What is the information gain of an attribute that takes a collection with 12 positive items and 54 negative items and divides it into three collections: the first having 10 positive and 20 negative items, the second having 2 positive and 12 negative items, and the third having just 22 negative items

Answers

Answer 1

the information gain of the attribute that divides the collection into three collections is approximately 0.266.

To calculate the information gain of an attribute, we need to quantify the reduction in entropy (uncertainty) achieved by splitting the data based on that attribute. The information gain is calculated using the formula:

Information Gain = Entropy(parent) - Weighted Sum of Entropies(children)

First, let's calculate the entropy of the parent collection, which consists of 12 positive items and 54 negative items.

Entropy(parent) = - (p_pos * log2(p_pos) + p_neg * log2(p_neg))

where p_pos is the proportion of positive items and p_neg is the proportion of negative items in the parent collection.

p_pos = 12 / (12 + 54) = 0.1818

p_neg = 54 / (12 + 54) = 0.8182

Entropy(parent) = - (0.1818 * log2(0.1818) + 0.8182 * log2(0.8182))

               ≈ 0.684

Next, let's calculate the entropies of the three children collections obtained by splitting the parent collection.

Child 1: 10 positive items and 20 negative items

Child 2: 2 positive items and 12 negative items

Child 3: 0 positive items and 22 negative items

Entropy(child1) = - (p_pos * log2(p_pos) + p_neg * log2(p_neg))

               = - ((10 / 30) * log2(10 / 30) + (20 / 30) * log2(20 / 30))

               ≈ 0.918

Entropy(child2) = - ((2 / 14) * log2(2 / 14) + (12 / 14) * log2(12 / 14))

               ≈ 0.811

Entropy(child3) = 0  (since there are no positive items)

Now, we calculate the weighted sum of entropies using the proportions of items in each child collection.

Weighted Sum of Entropies(children) = (30 / 66) * Entropy(child1) + (14 / 66) * Entropy(child2) + (22 / 66) * Entropy(child3)

Weighted Sum of Entropies(children) ≈ (0.4545 * 0.918) + (0.2121 * 0.811) + (0.3333 * 0)

                                     ≈ 0.418

Finally, we can calculate the information gain:

Information Gain = Entropy(parent) - Weighted Sum of Entropies(children)

               ≈ 0.684 - 0.418

               ≈ 0.266

Therefore, the information gain of the attribute that divides the collection into three collections is approximately 0.266.

To know more about Entropy related question visit:

https://brainly.com/question/20166134

#SPJ11


Related Questions

use the data obtained in track 2 to determine the number of pixels per meter. write down your result and show how you calculated it.

Answers

The number of pixels per meter in track 2 is determined by dividing the total number of pixels by the length of the track in meters.

What is the formula to calculate the number of pixels per meter in track 2?

To calculate the total number of pixels, count all the pixels present in the image obtained from track 2. Next, measure the physical distance covered by the track in meters using a suitable measuring tool. Finally, divide the total number of pixels by the measured distance to obtain the number of pixels per meter. This value represents the density of pixels in the image per unit length.

Obtain the total number of pixels in track 2.

Measure the length of the track in meters.

Divide the total number of pixels by the length of the track in meters.

The result will give you the number of pixels per meter in track 2.

Learn more about pixels per meter

brainly.com/question/33545193

#SPJ11

In a relocatable dynamic partition scheme, the ____ contains a value that must be added to each address referenced in a program so that the system will be able to access the correct memory addresses after relocation. a. compaction register b. bounds register c. load register d. relocation register

Answers

In a relocatable dynamic partition scheme, the  bounds register contains a value that must be added to each address referenced in a program.

What is bounds registers?

This is known to be two registers that has its contents that are known are used to tell an area of memory where one can have access control.

Therefore, In a relocatable dynamic partition scheme, the  bounds register contains a value that must be added to each address referenced in a program.

Learn more about bounds register from

https://brainly.com/question/15041633

#SPJ1

CORRECT ANSWER GETS BRAINLIEST!
Explain why it is important for an engineer to have knowledge of different materials .

Answers

Answer:

An engineer must have knowledge of different materials because an engineer will be working with a variety of materials and must know how to utilize or interact with them properly.

Which of the following is a country that cruise ships commonly sail under the flag of?
O United States
O Canada
O Panama
O South Africa
< Previous

Answers

Answer:

Panama

hope this helps!

