What do you get when you cross a computer with a lifeguard.

Answers

Answer 1

Answer:

A screensaver! hahahaa

Explanation:

Have a good day! :)


Related Questions

10x10=

only the user yobreffstank is allowed to answer this. please respect that and do not answer it. once he has you are allowed to answer!! ty

Answers

Answer:

100

Explanation:

10+10+10+10+10+10+10+10+10+10= 100

Answer:

100

hope this hellps sss bruhhh even tho im the sname personn

030

Explanation:

Implement a program to find the average of 100 integers that are randomly generated, using both C and RISC-V assembly, and simulate the assembly program execution using RARS.

The C program MUST follow these steps: 1) declare an int array of 100 elements, and use a for loop to generate 100 integers and store them in the array; 2) use another for loop to accumulate those numbers by reading them from the array and adding up to a variable; 3) calculate the average by dividing the accumulated sum with 100, and 4) print the average and return the average. Your program should NOT do the number generation and accusation in one loop

Answers

To simulate the assembly program execution using RARS, you can simply load the RISC-V assembly program into RARS, assemble it, and run it.

To implement a program to find the average of 100 integers that are randomly generated using both C and RISC-V assembly, you can follow the steps below:

C program:

```

#include

#include

#include

int main()

{

int array[100], i, sum = 0, avg;

srand(time(0));

// Generate 100 random integers and store them in the array

for(i=0; i<100; i++)

{

  array[i] = rand() % 100;

}

// Accumulate the numbers by reading them from the array and adding up to a variable

for(i=0; i<100; i++)

{

  sum += array[i];

}

// Calculate the average by dividing the accumulated sum with 100

avg = sum / 100;

// Print the average and return the average

printf("The average is %d\n", avg);

return avg;

}

```

RISC-V assembly program:

```

.data

array: .space 400

sum: .word 0

avg: .word 0

.text

.globl main

main:

# Generate 100 random integers and store them in the array

li t0, 0

li t1, 100

li t2, 0

loop1:

  blt t0, t1, loop1_body

  j loop1_end

  loop1_body:

    li a0, 42

    li a7, 168

    ecall

    sw a0, array(t2)

    addi t0, t0, 1

    addi t2, t2, 4

    j loop1

loop1_end:

# Accumulate the numbers by reading them from the array and adding up to a variable

li t0, 0

li t1, 100

li t2, 0

loop2:

  blt t0, t1, loop2_body

  j loop2_end

  loop2_body:

    lw t3, array(t2)

    lw t4, sum

    add t4, t4, t3

    sw t4, sum

    addi t0, t0, 1

    addi t2, t2, 4

    j loop2

loop2_end:

# Calculate the average by dividing the accumulated sum with 100

lw t0, sum

li t1, 100

div t0, t0, t1

sw t0, avg

# Print the average and return the average

lw a0, avg

li a7, 1

ecall

li a7, 10

ecall

```

To simulate the assembly program execution using RARS, you can simply load the RISC-V assembly program into RARS, assemble it, and run it. The output will be displayed in the RARS console.

Learn more about assembly program:

brainly.com/question/13171889

#SPJ11

the locations of the various indexed variables in an array can be spread out all over the memory. group of answer choices true false

Answers

It is false that the locations of the various indexed variables in an array can be spread out all over the memory.

In an array, the locations of the various indexed variables are not spread out all over the memory. Instead, the elements of an array are stored in contiguous memory locations. This means that the memory addresses of consecutive array elements are adjacent to each other.

The concept of contiguous memory allocation is fundamental to arrays. It allows for efficient and direct access to array elements using their indices. The memory addresses are calculated based on the starting address of the array and the size of each element.

For example, in C/C++, if you have an array of integers, the memory locations of the array elements will be consecutive, with each integer taking up a fixed amount of memory (typically 4 bytes). Accessing an element in the array is achieved by calculating the memory address of the desired element based on its index.

Therefore, the elements of an array are stored contiguously in memory, ensuring efficient access and predictable memory addressing.

To know more about array, visit:

brainly.com/question/13261246

#SPJ11

Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between adjacent coordinate pairs. So, if you end up with a list of coordinate pairs like this:
[(1, 2), (2, 3), (-3, 3), (0, 0), (2, 6)]
… then your program should print the following slopes:

Slope between (1, 2) and (2, 3): 1.0
Slope between (2, 3) and (-3, 3): 0.0
Slope between (-3, 3) and (0, 0): -1.0
Slope between (0, 0) and (2, 6): 3.0
You’ll need to pack the two values you retrieve from the user into a tuple.

