Please please please help I beg I'll give brainiest. :(

A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable

Answers

Answer 1

Answer:

A) toggle switch B) Push to Make switch C) Monostable

Explanation:

toggle because it needs to go off when the timer ends and not when u press a button

Push to make because you turn the timer off manually

Monostable because it needs to go off once not repeatedly


Related Questions

Brianna is taking a backpacking trip in the wilderness and wants to back up the photos from her camera. Which type of storage device would be best for this purpose?
A. Optical disc
B. Cell phone
C. Flash drive
D. HDD

Answers

Answer:

C

Explanation:

Flash drives usually have an input (E.G. one of those android charger connectors), so just plug that into your camera, and load the flash drive with the photos. Then go home and plug the USB on the flash drive into your PC. If there isn't already, a folder will be made in your "Pictures" folder on your PC, to which you can open the folder, and then your photos should be there. From there you can open them, print them, etc.

Hope this helped, and sorry if I didn't answer in time.

Data is stored in a computer using patterns of __________ defined by standard coding schemes

Answers

Data is stored in a computer using patterns of bits defined by standard coding schemes.

A closure is the combination of a function bundled together (enclosed) with references to its surrounding state (the lexical environment). In other words, a closure gives you access to an outer function's scope from an inner function. In JavaScript, closures are created every time a function is created, at function creation time.
Consider the following example code:
function init() {
var name = "Mozilla"; // name is a local variable created by init
function displayName() {
// displayName() is the inner function, that forms the closure
console.log(name); // use variable declared in the parent function
}
displayName();
}
init();
Copy to Clipboard
init() creates a local variable called name and a function called displayName(). The displayName() function is an inner function that is defined inside init() and is available only within the body of the init() function. Note that the displayName() function has no local variables of its own. However, since inner functions have access to the variables of outer functions, displayName() can access the variable name declared in the parent function, init().

Answers

A closure is the combination of a function bundled together (enclosed) with references to its surrounding state (the lexical environment). In other words, a closure gives you access to an outer function's scope from an inner function. In JavaScript, closures are created every time a function is created, at function creation time.

In the provided example code, the `init()` function creates a local variable called `name` and a function called `displayName()`. The `displayName()` function is an inner function defined inside `init()` and is only available within the body of the `init()` function. It's important to note that the `displayName()` function has no local variables of its own. However, since inner functions have access to the variables of outer functions, `displayName()` can access the variable `name` declared in the parent function, `init()`.

Here's an explanation of the code execution:
1. The `init()` function is declared and defined.
2. The `init()` function is called.
3. Inside the `init()` function, the variable `name` is created and assigned the value "Mozilla."
4. The inner function `displayName()` is declared and defined within the `init()` function.
5. The `displayName()` function is called.
6. Inside the `displayName()` function, it logs the value of the `name` variable, which is accessible through closure from the parent function `init()`.
7. The console displays "Mozilla" as the output.

Learn more about JavaScript here:

https://brainly.com/question/30031474

#SPJ11

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

You can use artificial lighting when rendering a view. When the dimming value of a light fitting is set to 1, what does that do within the render?

Answers

When rendering a view, artificial lighting can be used to achieve a specific look or mood. The dimming value of a light fitting determines the brightness of the light, with 1 being the highest level of brightness.

When the dimming value is set to 1, the light fitting will emit its maximum brightness in the render, creating a brighter and more illuminated scene. This can be useful for highlighting certain features or objects within the view, or simply for creating a well-lit and visually appealing scene. Overall, understanding how to manipulate artificial lighting and dimming values is crucial for achieving the desired look and feel in a rendered view.

learn more about rendering a view here:

https://brainly.com/question/17405314

#SPJ11

dns is a network of decentralized servers that translate urls (uniform resource locators) into ip address. true false

Answers

Dns is a network of decentralized servers that translate urls (uniform resource locators) into ip address ---- True

DNS Stands for :

DNS, or Domain Name System, translates human-readable domain names (such as www.amazon.com) into machine-readable IP addresses.

What is the IP address of your DNS server?

The Domain Name System (DNS) is the name database where Internet domain names are found and translated into IP (Internet Protocol) addresses. The Domain Name System maps the name that users use to look up her website to the IP address that computers use to look up that her website.

Is DNS the same as IP address?

Web browsers use Internet Protocol (IP) addresses to interact. DNS translates domain names into IP addresses and allows browsers to load Internet resources. Every device connected to the Internet has a unique IP address that other computers use to find the device.