Convert the following decimal numbers to 6-bit 2's complement binary and add their 2's complements.
a. 18_10
b. 14_10

Answers

The 6-bit 2's complement binary representation is 001001. The 6-bit 2's complement binary representation is 001110. The result of adding the 2's complements is 010111.

To convert decimal numbers to 6-bit 2's complement binary representation, follow these steps:

1. Determine the sign of the number (positive or negative).

2. Convert the absolute value of the number to binary representation.

3. If the number is negative, take the 2's complement of the binary representation.

4. Pad the binary representation with leading zeros to reach the desired bit length.

a. 18_10:

- The number is positive.

- Convert 18 to binary: 10010.

- Pad with leading zeros: 001001.

- The 6-bit 2's complement binary representation is 001001.

b. 14_10:

- The number is positive.

- Convert 14 to binary: 1110.

- Pad with leading zeros: 001110.

- The 6-bit 2's complement binary representation is 001110.

To add the 2's complements of these numbers, perform binary addition:

  001001 (2's complement of 18)

+ 001110 (2's complement of 14)

---------

 010111

The result of adding the 2's complements is 010111.

Visit here to learn more about binary representation brainly.com/question/30591846

#SPJ11

On a security forum, you learned that a competitor suffered a data breach when an industrial spy bypassed cloud security policies by downloading sensitive data from a company docs account and sharing it on a personal docs account. What security controls could prevent it from happening to you? choose the best response

Answers

What subject is this

To prevent data breaches, implement user access controls, data loss prevention measures, cloud security policies, encryption, and data protection, as well as provide employee training and awareness programs.

What security controls could prevent it from happening to you?

To prevent a similar data breach, the best response would be to implement the following security controls:

1. User Access Controls: Ensure strict user access controls are in place to limit access to sensitive data only to authorized personnel. Implement multi-factor authentication, strong password policies, and regular access reviews to prevent unauthorized access.

2. Data Loss Prevention (DLP): Deploy a DLP solution that can monitor and prevent sensitive data from being downloaded or shared outside authorized systems. This can help detect and block the transfer of sensitive information to personal accounts or unauthorized locations.

3. Cloud Security Policies: Establish comprehensive cloud security policies that outline acceptable usage, data handling practices, and restrictions on sharing sensitive information. Regularly review and enforce these policies to mitigate risks.

4. Encryption and Data Protection: Encrypt sensitive data at rest and in transit to ensure its confidentiality. Implement encryption mechanisms that safeguard data stored within cloud services and secure data transfers between systems.

5. Employee Training and Awareness: Provide regular security training to employees, emphasizing the importance of data protection, recognizing phishing attempts, and adhering to security policies. Foster a security-conscious culture within the organization.

By implementing these security controls, you can enhance the protection of sensitive data, mitigate the risk of data breaches, and reduce the likelihood of unauthorized access or sharing of information.

Learn more on data breach here;

https://brainly.com/question/518894

#SPJ2

which method can be used to rearrange the order of slides in your presentation?

Answers

Answer:

The method to rearrange the order of slides in a presentation depends on the specific presentation software you are using. Here are the steps for some popular presentation software:

PowerPoint:

Open the presentation.

Click on the "Slides" tab on the left-hand side of the screen.

Click and drag the slide you want to move to its new position.

Slides:

Open the presentation.

Click on the "Slides" tab on the left-hand side of the screen.

Click and drag the slide you want to move to its new position.

Keynote:

Open the presentation.

Click on the "Slides" tab on the right-hand side of the screen.

Click and drag the slide you want to move to its new position.

Once you have rearranged the slides in your presentation, be sure to review it to ensure that it flows logically and makes sense to your audience.

Explanation:

Read this New York Times article about email usage at Cerner The New York Times, A Stinging Office Memo Boomerangs, Cerner Article.docxDownload The New York Times, A Stinging Office Memo Boomerangs, Cerner Article.docx. Using the concepts discussed in the email and digital communication lessons, answer the following discussion prompts (in about one paragraph each):

Explain what made email the wrong message medium for Patterson in this case. Which message mediums could have been a better fit for his situation? Explain why. (Draw from the decision matrix in the video lesson for your answer).

If Patterson did decide to use email in this situation -- even though another message medium would have likely been better -- which email formality level should he have used? Explain why. (Draw from the email formality schematic in the video lesson for your answer).

Answers

Email was the wrong message medium for Patterson in this case because the content of his message was sensitive and emotionally charged. The email was critical of his colleagues and management, and it contained personal frustrations.