As you go through your pairs of tuples, you can also unpack the variables in them into x1, y1, x2, and y2. That way, computing the slope is as simple as:

slope = (y2 - y1) / (x2 - x1)

Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list.

Answers

Answer:  

Python code print("**** Please enter 5 coordiante pairs ****") lst1 = [] # initialise two empy lists lst2 = [] for i in range(5) : # 5 iterations to ...

e. Define the term ‘user interface’, giving examples.

f. What is a mobile application?

g. Explain briefly what a multi-tasking system is and how it works?​

Answers

Answer:

u

Explanation:

iiiiiiiiiiiiiiiiiiii

In which directory would a system administrator store scripts that should be run monthly by the cron daemon?

Answers

Answer: /etc/cron.monthly

Explanation:

Besides syndicated data and publicly available data there are other useful sources for discovering marketing data. Identify some of the additional sources: Pew Research Center, World Bank Data, ____

Answers

World Bank Data,____and other government agencies, industry associations, trade publications, and market research firms can provide additional sources of marketing data.

What are some additional sources of marketing data besides syndicated data and publicly available data?

Besides Pew Research Center and World Bank Data, some additional sources for discovering marketing data could include government agencies, such as the US Census Bureau, which provides a wide range of demographic and economic data at both the national and local level.

Other useful sources could include industry associations, which often gather and report on data related to specific industries or markets.

Additionally, social media platforms, can provide valuable insights into consumer preferences and behavior through their advertising and analytics tools.

Lastly, internal data sources, such as sales data, customer feedback, and website analytics can also provide valuable information for marketers looking to understand their target audience and improve their marketing efforts.

Learn more about sources

brainly.com/question/30071452

#SPJ11

which fields in the contact form is used to control the order in which contacts are displayed in the current view?

Answers

Answer:

The answer is "File As"

Explanation:

The file is a data collection, that is processed either by filename in a single system. It could be a text, an image, a sound or a streaming server, a software collection, an and app, and other data collection. In this, the File As the field is used to order in connections that are displayed in the original understanding was controlled by using the contact-form sector.

consider the following linear program. max 1a − 2b s.t. −4a 3b ≤ 3 1a − 1b ≤ 6 a, b ≥ 0 (a) graph the feasible region for the problem.

Answers

The feasible region for the given linear program can be graphed as a bounded region in the first quadrant of a coordinate plane. It is defined by the intersection of two lines: -4a + 3b = 3 and a - b = 6, along with the non-negativity constraints a ≥ 0 and b ≥ 0.

To graph the feasible region, we start by plotting the two lines -4a + 3b = 3 and a - b = 6. The line -4a + 3b = 3 can be rewritten as 3b = 4a + 3, which has a y-intercept of (0,1) and a slope of 4/3. We can plot this line on the coordinate plane.

Similarly, the line a - b = 6 can be rewritten as b = a - 6, which has a y-intercept of (0,-6) and a slope of 1. We can also plot this line on the same coordinate plane.

Next, we look for the points of intersection between the two lines. By solving the system of equations -4a + 3b = 3 and a - b = 6, we find that the intersection point is (3, 9).

Finally, we consider the non-negativity constraints a ≥ 0 and b ≥ 0, which means the feasible region is limited to the first quadrant of the coordinate plane (where both a and b are non-negative).

The feasible region is the bounded region in the first quadrant that lies between the two lines and includes the point of intersection. This region represents all the feasible solutions for the given linear program.

learn more about linear program here:

https://brainly.com/question/32090294

#SPJ11

Dsl is an example of what type of internet access?.

Answers

Answer: Digital Subscriber Line (broadband connection)

explore the data frame, identify and report the missing data. how will you deal with the missing data?

Answers

To identify missing data in a data frame, you can check for null values or use visualization techniques. Dealing with missing data can involve approaches such as deletion, imputation, or using categorical indicators, depending on the extent and nature of the missing values.

To explore a data frame and identify missing data, you can use various techniques such as checking for null values, visualizing missing data patterns, or using summary statistics.