Learn more about DNS :

brainly.com/question/17952402

#SPJ4

It is advised that Lian should use rubbing alcohol to clean what type of equipment?

Question 2 options:

desktop computer


laptop


computer keyboard


typewriter

Answers

Use rubbing alcohol as a disinfectant and as a degreaser! It dries almost instantly, so you don't need to worry about water damage.

What is desktop computer?A desktop computer is a computer that fits on or under a desk. They utilize peripheral devices for interaction, such as a keyboard and mouse for input, and display devices like a monitor, projector, or television. Desktop computers can have a horizontal or vertical (tower) form factor, or be combined with a monitor to create an All-in-One computer. Unlike a laptop, which is portable, desktop computers are generally made to stay at one location.A desktop computer is a personal computing device designed to fit on top of a typical office desk. It houses the physical hardware that makes a computer run and connects to input devices such as the monitor, keyboard and mouse users interact with.

To learn more about desktop computer refer to:

https://brainly.com/question/24309282

#SPJ1

Project: Baseline, Benchmark, Objective, and Goal
Assignment Directions:
Pick a task—the simpler the better. Use the tools discussed to create an overall plan of baseline, benchmark, objective, and goal. Talk about your process. Make sure the objective and goal are possible to be done in a short period of time. That way, your documentation will have an opportunity for illustrations and final evaluations.

Assignment Guidelines:
Think of a simple task, such as balancing a book on your head and walking up the stairs. Show your work. Make your documentation a complete presentation to be shown to others to teach them the concepts included in this lesson.

Submission Requirements:
Student Choice

Question # 1
File Upload
Upload your presentation that demonstrates the overall plan of baseline, benchmark, objective, and goal for a simple task.

Answers

Answer:

This here is what I did for my project

Explanation:

What is a difference between Java and Python? (5 points)
a
Java requires brackets to define functions, while Python requires curly braces.
оо
Ob
Python ends lines of code with semicolons, while Java does not.
Python is a statically typed language, while Java is not.
Od
Variable types in Java cannot be changed, while Python allows them to change.

Answers

I'm not sure if this answers your question but I found this online:

The main difference between Java and Python is their conversion; the Java compiler converts the Java source code into an intermediate code called a bytecode while the Python interpreter converts the Python source code into the machine code line by line.

Sorry if this doesn't answer your question.

I'm not sure if this answers your question but I found this online:

The main difference between Java and Python is their conversion; the Java compiler converts the Java source code into an intermediate code called a bytecode while the Python interpreter converts the Python source code into the machine code line by line.

Sorry if this doesn't answer your question.

A company's website needs to be more highly available and faster for users to access outside of their country. Which action can they take to achieve this?

Answers

The company could use multiple versions of the website hosted on different servers on other countries alongside with using different domain endings.

What is a simple definition for electricity?

Answers

The movement of electrical power or charge is known as electricity. It is a secondary energy source, meaning that we obtain it through the conversion of main energy sources like coal, natural gas, oil, nuclear power, and other natural sources.

Electricity is made up of the incredibly tiny particles protons and electrons. Additionally, it might be used to describe the energy you experience as electrons migrate from one place to another. An example of electricity in nature is lightning strikes. A large number of electrons travelling through the air at once and releasing a lot of energy is all that lightning is. In addition, scientists now understand how to make or produce electricity. Because electricity can be regulated and transmitted across wires, this is advantageous. Following that, it can run computers, heaters, and lightbulbs. In the modern world, electricity now provides the majority of the energy required to run everything.

Learn more about electricity from

brainly.com/question/29371693

#SPJ4

list all the products supplied by the vendor ordva, inc.

Answers

Odva, Inc. supplies a variety of products including electronics, home appliances, and software solutions. Their product range is diverse and tailored to cater to the needs of various customers.

To provide a comprehensive list, the products supplied by Odva, Inc. can be categorized into the following groups:

1. Electronics: This category includes items like smartphones, tablets, laptops, desktop computers, and accessories such as chargers, headphones, and cases.

2. Home Appliances: Odva offers a selection of appliances for the home, such as refrigerators, washing machines, dryers, air conditioners, and kitchen appliances like ovens, microwaves, and coffee machines.

3. Software Solutions: The company also develops and distributes various software products, ranging from operating systems, productivity tools, and antivirus programs to specialized software for specific industries.