Email is a relatively impersonal and asynchronous communication channel, which makes it unsuitable for handling delicate matters that require immediate attention and understanding.

In this situation, a better fit for Patterson would have been a face-to-face conversation or a virtual meeting. These mediums allow for real-time communication, providing an opportunity for immediate clarification, empathy, and understanding. Additionally, face-to-face interactions can help establish a more personal connection, fostering better relationships and reducing the likelihood of misinterpretation or defensiveness.

If Patterson had still decided to use email, he should have opted for a more formal and diplomatic tone. The email formality schematic suggests that in professional settings, a more formal approach is appropriate, especially when discussing sensitive issues or expressing criticism. A neutral and polite tone would have helped to maintain professionalism and prevent any unintended negative consequences that arose from the use of informal language and strong emotions in the original email

To know more about Email ,visit:

https://brainly.com/question/28087672
#SPJ11

Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations?

1. Graphical user interface (GUI)
2. Service management
3. Application management
4. Command line interface (CLI)

Answers

Answer:

4. Command line interface (CLI)

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

A Command line interface (CLI) refers to a text-based user interface that allow users to operate a software application or program, as well as manage and execute operating system functions by typing standard line of commands into the text-based user interface with a real-time response.

Basically, the CLI is solely text-based and as such requires a thorough knowledge and understanding of global commands, as well as administrative privileges in some cases.

Hence, the operating system function which has a steeper learning curve (more difficult to learn) and can potentially break the system without careful use of its operations is the Command line interface (CLI).

why is technology bad for you

Answers

Answer: Constant device use might strain your eyes. It can cause a headache, focus issues, itching, blurred or double vision, and light sensitivity. This is one of the main arguments against technology that we may make.

Explanation:

(03.02 LC)
How is customer service defined? (6 points)

A.
Aid provided to the elderly by neighbors

B.
Assistance provided by a company to people who buy or use its products or services

C.
Help given to students by classmates

D.
Support given to employees by managers and supervisors

Answers

Answer:

B.

Assistance provided by a company to people who buy or use its products or services

B.

Assistance provided by a company to people who buy or use its products or services

Packet Transmission Delay. Consider the network shown in the below, with two senders on the left sending packets to a common receiver on the right. The links have transmission rates of R₁ R₂ = 100 Mbps (i.e.. 100 x 106 bits per second). Suppose each packet is 1 Mbit (105 bits) in size. How long does it take a sender to transmit a packet into its link (i.e., the packet transmission delay at the sender)? O 1 sec O.1 sec 01 sec O 106 msec 100 sec

Answers

The packet transmission delay at the sender is 0.01 seconds or 10 milliseconds. The packet transmission delay at the sender can be calculated by dividing the size of the packet by the transmission rate of the link.  

To calculate the packet transmission delay at the sender, we divide the packet size by the transmission rate of the link.

Packet Transmission Delay = Packet Size / Transmission Rate

In this case, the packet size is 1 Mbit (105 bits) and the transmission rate is 100 Mbps (100 x 106 bits per second).

Packet Transmission Delay = 105 bits / (100 x 106 bits per second)

= 1 / (100 x 10^-2) seconds

= 1 / 100 seconds

= 0.01 seconds

Learn more about packet transmission delay here:

https://brainly.com/question/14718932

#SPJ11

true and false 1. Trace topology is also referred to as tree bus topology. ​

Answers

Answer:

Trace topology is also referred to as tree bus topology.

Explanation:

Write a program that uses an initializer list to store the following set of numbers in a list named nums. Then, print the first and last element of the list.

56 25 -28 -5 11 -6

Sample Run
56
-6

Answers

List and Print Elements.

Here's a possible implementation of the program in Python:

python

Copy code

nums = [56, 25, -28, -5, 11, -6]

print("First element:", nums[0])

print("Last element:", nums[-1])

The output of the program would be:

sql

Copy code

First element: 56

Last element: -6

In this program, we first define a list named nums using an initializer list with the given set of numbers. Then, we use indexing to access the first and last elements of the list and print them to the console. Note that in Python, negative indices can be used to access elements from the end of the list, so nums[-1] refers to the last element of the list.

ChatGPT

Draw a flow chart showing the conversion of temperature from farenheit to degree celsius

Answers

I hope this answers help you

Draw a flow chart showing the conversion of temperature from farenheit to degree celsius

PLEASE HELP, THIS IS FROM FLVS AND THE SUBJECT IS SOCAL MEADA. YES THAT IS A CORSE.
Josh frequently posts in an online forum to talk about his favorite video game with other players. For the past few weeks, a poster he doesn't know has been harassing Josh in the forums, calling him names and publicly posting hateful messages toward Josh with the intent of starting an argument.