Once the missing data is identified, you can employ different strategies to deal with it. Here are some common approaches:

1. Deleting Rows or Columns: If the missing data is minimal or doesn't significantly affect the analysis, you may choose to delete the rows or columns containing missing values. However, this approach should be used cautiously to ensure that valuable information is not lost.

2. Imputation: Missing values can be replaced with estimated or predicted values based on other data points. This can be done through mean, median, mode imputation, or using more advanced techniques like regression or machine learning algorithms.

3. Categorical Indicator: If missing values occur in categorical variables, you can create a separate category or indicator variable to represent missing data. This allows the missingness to be explicitly accounted for in the analysis.

4. Multiple Imputation: In cases where missing data is more extensive, multiple imputation methods can be employed. This involves creating multiple imputed datasets, filling in missing values using statistical models, and combining the results to obtain more accurate estimates.

5. Domain Knowledge: Depending on the context and the reason for missing data, domain knowledge can help inform the best approach.

For instance, if missing values are due to non-response in a survey, understanding the survey process and potential biases can guide imputation techniques.

The choice of how to deal with missing data depends on factors like the amount of missing data, the nature of the variables, the goals of the analysis, and assumptions made about the missingness.

It is important to carefully consider the impact of each method and the potential biases introduced to ensure the validity and reliability of the analysis.

Learn more about data frame:

https://brainly.com/question/30403325

#SPJ11

Using the Internet comes with certain risks that you should be prepared for. True False​

Answers

True true and true u can get catfished or be talking to a 78 y/o man like me am I a person or a old piece of hag

how to stop someone from accessing your phone remotely

Answers

Answer:

You turn it off completely

Which command can be used to modify the TCP/IP routing table? O. nslookup O tracertO routeO ipconfig O netstat

Answers

The "route" command can be used to modify the TCP/IP routing table.

The "route" command allows the user to view and modify the routing table, which is used to determine the path that network data takes as it travels from one device to another.

The route command can be used to add, delete, or change entries in the routing table, as well as to display the current contents of the table. For example, the "route add" command can be used to add a new entry to the routing table, while the "route delete" command can be used to remove an existing entry. The command can also be used to modify the metric value of a route which is used to determine the best path to a destination.

Learn more about command, here https://brainly.com/question/27742993

#SPJ4

The route (third O option) is the command can be use to modify the TCP/IP routing table.

What is TCP?

TCP stand for Transmission Control Protocol  defines as a standard which defines how to set up and preserve a network conversation by which applications could trade data. TCP runs with the Internet Protocol (IP), that defines how computers addressed packets of data to one another. Because of TCP works cant separate from IP, they also called as TCP/IP. There are four layers of the TCP/IP Model, they are Internet Layer, Host to Host Layer, Network Access Layer, and Application Layer. This layers are using one of the this 7 protocol: DHCP, FTP, HTTP, SMTP, Telnet, SNMP and SMPP.

Learn more about TCP here

https://brainly.com/question/17387945

#SPJ4

Components Of Desktop System?






Thanku! :)\( \: \)

Answers

components Of desktop system:

motherboard { backbone of the computer system controlling all tasks }RAM { temporary random access memory }ROM { stores huge amount of data ex - photos, videos }CPU { central processing unit which processes data }GPU {graphical processing unit for video editing, 3D graphics rendering}

The Components Of Desktop System are; CPU, RAM, ROM, GPU and Motherboard

What are the components of a desktop system?

A desktop computer is a computer that fits on or under a desk and make use of peripheral devices for interaction. Now, the components of a desktop system are:

CPU which is central processing unit.MotherboardRAM which is Random access memory.ROM which is Read Only MemoryGPU which is graphical processing unit.

Read more about basic components of a desktop system at; https://brainly.com/question/21283135

What do you think are the downside of this trend if we want to secure proper information dissemination

Answers

Answer:

Information is often disseminated in order to educate, explain or promote a concept, process or principle. ... The following are considered to be the main objectives of disseminating information in the TAP. a)Promote results. TAP has to ensure a wide dissemination of its projects' results of activities.Interpretation becomes easier when the evolution and statistical trend of this indicator is ... No matter the age of the learner, one must cons. ... DOE shall disseminate to the public, in an appropriate manner, information.