4. Entertainment: Odva provides entertainment products like gaming consoles, video games, smart TVs, and home theater systems.

5. Office Supplies: They also cater to businesses with office equipment like printers, photocopiers, fax machines, and stationery supplies.

6. Networking & Connectivity: This category consists of products for networking and internet connectivity, including routers, switches, modems, and network cables.

7. Smart Home & Security: Odva offers smart home devices and security systems like surveillance cameras, smart locks, and home automation products.

In summary, Odva, Inc. is a vendor that supplies a wide range of products across multiple categories, aiming to cater to the diverse needs of their customers. Their offerings include electronics, home appliances, software solutions, entertainment, office supplies, networking and connectivity devices, as well as smart home and security systems.

Know more about the software products click here:

https://brainly.com/question/21279421

#SPJ11

Correct Question: list all the products supplied by the vendor odva, inc.

Any application that wants to be displayed on the web must use the HTTP protocol
True
False

Answers

Answer:

true

Explanation:

The network administrator should always keep the software on the
computers of the weather bureau updated.
10.5.1 A weather analysis application is returning incorrect results
after a recent update.
Give a term for the cause of the problem AND suggest a
solution

Answers

Cause:

The cause may have been an unsupported PC or OS that may not be able to run an updated version of the weather analysis application.

Solution:

There are many solutions to installing new hardware and updating the OS to just simply restarting the PC.

Recommend Solution:

Try looking at the requirements for the new updated version of the application and try to match the requirements.

When designing a struct in C++, one thing worth thinking about is the order in which the members should be listed, which isn't necessarily an arbitrary decision, but one that has a substantive effect on program design. List and briefly describe in a sentence or two each) two ways that the design of a struct can be improved by adjusting the order in which the members are listed in its declaration.

Answers

The order of listing members in a C++ struct can impact program design. Two ways to improve design are enhancing memory utilization and optimizing access patterns.

Memory Utilization: By ordering struct members from largest to smallest, memory alignment can be improved, reducing padding and saving memory space. For example, placing larger members like doubles or long long ints before smaller members like chars or bools can minimize memory wastage due to padding.

Access Patterns: Listing struct members in an order that matches frequent access patterns can improve cache efficiency. By placing frequently accessed members together, the likelihood of cache hits increases, resulting in faster access times. This optimization is particularly relevant when dealing with large data structures accessed in a sequential or patterned manner.

Learn more about data here: brainly.com/question/28285882

#SPJ11

Discuss the security standards that should be included in the
disaster recovery plan of an offshore operation. What are the
security best practices implemented at your company (in
general)?

Answers

Offshore operations are typically accompanied by unique risks, such as extreme weather conditions, which might result in costly damage and lengthy periods of downtime.

It's crucial to include security measures in your disaster recovery plan to safeguard against cyber-attacks, natural disasters, and other hazards.The following security standards should be included in the disaster recovery plan of an offshore operation. Backup systems: In the event of an unexpected event, backup systems should be in place to keep vital functions operational.

To ensure that your systems and data are adequately protected, establish a regular backup plan.2. Regular system updates: To guarantee that your offshore operation is safeguarded against the most recent threats, always keep your operating systems and software up to date. This is a great way to prevent cyber-attacks from affecting your offshore operation.3. User access control.

To know more about operations visit :

https://brainly.com/question/30581198

#SPJ11

Linux uses a logical directory tree to organize files into different folders.
True or False?

Answers

True. Linux uses a logical directory tree to organize files into different folders. Linux uses a tree-like structure to store and arrange files in directories.

A directory, also known as a folder, is a container for files and other directories. It contains all of the data associated with the files stored in it, such as the file's content and metadata. Linux's directory tree is hierarchical, with directories branching out from the root directory to the other directories.

All of the directories in the tree are related to one another. The top-level directory is the root directory, denoted by a forward slash (/). This directory contains all other directories and files in the file system. As the system administrator, you can create new directories and files in the appropriate folders, assign users and groups to them, and set permissions. Linux directory system provides an organized method for keeping track of files and folders, making it easy to find and manage files. The Linux file system's logical tree structure allows for more secure and efficient access to files. It is an important aspect of the Linux operating system and one that is frequently referenced when dealing with its many features.

To know more about Linux visit :

https://brainly.com/question/33210963

#SPJ11

how many bits are needed to store the trie into a file, assuming that extended ascii is used to encode each character?