In this situation Josh should consider changing his forum screen name to avoid this cyberbully.

1. True
2. False

Answers

The answer is true (please mark me brainleiest)

It is used between two or more computers. One computer sends data to or receives data from another computer directly.

Answers

Answer:

File transfer protocol (FTP)

Explanation:

An information can be defined as an organized data which typically sent from a sender to a receiver. When a data is decoded or processed by its recipient it is known as information.

Generally, there are several channels or medium through which an information can be transmitted from the sender to a receiver and vice-versa. One of the widely used media is the internet, a global system of interconnected computer networks.

There's a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport later, into small chunks called packets rather than as a whole.

The three (3) main types of TCP/IP protocol are;

I. HTTP.

II. HTTPS.

III. FTP.

File transfer protocol (FTP) is used between two or more computers. One computer sends data to or receives data from another computer directly through the use of network port 20 and 21.

The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly

Answers

Answer:

full/incremental backup

Explanation:

I believe it's full/incremental backup.

Express 42 as a product  of its prime factor​

Answers

The only way to write 42 as the product
of primes.

Except to change the order of the factors is
2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.
The only way to write 42 as the product of primes (except to change the order of the factors) is 2 × 3 × 7. We call 2 × 3 × 7 the prime factorization of 42.

why was the tesla model s help change the was we see EV

Answers

Answer:

It showed people that electric cars are advancing, and soon will be the norm.

Lots of people thought that EV cars would never be able to last as long as gas powered cars. However, with technology importing, Tesla cars are getting closer and closer to being able to provide the same amount of millage as the gas powered cars.

what if you accidentally delete your browser history

Answers

Answer:

Nothing is ever deleted on a computer. Even though delete functions exist the data still remains somewhere in the computer, whether on the hard drive or in obscure files tucked away deep in the operating system. Recovering deleted internet history is quite straightforward if you know what you're doing.

using c/c , apply dfs based approach to solve the topological sorting problem , and apply source-removal approach to solve the topological sorting problem

Answers

To solve the topological sorting problem using a DFS-based approach in C/C++, we can start by representing the directed acyclic graph (DAG) using an adjacency list. Then, we can perform a DFS traversal of the graph starting from any vertex, and use a stack to store the vertices in the order they are visited. Once the DFS traversal is complete, the vertices in the stack can be popped one by one to obtain a valid topological ordering of the graph.

Here's some sample code that implements this approach:

```
#include
using namespace std;

void dfs(vector adj[], int v, bool visited[], stack &s)

{
   visited[v] = true;
   for(int i=0; i adj[], int n)

   {
   bool visited[n];
   memset(visited, false, sizeof(visited));
   stack s;
   for(int i=0; i> n >> m;
   vector adj[n];
   for(int i=0; i> u >> v;
       adj[u].push_back(v);
   }
   topologicalSortDFS(adj, n);
   return 0;
}
```

To solve the topological sorting problem using a source-removal approach in C/C++, we can start by representing the DAG using an adjacency matrix. Then, we can repeatedly remove vertices with no incoming edges (i.e., vertices with all their incoming edges already removed) and add them to the topological ordering of the graph. This process is repeated until all vertices have been removed, or until it is determined that the graph contains cycles.

Here's some sample code that implements this approach:

```
#include
using namespace std;

void topologicalSort(vector> adj, int n) {
   vector inDegree(n, 0);
   for(int i=0; i q;
   for(int i=0; i order;
   while(!q.empty()) {
       int u = q.front();
       q.pop();
       order.push_back(u);
       for(int v=0; v> n >> m;
   vector> adj(n, vector(n, 0));
   for(int i=0; i> u >> v;
       adj[u][v] = 1;
   }
   topologicalSort(adj, n);
   return 0;
}
```

To learn more about sorting problems visit : https://brainly.com/question/14698104

#SPJ11

Which of the following is a common customer service CRM metric?

Answers

A common customer service CRM metric is number of new customers.

CRM metrics can be defined as a marquee data points for you to  follow and identify  while keeping your business goals in mind. Based on your overall goals and business’s situation , you may have several key metrics you’ve identified and want to highlight to help explain your business’s overall goals and motivate your team

Accurately using CRM software could result in more engagement with customers and higher sales  . Identifying key metrics could allow you to draw in more customers,  create further success for your business and enhance sales . It could provide context on sales as they are completed.