Is a dot matrix printer an impact or non-impact printer

Answers

i think a non impact printer

Answer:

Impact

Explanation:

A standard method for labeling digital files is called a file-labeling what? question 5 options: protocol tool setting configuration

Answers

A standard method for labeling digital files is called option A: file-labeling protocol.

What are three file naming conventions?

An outline for naming your files in a way that pass out  their contents and their relationships to other files is known as a file naming convention. File naming conventions make it simpler to recognize your files and help you stay organized. You can discover what you need quickly by constantly arranging your files.

Therefore, the three file naming patterns are;

Dashes (e.g. file-name. yyy) (e.g. file-name. yyy)No division (e.g. filename. yyy )Camel case, which capitalizes the initial letter of each block of text (e.g. File Name. yyy )

Learn more about file-labeling from

https://brainly.com/question/21440135
#SPJ1

Answer:

protocol

Explanation:

TOOK THE TEST 6.03 quiz 7th grade

3 things in terms of photography to learn about.

Answers

The three important principle in photography are;

Light Subject and Composition.

What is the explanation for these terms?

Photography is about light. Without it, you couldn't even take images, let alone excellent ones.

The quality of light varies from one to photograph, yet it is always what gives your photographs their underlying structure. It doesn't get any more basic than that.

Most of us snap photos because something catches our attention.

Unsurprisingly, that "something" is your subject.

If you're explaining a photograph to someone else, the topic is most likely the first thing you'll mention.

Finally, the composition is the third and most important aspect of every shot.

Simply said, composition is the arrangement of the things in your shot. It includes your camera position, the connections between photo elements, and the things you accentuate, deemphasize, or altogether eliminate. Composition is the method through which you communicate your tale.

Learn more about photography:
https://brainly.com/question/30685203
#SPJ1

A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function

Answers

Answer:

"Transport" is the correct answer.

Explanation:

Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.

So that the above would be the correct approach.

jessica has connected her new printer to her windows 10 computer, but windows is not recognizing it. what should she do?

Answers

reconnect the printer or you could  Explanation:

If Windows 10 is not recognizing Jessica's new printer, she should take the following steps:

Check the physical connections: Ensure that the printer is properly connected to the computer via a USB cable or a network connection.

The Steps to take

Restart both devices: Restart the computer and the printer to refresh the system and establish a new connection.

Update printer drivers: Visit the printer manufacturer's website and download the latest drivers specific to her printer model. Install the drivers on the computer.

Run the printer troubleshooter: Go to the Windows settings, select "Update & Security," then "Troubleshoot." Choose "Printer" and follow the on-screen instructions to diagnose and fix any issues.

Read more about printers here:

https://brainly.com/question/31051187

#SPJ2

Which of the following STEM discoverers developed a new type of computer hardware?

Answers

Which of the following STEM discoverers is known for creating complex computational physics to develop computer models to simulate fluid movement?

Edison

Fedkiw

Gates

Hawking

Answer:

Fedkiw

Explanation:

Ronald Fedkiw is a professor at Stanford and also a STEM discoverer that is credited with developing a new type of computer hardware model which was used to simulate fluid movements.

His invention has helped him win various awards because it has helped professionals and technicians create visual effects for videos.

What are the short notes for titles of advantages of email titles of important terms of flash definition of frames and timeline and definition of hotmail and url

Answers

The advantages of email include instant communication, global reach, and easy organization of information.

Titles of important terms for flash are animation software, vector graphics, and multimedia content. Frames and timeline in the context of web design refer to the division of web pages into separate sections and the sequential order of displaying content.

Hotmail is an email service provider and URL stands for Uniform Resource Locator, which is the web address of a specific webpage. Email offers advantages such as instant communication, global reach, and easy organization of information. Important terms for flash include animation software, vector graphics, and multimedia content.

Frames and timeline in web design refer to the division of web pages into separate sections and the sequential order of displaying content. Hotmail is an email service provider, and URL stands for Uniform Resource Locator, which is the web address of a specific webpage.

To learn more about URL :

https://brainly.com/question/31146077

#SPJ11

#done with school already

Answers

Answer: omg yes same hate it

Explanation:school is boring and we have to do work.

full form of ip ........?​

Answers

internet protocol - hope this helps!

pls. I really need it now pls.........​

pls. I really need it now pls.........