Answers

The number of bits needed to store a trie into a file depends on the number of characters in the trie and the size of the file format used. Assuming that extended ASCII is used to encode each character, each character can be represented using 8 bits or 1 byte.


To determine how many bits are needed to store the trie into a file using extended ASCII to encode each character, we need to consider the following:

1. Extended ASCII uses 8 bits to represent each character.
2. A trie contains a set of nodes with each node potentially storing a character.

Now, let's calculate the bits needed:

Step 1: Count the number of nodes in the trie.
Step 2: Multiply the number of nodes by 8 bits (as extended ASCII uses 8 bits per character).

So, the total number of bits needed to store the trie into a file using extended ASCII is the number of nodes multiplied by 8 bits.

To learn more about ASCII visit  : https://brainly.com/question/29564973

#SPJ11

construct two parity checkers using the moore machine for one and mealy machine for the other.

Answers

To construct two parity checkers, one using a Moore machine and the other using a Mealy machine, we must first understand what a parity checker is. A parity checker is a digital circuit that checks whether a given set of data bits has an even or odd number of ones, and generates a parity bit accordingly.

A parity checker using a Moore machine would have an output that depends only on the current state of the machine. The input to the machine would be the data bits, and the output would be the generated parity bit. The machine would transition from one state to another based on the input data bits and the current state, and the output would be generated based on the current state of the machine.

A parity checker using a Mealy machine, on the other hand, would have an output that depends not only on the current state of the machine but also on the input data bits. The input to the machine would be the data bits, and the output would be the generated parity bit. The machine would transition from one state to another based on both the input data bits and the current state, and the output would be generated based on the input data bits and the current state of the machine.

To learn more about Parity checkers, visit:

https://brainly.com/question/26339536

#SPJ11

Some of your assignments must be submitted as an attachment. Choose ALL of the
appropriate file extensions for submitting these documents.
QID.pdf (Portable Document File)
.doc or .docx (Microsoft Word document)
Nodt (Open Office Document)
pages (Pages Document)
.rtf (Rich Text File)

Answers

A……..b the answers……..

An Emergency Action Plan (EAP) does which of the following?

the answers are
A assigns responsibility to thise affected and outlines evacuation routes
C Identifies emergencies that might reasonably occur and provides procedures for alerting people about the emergency
D identifies medical responses options and designate an assembly area
E labels the types of equipment present at the worksite​

Answers

Answer:

A

Explanation:

I think u should try A because EAP does it

What are some of the ways in which you can prevent personal identity theft?
Here are some guidelines that will help keep your online interactions secure from identity theft.
1.Never divulge your
social security number
to anyone.

2.Change passwords for Internet or mobile banking
-regularly
-monthly
-bi-annually
.3. Refrain from replying to
-inbox
-junk
-mails that promise gifts or ask for your bank account details.

Answers

The ways in which you can prevent personal identity theft are all of the above options.

1.Never divulge your social security number to anyone.

2.Change passwords for Internet or mobile banking regularly

.3. Refrain from replying messages from junk,  mails that promise gifts or ask for your bank account details.

What is personal information theft?

Identity theft occurs when cybercriminals or con artists steal your personal information and use it to pose as you.

Therefore, In essence, your credentials can be used to access various aspects of your digital life, such as your bank accounts, social networking accounts, and that of your credit card information.

Learn more about personal identity theft from

https://brainly.com/question/28081665
#SPJ1

Hello,
I need help with (MATLAB) programs because I want to create a task to simulate the probability of getting the following hands on a given:
•Couple
•Two pairs
•Triss
•Quad number
•Cook
•Ladder
Note that if the deal contains four identical cards, it only counts as a four and not also a pair or three.
The statistics should be plotted as a bar chart where the height of the bars indicates
the probability in percent. The program that simulates the statistics must receive
one argument, the number of rolls to base the statistics on.

Answers

To simulate the probability of getting specific hands in a card game using MATLAB, you can create a program that takes the number of rolls as an input and generates statistics. The statistics can be plotted as a bar chart, where the height of the bars represents the probability in percentage.