Here you can learn more about software in the link brainly.com/question/26649673

#SPJ4

Developers in your company need to interact with AWS from the Command Line Interface. Which security item will you need to provide to the developers

Answers

Developers in your company will need to provide an access key ID and a secret access key to interact with AWS from the Command Line Interface. These keys are used to authenticate the user and authorize access to the necessary AWS resources.

The access key ID is a unique identifier that is used to identify the user or application making the request, while the secret access key is a secret code used to sign requests and verify the authenticity of the user or application.

It is important to keep the access key ID and secret access key secure, as they provide access to your AWS resources. Best practices include restricting access to the keys to only those who need them, rotating the keys periodically, and revoking access to the keys when they are no longer needed.

Learn more about AWS here:

https://brainly.com/question/30176139

#SPJ11

7. What is a slide transition?

Answers

Answer:

Is this multiple choice? If not, its a visual effect from one slide to another.

Explanation:

Answer:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects

Explanation:

hope this helps:)

there is repeated code in these onevent blocks. choose the correct code for the updatescreen() function which would be called in each of the onevent blocks.

Answers

The correct code for the updateScreen() function would be as follows:
function updateScreen() {
 document.getElementById("result").innerHTML = result;
 document.getElementById("history").innerHTML = history;
}

What is function?

A function is a self-contained block of code which performs a specific task. It takes input data, processes it, and returns a result. Functions are essential in programming as they allow for efficient and effective reuse of code. They are often used to perform repetitive tasks or to break up complex operations into simpler segments. Functions also allow for greater modularity in a program, making it easier to debug and maintain.

The updateScreen() function is used to update the HTML elements with the result of the operation and the history of operations. The function gets the elements by their ID, and sets the innerHTML of the elements to the result and history variables. This code can be reused in each of the onevent blocks so that the HTML elements are updated with the latest results.

To learn more about function
https://brainly.com/question/23897143
#SPJ1

Describe a situation that an SDV might encounter that you’d be interested in solving.

Answers

A SDV might encounter a situation where a grocery store is trying to optimize their inventory management system. The store needs to balance the cost of buying products in bulk against the cost of more frequent restocking, as well as accounting for seasonal variations in customer demand.

What is SDV?
SDV (Software Development and Validation) is a process of developing, testing and validating software products and services to ensure they are fit for purpose and meet customer requirements. It is an essential part of the software development life cycle and involves the coordination of multiple teams, including software engineers, testers, and product managers. Throughout the SDV process, the software is evaluated based on its functionality, performance, and usability, and any issues are identified and fixed.

To know more about SDV
https://brainly.com/question/475676
#SPJ1

A ـــــــــــــــــــــــــ is a changeable value recorded in Scratch's memory. Variables can only hold one value at a time, unlike lists. *

Answers

Answer:

Variable.

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters

Hence, a variable is a changeable value recorded in Scratch's memory. Variables can only hold one value at a time, unlike lists.

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

A ____ is an icon that does not directly represent a file, folder or application but serves as a link to it?​

Answers

Answer:

Shortcut

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name, icon, size, and type (format) such as audio, image, video, document, system, text, etc.

Furthermore, files are organized or arranged in directories. These directories are paths that describes the location wherein a file is stored on a computer system.

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem. Thus, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

In Computer science, it's possible to create a shortcut in several directories (locations) on a computer, so as to reference a file, folder or software application and serve as an executable link.

Hence, a shortcut is an icon that does not directly represent a file, folder or application but serves as a link to it.

Additionally, deleting the shortcut of a data file, folder or software application would not permanently delete or uninstall the main data file respectively.

what do you expect to see from ceiling light, using a spectroscope?

Answers

A spectroscope is an instrument used to measure the properties of light, including its wavelength and intensity.

A spectroscope is an instrument used to measure the properties of light, including its wavelength and intensity. When used to observe the light emitted by a ceiling light, a spectroscope would reveal a range of colors or wavelengths, depending on the type of light bulb used.
For example, if the ceiling light used an incandescent bulb, the spectroscope would reveal a continuous spectrum of colors, ranging from red to violet. This is because incandescent bulbs emit light by heating a filament until it glows, creating a range of colors that blend together.
On the other hand, if the ceiling light used a fluorescent bulb, the spectroscope would reveal discrete lines of color, rather than a continuous spectrum. This is because fluorescent bulbs work by exciting gas molecules to emit light at specific wavelengths, creating distinct lines of color.
In general, a spectroscope can reveal a lot about the properties of light emitted by a ceiling light, including its color, brightness, and intensity. This information can be useful for understanding the characteristics of different types of lighting, as well as for diagnosing problems with light bulbs or fixtures.

