry, the Location may be selected, and the Location can be filtered on the Pay bills screen. As a result, options 2nd and 5th are accurate.

Learn more about location here:

brainly.com/question/11718756

#SPJ1

Other Questions
The posted speed limit is 45 miles per hour.Select all of the rates that are faster than 45 miles per hour.A. 45 km per hourB. 64.1 km per hourC. 86.4 km per hourD. 91 km per hourchoose all that apply the nurse has received a 7 am change of shift report on four clients. which client should the nurse check first? If you get an 85% on a quiz and the quiz is 40 questions how many questions did you get right? hurry im timed!What type of memory card can be described as having middle of the range capacity with some room for video?SDXCSDHCSDSIF finley corporation has monthly fixed costs of $240,000. it sells two products for which it has provided the following information. I need help explaining and answering Answer only if you're certain, please.Arm & Hammer recently used a clever freestanding insert in Redbook, Good Housekeeping, and Martha Stewart Living magazines, showing ways its baking soda can be used (e.g., in refrigerators and freezers to absorb odors) beyond its initial purpose as a baking ingredient. This illustrates how consumer-oriented sales promotions:Group of answer choicesnone of these.are employed to stimulate trial.are employed to combat competitive activity.are employed to increase consumption of an established brand.are employed to introduce a new brand. please help 100 points easy question for brainliest In triangle ABC, side a = 5 units long, side b = 7 units long, side c = 8 units long. Find the measurement of angle A. O A = cos (25) O A = cos () O A=cos (1) O A = cos ()Solve the equation:" Question 7A: Keisha has $585.43 in her checking account. She must maintain a balance of $300 to avoid a fee. She wrote a check for $302.05 today. Write an inequality, using x for the variable, that would be used for the least amount of money she needs to deposit to avoid a fee.Question 7B: Using your inequality from question 7A, solve the inequality to find the least amount of money Keisha can deposit to avoid a fee. Classify each of the following atomic-scale views. Pure element Pure compound Mixture of an Element and a compound Mixture of Two Elements Mixture of Two compounds Will the standard form 3.2 x 10-4 be more or less than 1? Explain what effect thenegative exponent has. f(x)=2(x7)(x3) y intercept Consider the linear transformation that takes a point inR3 and projects it onto W R3. W is a planegenerated by u = (1, 2, 3) and v = (1, 0, 1). Find the eigenvectorsof this linear transformatio Use the information below to create a cost spreadsheet for a short-course your development team offered to a small development team on project estimation. The spreadsheet should contain calculations on your companys projected total costs, total revenues, and total profits. (10) You will charge $600 per person for a two-day class. You estimate that 30 people will attend the class, but you want to change this input. Your fixed costs include $500 total to rent a room for both days, setup fees of $400 for registration, and $300 for designing a postcard for advertising. You will not include your labour costs for this estimate, but you estimate that you will spend at least 150 hours developing materials, managing the project, and giving the actual class. You would like to know what your time is worth given different scenarios. You will order 5,000 postcards, mail 4,000, and distribute the rest to friends and colleagues. Your variable costs include the following: a. $5 per person for registration plus 4 percent of the class fee per person to handle credit card processing; assume that everyone pays by credit card b. $.40 per postcard for printing if you order 5,000 or more c. $.35 per postcard for mailing and postage d. $25 per person for beverages and lunch e. $30 per person for class handouts Be sure to have input cells for any variables that might change, such as the cost of postage and handouts. Calculate your profits based on each of the following numbers of people who might attend: 10, 20, 30, 40, 50, and 60. In addition, calculate what your time would be worth per hour based on the number of students. Try to use the Excel data table feature to show the profits based on the number of students. If you are unfamiliar with data tables, just repeat the calculations for each possibility of 10, 20, 30, 40, 50, and 60 students. Print your results on one page, highlighting the profits for each scenario and what your time is worth. Which of the following is a job for a landscape architect?planning a municipal parkconserving land on traditional farmsoperating machinery on crops cutting down trees on private land Why do you think World War II was even worse than World War I? How many thick filaments surround every thin filament in each myofibril? aa Instructions: Part 1. The input data is in an input file named "scores.txt". The data is structured as follows (add names last, after your program works correctly in processing the numeric scores): Whole name of the first skateboarder (a string, with first name followed by last name, separated by one space) First judge's score (each is a floating point value) Second judge's score and so on ... for a total of five scores Whole name of the second skateboarder First judge's score for the second skateboarder Second judge's score and so on... . . The number of skateboarders included in the file is unknown. As you have found in previous attempts to determine the final score of each skateboarder, the processing task was very difficult without being able to save the scores for one competitor before reading in the scores for the next. In this lab, you will be improving your program by using arrays to save each skateboarder's scores, and then defining separate functions to perform the processing of the scores. Next steps: Define an array to store the scores for each skateboarder, and modify your loop to save each score read from the data file into the array. Define three separate user-defined functions to perform the separate tasks of identifying the minimum and maximum scores, and computing the average. These functions should take the array of scores for one skateboarder and the integer number of scores to process in this case, the array length) as parameters. You may design your program in one of two ways: You may have each of these functions called separately from main, or you may design your program to have the function computing the average responsible for calling each of the other functions to obtain the minimum and maximum values to subtract before computing the average. . Extra credit options (extra credit for any of the following): Extra credit option: Initially, define the function to compute the maximum score as a stub function, without implementing the algorithm inside the function and instead returning a specific value. The use of stub functions allows incremental program development: it is possible to test function calls without having every function completely developed, and supports simultaneous development by multiple programmers. (Capture a test of this function before adding the final detail inside; see Testing section below.) The fact that the number of skateboarders included in the file unknown at the beginning of the program presents difficulties with static memory allocation for the array: you may declare the array too small for the number of competitors with data in the file, or you may waste memory by making it too large. Implement dynamic memory allocation using the C malloc function. How would you increase the memory allocated if necessary? Add the code to determine the winning skateboarder (the one with the highest average score). Display both the winning score and the name of the winner. . Part 2. Testing: Test your program and include screenshots of the results for the following situations: a complete "scores.txt" data file with data for at least three skateboarders the results of calling a stub function for extra credit: the identification of the winning skateboarder and winning score . . find the gradient vector field f of f and sketch it. f(x, y) = x2 5y