To create the MATLAB program, you would start by defining the rules of the card game and the conditions for each hand (e.g., couple, two pairs, triss, quad number, cook, ladder). Then, you can implement a loop that performs the desired number of rolls, randomly generating card combinations and keeping track of the occurrence of each hand.
Within the loop, you would check if the current combination matches any of the defined hands. If a match is found, you increment the corresponding counter. After the loop completes, you calculate the probabilities by dividing the frequency of each hand by the total number of rolls and multiplying by 100 to get the percentage.
Finally, you can use the bar chart function in MATLAB to plot the statistics, where each hand corresponds to a bar, and the height of the bar represents the probability of obtaining that hand.
By executing this program with different numbers of rolls, you can observe how the probabilities of getting specific hands vary and gain insights into the dynamics of the card game.

learn more about MATLAB here

https://brainly.com/question/30760537



#SPJ11

Question 1
1 pts
(02.01 MC)
Jackie used the software development life cycle to create a new game. Jackie ran her code to make sure it
worked and had no errors.
Which stage of the software development life cycle is Jackie currently in?
o Coding
O Maintenance
O Planning & Analysis
Testing

Answers

Answer:

she is running a maintenance to make sure everything works

mike meyers' comptia a and guide to managing and troubleshooting pcs lab manual, seventh edition michael meyers

Answers

The book, "Mike Meyers' CompTIA A+ Guide to Managing and Troubleshooting PCs Lab Manual, Seventh Edition Michael Meyers" is that this book is a comprehensive learning tool .

That has explanations for the key concepts of PC hardware and software installation, configuration, maintenance, and troubleshooting. The book is very well written and has all the necessary information that one needs to understand PC hardware and software installation, configuration, maintenance, and troubleshooting.

It is divided into two sections: the first section covers hardware installation, configuration, maintenance, and troubleshooting, while the second section covers software installation, configuration, maintenance, and troubleshooting. The book has a hands-on approach, with lots of illustrations, diagrams, and practical examples. It also has review questions and lab exercises at the end of each chapter to help reinforce the concepts learned.

To know more about Lab Manual visit:

https://brainly.com/question/950632

#SPJ11

Which command prints partial or full environment variables?.

Answers

Answer:

printenv command

The command that prints partial or full environment variables is known as "printenv" command.

How can one print all the variables of the environment?

One can definitely print all the variables of the environment with the help of using env command. This env command is generally utilized by shell scripts in order to launch the correct interpreter but you can also use the env command to list available environment variables.

The env command if applied without any arguments and options, will print all the available environment variables. Apart from this, the env command also displays the values of environment variables specified in the context of the question.

Therefore, the "printenv" command is a type of command that prints partial or full environment variables.

To learn more about Computer commands, refer to the link:

https://brainly.com/question/25808182

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which command prints partial or full environment variables?

printenv.printvar.printgov.

. Explain briefly the following concepts as used in the Windows environment (a) Desktop. (b) Window. (c) Icon. d) Sidekick menu. =) Taskbar. Task​

Answers

A minimized application is still accessible from the taskbar since it is still displayed on the desktop.

What does Windows' task bar do?

A minimized application is still accessible from the taskbar since it is still displayed on the desktop. They have what is known as desktop presence. The taskbar allows users to quickly transition between open primary windows and some secondary windows while viewing them on the desktop.

What does a Windows desktop look like?

The common components of a desktop environment are icons, windows, toolbars, folders, wallpapers, and desktop widgets (see Elements of graphical user interfaces and WIMP). Drag and drop capabilities and other elements that complete the desktop metaphor may be offered via a GUI.

To know more about Taskbar visit:-

https://brainly.com/question/28147966

#SPJ1

While reviewing a Web site about a medical condition your aunt was just diagnosed with, you decide to check on the writer of the site. You verify that the writer is a well-known doctor and is a frequent television expert on this medical condition. What characteristic of an effective Web site does this show?



reputable author


verified


unbiased


relevant

Answers

Answer:

This is a characteristic of a reputable author

what are the advantages and potential drawbacks of protocol layering in network design? how does the use of layers help to structure the design of network protocols, and how does it facilitate the updating of system components? finally, what are some potential criticisms of layering as a design principle in networking, and how do these criticisms relate to the goals of separating layers and avoiding duplication of functionality?

Answers

Modularity, flexibility, simplicity of implementation, interoperability, and abstraction are benefits of protocol layering in network design. Drawbacks include overhead, complexity, decreased efficiency, and troubleshooting difficulties.