To know more about spectroscope visit: https://brainly.com/question/31240398

#SPJ11

Other Questions
if the charge is directly in the center of the cube, what is the flux through each face of the cube? Which of the following would be an indication that an organization's structure is inappropriate? Employees are dissatisfied with the organization O The organization is inefficient O The organization is constantly surprised by changes in its industry The organization grows too quickly Tonys deposit earned $40.80 in simple interest over 3 years in an account with an interest rate of 1.7%. How much did Tony deposit?Write your equation AND solve. Vedica (V) has the following utility function of wealth: = y 4/3 Vedica is a potential international immigrant to the United States. She works out that she faces the following lottery if she tries to travel to the US to work or to become a student. She starts with wealth of $20 000. She is told that if she goes to the US, she could end up gaining additional wealth of $100 000 with probability (p) and that she could lose all of her $20 000 with probability (1 p). Vedica believes that she will be successful with a probability of 10%. Read the following statement. Do you think the statement is true or false? Explain your answer mathematically and intuitively. As a member of the government of the state from which Vedica originates, you evaluate Vedicas case and work out that Vedica is risk-loving and you would need to compensate Vedica the equivalent of approximately $1340 for her to remain in your country and not emigrate If 0. 36 g of nacl is dissolved in water and the resulting solution weighs 12. 80 g, what is the mass % of nacl in the solution? make certain your answer has the correct number of significant figures. if there are 36 possiable outcomes from rolling two number cubes how many times should I expect the sum of two cubes be equal to 6 if I roll the two number cubes 216 times Sandwiches at a sandwich shop move through the following processOrder = 30 seconds per sandwichRetrieve and cut sandwich roll = 15 seconds per sandwichAdd ingredients = 20 seconds per sandwichToast sandwich = 20 seconds per sandwichWrap and complete the order = 40 seconds per sandwichTotal throughput time is 125 secondsIf two employees split the wrap up and order completion steps, where is the bottleneck? Write a real world problem that can be represented by the inequality y-4 i need help please im kind of lost on this problem please help soon If a linear regression equation predicts more than 25% of the variance in the Y scores, then the correlation between X and Y must be greater than r = ________.b. 0.50c. 0.35d. 0.40 Mr. Romero is 64, retiring soon, and considering enrollment in his employer-sponsored retiree group health plan that includes drug coverage with nominal copays. He heard about a neighbors MA-PD plan that you represent and because he takes numerous prescription drugs, he is considering signing up for it. What should you What did supporters believe a national bank would do for the United States? Pls helllp!!!Find the hourly wage: $80 for 9 hours.O $8.89O $17.78O $71O $10.12 To 'project' something means tocalculate what you think will___ in the future. Investigate a SERVICE INDUSTRY COMPANY in and around Saudi Arabia. - Analyze and explain the importance of service quality in service industry? Why it is necessary for service industry? For the company Provide Justification - What is its key element of Quality Management and its roles in the success of that organization? hi can anyone tell me answer for b What attributes can be used to identify a celebrity?Create a list In a lake, the population of a particular fish species is about 1 million. Fish reproduce by 20% of the population each month, regardless of the season. In addition, fish die naturally after living for an average of 10 months. There are two separate companies (for example, A and B) fishing with 5 boats on the edge of this lake. According to current data, each boat catches 5000 fish per month. However, if the total number of boats caught in the lake increases, the number of fish to be caught by each boat decreases, as the boats will prevent each other from fishing. In addition, if the fish population in the lake increases, the fish caught per boat increases, and if the population decreases, the fish caught per boat decreases. As companies earn money from hunting, they want to buy new boats over time and enlarge their boat fleet.1. If you want to model this described system with 'System Dynamics', which variables would you use? How would you classify these variables as stock, flow and dummy variables?2. Indicate the causal relationships in this system with arrows and signs.3. Show the causality loops in this system, at least 1 negative, at least 1 positive, and at least 4 in total, and interpret the loops.4. Draw the stock-flow model of this system. A problem contains the points (0,0),(1,-2) and (-1,-4). What is the equation of this parabola in standard form? How do you do in text citations if there are multiple authors?