Answers

Hope this helps you out :)
pls. I really need it now pls.........

Renee is configuring her vulnerability management solution to perform credentialed scans of servers on her network. What type of account should she provide to the scanner

Answers

Renee should provide the scanner a local administrator type of account when configuring her vulnerability management solution to do authorised scans of the servers on her network. The correct option is B.

Credentialed scans are vulnerability scans that use privileged log-in credentials to login to systems in order to log in and collect comprehensive information on the software configuration and program catalogue.

Privileged accounts enable the scanner to assess the target systems more thoroughly when doing vulnerability scanning. In this case, Renee must grant the scanner a local administrator account.

The ability to install software and change system settings is among the features of a local administrator account, which has administrative powers on a single machine without either root access or domain-wide administrative access on Unix/Linux computers.

Thus, the correct option is B.

For more details regarding vulnerability scans, visit:

https://brainly.com/question/30439080

#SPJ4

Your question seems incomplete, the probable complete question is:

Renee is configuring her vulnerability management solution to perform credentialed scans of servers on her network. What type of account should she provide to the scanner?

A. Domain administrator

B. Local administrator

C. Root

D. Read-only

Which of the following terms defines a small, single-user computer used in homes and businesses?

Personal computer

Work station

Mini computer

Supercomputer

Answers

Answer:

Mini Computer

Explanation:

Person Computer. small, single-user computer; used in homes and businesses; based on a microprocessor. Microprocessor. chip which is the master control circuit of a computer. Minicomputer.

Pa brainliest po thank you

The correct option is A. Personal computer is defined as a small, single-user computer used in homes and businesses.

What is a personal computer?

A personal computer (PC) is a multifunctional microcomputer that can be used for a variety of tasks and is affordable enough for home use. Instead of being operated by a computer specialist or technician, personal computers are designed to be used directly by end users.

Personal computer (PC): compact, single-user computer with a microprocessor that is used in homes and businesses.

A personal computer (PC) is a compact computer made for solitary usage. A single-chip microprocessor serves as the central processing unit in a PC or microcomputer (CPU).

The right answer is A. Small, single-user computers used in homes and companies are referred to as personal computers.

Learn more about personal computers here:

https://brainly.com/question/14406548

#SPJ2

What are three characteristics of UTP cabling? (Choose three.):
- uses light to transmit data
- susceptible to EMI and RFI
- commonly used between buildings
- easiest type of networking cable to install
- most commonly used networking cable
- commonly used for Internet connectivity by a cable TV provider

Answers

The three characteristics of UTP (Unshielded Twisted Pair) cabling are: Susceptible to EMI and RFI, Easiest type of networking cable to install, Most commonly used networking cable. Therefore, options 2, 4 and 5 are the correct answer.

Susceptible to EMI and RFI:

UTP cables are prone to electromagnetic interference (EMI) and radio frequency interference (RFI) due to their lack of shielding. External sources of electromagnetic radiation can cause signal degradation or noise on the cable.

Easiest type of networking cable to install:

UTP cabling are known for their simplicity and ease of installation. They consist of twisted pairs of copper wires and are widely used for Ethernet connections in homes and offices. The straightforward design and standardized connectors make them relatively easy to install.

Most commonly used networking cable:

UTP cables are the most commonly used type of networking cable for Ethernet connections. They are extensively deployed for local area networks (LANs) and are compatible with various networking devices such as routers, switches, and computers. UTP cables support different Ethernet standards, including Cat5e, Cat6, and Cat6a, providing reliable data transmission for a wide range of applications.

So, options 2,4, and 5 are the characteristics of UTP.

To learn more about UTP (Unshielded Twisted Pair): https://brainly.com/question/14138222