Modularity, flexibility, simplicity of use, interoperability, and abstraction are benefits of protocol layering in network design. Drawbacks include overhead, complexity, decreased efficiency, and troubleshooting difficulties. By breaking processes into separate, manageable stages, layering aids in giving them structure. The isolation of modifications to certain levels makes component updating easier. Potential inefficiency, a lack of flexibility to adapt to new technologies, and trouble adopting cross-layer optimisations are some of the criticisms. They aim to separate issues and prevent duplication, but they can also result in stiff, unyielding designs. Overall, layering is still a helpful design idea, but it must be carefully balanced with other factors.

learn more about network design here:

https://brainly.com/question/15247828

#SPJ4

Another problem related to indefinite postponement is called ________. This occurs when a waiting thread (letâ s call this thread1) cannot proceed because itâ s waiting (either directly or indirectly) for another thread (letâ s call this thread2) to proceed, while simultaneously thread2 cannot proceed because itâ s waiting (either directly or indirectly) for thread1 to proceed. The two threads are waiting for each other, so the actions that would enable each thread to continue execution can never occur.

Answers

Answer:

"Deadlock" is the right solution.

Explanation:

A deadlock seems to be a circumstance where certain (two) computer algorithms that share a similar resource essentially prohibit each other during manipulating the asset, leading to both programs withdrawing to operate.This occurs when multiple transfers or transactions block everyone by maintaining locks onto assets that every other activity also needs.

So that the above is the correct answer.

Other Questions
Identify the tables that represent linear functions ACSM's initiative, Exercise is Medicine, supports that __ is crucial for the prevention management and treatment of numerous diseases. 1.Which of the following terms describes a market in which the market size for cups of coffee is 20,000 cups per day in a city and the production at minimum efficient scale equals 500 cups per day? (1 point)ConcentratedFragmentedMonopolizedOligopolisticRegulated Remy Corporation sold 4,100 units of its product at a price of $16 per unit. Total variable cost per unit is $9.00, consisting of $8,35 in variable cost of goods soid and $0.65 in variable selling and administrative cost. Compute the contribution margin for the company. Multiple Cholce $28,700 $36.900 $65,600 $34,235 Muttiple Cholce $28,700 $36,900 $65,600 $34,235 $39,565 What are the differences between a Persian landscape and European landscape? Applying the Right Triangle Altitude Theorem. Which similarity statement is true? a hemispherical window (or viewport) in a decompression chamber (see gure) is subjected to an internal air pressure of 85 psi. the window is attached to the wall of the chamber by 14 bolts. (a) find the tensile force f in each bolt and the tensile stress s in the viewport if the radius of the hemisphere is 14 in. and its thickness is 1.25 i Which subshell letter corresponds to a 4-leaf clover orbital pattern? O A.d O B.p O C.s O D. F O E. not enough information Who dies in Ch 8 9 in Lord of the Flies? a(n) ________ is a visual depiction of a population distribution created by the analysis toolpak. find the slope of a line parallel to each given line y = x + 2 A prospective insured receives a conditional receipt but dies before the policy is issued. The insurer will: Pay the policy proceeds only if it would have issued the policy. The conditional receipt says that coverage will be effective either on the date of the application or the date of the medical exam, whichever occurs last, as long as the applicant is found to be insurable as a standard risk, and policy is issued exactly as applied for. question content area if you separated a mixture of benzene, toluene, and m-xylene by gas chromatography, what would be the expected order of retention times? The proposed program section of a proposal contains an itemization of the costs associated with the project you are proposing. True or false (b) On March 1, a securities analyst recommended General Cinema stock as a good purchase in the early summer. The portfolio manager plans to buy 20,000 shares of the stock on June 1 but is concerned that the market as a whole will be bullish over the next three months. General Cinema's stock currently is at 32.88, and the beta is 1.10. i. Construct a hedge that will protect against movements in the stock market as a whole. Use the September stock index futures, which is priced at 375.30 on March 1 and has a $500 multiplier. (5 marks) ii. Evaluate the outcome of the hedge if on June 1 the futures price is 387.30 and General Cinema's stock price is 38.63. (5 marks) Find the y-intercept of the line.y=0.2x-6.9y-intercept: Kaitlin has a rectangular poster. the poster is 1.5 meters long and 0.8 meters wide. what is the area of the poster in square centimeters don't round off answer Which type of cloud forms close to the ground when the temperature is just above the dewpoint? CirrusCumulusfogStratus I suck at telling the clouds part theyre all clouds -.- The odds in favor of Michael Jordan making a free throw were 21:4. Find the probability of Michael Jordan missing a free throw. Give answer as a decimal rounded to the nearest hundredth. isaac believes that his technical skills empower him to choose how, when, and even if he will interact with corporations. he's not alone.