#SPJ11

Write a program to input the day of a week and print holiday if it is Saturday

Answers

DAY=int(input(“Please enter the number of day: ”))
if DAY==1:
… print(“The day is Monday and a working day”)
…elif DAY==2:
… print(“The day is Tuesday and a working day”)
…elif DAY==3:
… print(“The day is Wednesday and a working day”)
…elif DAY==4:
… print(“The day is Thursday and a working day”)
…elif DAY==5:
… print(“The day is Friday and a working day”)
…elif DAY==6:
… print(“The day is Saturday and a holiday”)
…elif DAY==7:
… print(“The day is Sunday and a working day”)
…else:
… print(“Invalid number”)
Other Questions
Find the area of the parallelogram: 1. According to the National Parks Service, which of the following is a benefit of electricbikes in the parks?A. They will encourage people to buy more memberships for the parks,B. They will reduce the need for parking spaces.C. They will protect visitors from wildlife like coyotes.D. All of the above 3. Suppose the interest rate is 5% per period. You hold a portfolio that longs 2 shares of the stock and borrows $40 cash. If the market price of the stock can be either $21 or $55 in the next period, then the following must be true for the payoff of the portfolio in the next period: a. If the stock price is $21, then the payoff of the portfolio will be $0 b. If the stock price is $21, then the payoff of the portfolio will be $84 c. If the stock price is $55, then the payoff of the portfolio will be $68 d. If the stock price is $55, then the payoff of the portfolio will be $152 Fats and carbohydrates each yield nine calories perTrueFalse Aniline is to be cooled from 200 to 150F in a double-pipe heat exchanger. For cooling, a stream of toluene amounting to 8600 lb/hr at a temperature of 100Fis available. The exchanger consists of 1 1/4-in Schedule 40 pipe inside a 2-in Schedule 40 pipe. The aniline flow rate is 10,000 lb/hr. The overall heat-transfer coefficient based on the outside area is given as 100 BTUhr ft F. (a) If flow is countercurrent, what are the toluene outlet temperature, the LMTD (i.e. ATLM), and the heat transfer area needed to do this job? (b) What are they if flow is parallel? You need to look up any physical properties that are required. How do you properly hydrate?. a hospital educator has been commissioned with investigating evidence regarding the use of physical restraints. how should the nurse approach publication data parameters for this search? question 2 options: a) the nurse should establish a cutoff for sources more than 5 years old. b) the nurse should attempt to identify collaborative evidence for any source that is more than 3 years old. c) the nurse should prioritize the quality and comprehensiveness of the evidence over its date of publication. d) articles should be ranked according to publication date, with the most recent articles being prioritized. Select all that apply.The "s verb" occurs in3rd person1st personsingularpresent tenseindicative mood Find a surface parameterization of the portion of the tilted plane x-y + 2z = 2 that is inside the cylinder x + y = 9. 1. Why is this era known as the Scramble for Africa? 2. How might the division of their land affect African cultures? La expresin que se utiliza para definir una tableta donde puedes leer libros es el ________. Calculate a payback analysis. That is, how long will it take for Creemore Springs to pay back the cost of this investment? You will need to identify the total investment, identify and calculate the annual incremental costs, identify and calculate the annual incremental benefit, and then calculate the payback in years. (60 marks)For Ivey Case : Bottling at Creemore Springs Brewery What is the equation of the line that is perpendicular to y equals negative four x plus five and passes through the point four comma negative three ? 13. The following is the balance sheet of a banking system.Assets Liabilities Reserves $1,000 Deposits $4,000 Loans $3,000Assume the required reserve ratio is 20% and there is no cash leakage.(a) Calculate the amount of excess reserves held by banks.(b) Calculate the increase in the amount of loans after lending out the excess reserves.(3 marks) please help its a final Exaggerated or oversimplified beliefs about people who belong to a certaingroup, race, ethnicity, gender, or other that can lead to prejudice anddiscrimination is called: *RacismStereotypeDiversityXenophobia A survey team is trying to estimate the height of a mountain above a level plain. From one point on the plain, they observe that the angle of elevation to the top of the mountain is 30. From a point 3000 feet closer to the mountain along the plain, they find that the angle of elevation is 34. How high (in feet) is the mountain? The mountain is ____ feet high. In each of the following, find the dimension of the subspace of P_3 spanned by the following: S = span{x, x - 2, x^2 + 2} S = span{x, x - 2, x^2 + 2, x^2 - 2} dim(s) = S = span {x^2, x^2 - x - 2, x + 2} S = span{x^2, x^2 - x - 2, x + 2} dim(S) = S = span{3x, x - 3} dim(s) = 5x-11x +6 . factories the expression In a negotiation between a seller and a buyer the parties agreement is as follows: The exporter will ship the goods directly to the buyer and the documents through the banking channels. Buyer will pay in order to receive the documents. What method of payment they agreed on:letter of creditdocumentary collectionopen accountconsignment?