Which expression creates a new query column that adds the values in the Purchase1 and Purchase2 columns, then multiplies the result by 1.05

Answers

Answer 1

By using the expression `(Purchase1 + Purchase2) * 1.05`, the values in the Purchase1 and Purchase2 columns are added together, and the result is multiplied by 1.05 to create the new query column.

How can a new query column be created to add the values in the Purchase1 and Purchase2 columns and multiply the result by 1.05?

The expression that creates a new query column, which adds the values in the Purchase1 and Purchase2 columns and then multiplies the result by 1.05, can be written as:

`(Purchase1 + Purchase2) * 1.05`

This expression performs the addition of the values in the Purchase1 and Purchase2 columns, and then the result is multiplied by 1.05. The addition operation `(Purchase1 + Purchase2)` calculates the sum of the values in the Purchase1 and Purchase2 columns, and the multiplication operation `* 1.05` multiplies the sum by 1.05, thereby increasing the value by 5%.

By using this expression in a query, a new column can be created that represents the calculated value obtained from adding the Purchase1 and Purchase2 columns and then applying a 5% increase. This can be useful in various scenarios, such as calculating total expenses or adjusting prices with a specific percentage increase.

Learn more about expression

brainly.com/question/28170201

#SPJ11


Related Questions

Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document?
standard text box
WordArt
callout
shape
picture

Answers

Answer:

C: Callout shape

Explanation:

The object that should he insert into the Word document is the callout function. The correct option is b.

What is Microsoft Word?

A component of Microsoft Office is Microsoft Word. The office is a collection of Microsoft products that can be used on Windows or macOS and contains Word, PowerPoint, Excel, Outlook, and numerous other tools for both private and professional usage. They aren't the same thing; Microsoft Word is merely one of such app.

A callout function is one of the functions that specifies a callout and is implemented by a callout driver.

The following collection of callout functions makes up a callout: a notification processing notifying function. A function called classifying handles classifications.

Therefore, the correct option is b. callout.

To learn more about Microsoft Word, refer to the below link:

https://brainly.com/question/2579888

#SPJ5

Write a program where you print this sequence.

1

3

5

7

9

Answers

init = 1

choice = int(input("How far into the sequence would you like to go to? "))

i = 0

while i < choice:

   print(init)

   init += 2

   i += 1

If you enter 5, you'll get 1,3,5,7,9. You can also go to whatever place in the sequence you want. I wrote my code in python 3.8. Hope this helps

Write a code segment that will store a dinner selection in option1 based on the values of rsvp and selection. The intended behavior of the code segment is described below. If rsvp is true, the code segment should store in option1 a string indicating the person’s attendance and food choice. For example, if rsvp is true and selection is 1, the following string should be stored in option1. "Thanks for attending. You will be served beef." If rsvp is false, the following string should be stored in option1, regardless of the value of selection. "Sorry you can't make it." Write the code segment below. Your code segment should meet all specifications and conform to the examples.

Answers

The code segment illustrates the use of conditional statements.

The execution of conditional statements is dependent on the truth value of its condition.

The required code segment is as follows:

if (rsvp == true && selection = 1){

      option1 = "Thanks for attending. You will be served beef.";

}

else{

option1 = "Sorry you can't make it.";

}

The flow of the above code segment is as follows:

Check if rsvp is true and selection is 1; if yes, "Thanks for attending....." is saved in option1If otherwise, "Sorry...." is saved in option1

The code segment submitted can be used for several programming languages such as Java, C++, C and C#.

Read more about similar programs at:

https://brainly.com/question/14166674

What value is displayed as a result of executing the code segment?

What value is displayed as a result of executing the code segment?

Answers

Answer:

A: 3

Explanation:

The MOD operator is used to calculate the remainder of dividing two numbers, so by the end of this operation, we are adding the MODs of each integer in this list, because this program ends once each integer in list has gone through the steps, and the result of calculating the MOD of each integer is then added back because of the third step. So it should look like this: (4 MOD 2) + (2 MOD 2)...(1 MOD 2) and the result of adding these values should then result in 3.

The value which is displayed as a result of executing the code segment is equal to: A. 3.

What is MOD?

MOD is an abbreviation for modulo operation and it can be defined as a mathematical technique that is used in computer science to determine the remainder of an arithmetic operation such as the division of two numbers.

Based on the code segment, the value which is displayed as a result of executing the modulo operation would be equal to 3 at the end of the iteration or operation.

Read more on computer codes here: brainly.com/question/25619349

On Ethereum ________________________________ accounts can be used to store program code.
a. utility
b. wallet
c. cryptographic
d. contract

Answers

On Ethereum, "contract" accounts can be used to store program code.

The Ethereum blockchain allows the deployment and execution of smart contracts, which are self-executing contracts with predefined rules and conditions written in programming languages like Solidity.

These smart contracts are deployed on the Ethereum network as "contract" accounts. Contract accounts have their own address and are capable of storing program code and executing predefined functions based on the rules and conditions specified within the smart contract.

To learn more about The Ethereum blockchain refer to;

brainly.com/question/24251696

#SPJ11

what should you do if you want word to apply a coordinated set of styles to ensure there is consistent formatting across the entire document?

Answers

Answer:

I'm pretty sure you can right click on a style and add it to a preset, if that's what you're asking.

Explanation:

your patient has a hormone-secreting tumor of the adrenal medulla. what hormone is most likely to be secreted by this tumor?

Answers

The adrenal gland has a tumor called a pheochromocytoma. As a result, the gland produces an excessive amount of the hormones norepinephrine and epinephrine. You often develop this tumor in your 30s, forties, or 50s. Even men and women are affected by it.

What is the hormonal peak for girls?

Between both the ages of eight and 13 is when female puberty often starts. Even if it might happen later, the procedure might go on until the child is 14 years old.

What is the hormonal peak for girls?

Between both the ages of eight and 13 is when female puberty often starts. Even if it might happen later, the procedure might go on until the child is 14 years old.

To know more about hormone visit:

https://brainly.com/question/13020697

#SPJ4

what is represented by the base roof of a phlogentic tree

Answers

Answer:

Ancestral linkage

Explanation:

A phylogenetic tree or a phylogeny, in other words, is a diagram that outlines the history of evolutionary descent of different species, organisms, or genes from a single lineage or shared ancestor.

A phylogenetic tree is typically drawn from the bottom upwards or from the left to the right.

Phylogenetic trees can either be rooted or unrooted. To be rooted means that there is a single ancestral linkage or lineage. Unrooted phylogenetic refers to multiple ancestral linkages.

Cheers

Instead of using the automatic toString() method with your classes, it is usually more useful to write your own ____ version of the toString()method that displays some or all of the data field values for the object with which you use it.
a. overloaded
b. static
c. protected
d. condensed

Answers

Answer:

The answer is "Option a"

Explanation:

The overloading is the most essential aspect in the java programming This function can achieve different features with the same method term. To obtain the required information fields or entity type, the toString() function is overloaded, and the wrong choice can be defined as follows:

In option b, It is wrong because it is a keyword.In option c, It is wrong because it is an access modifier.In option d, It is wrong because it is a type of programming.

Class Example {
public static void main(String[] args) {
// This is the code editor
System. Out. Println(". And this is the terminal");
}
}

Answers

The provided code snippet is a basic   Java class named "Example" with a main method.

How does it work?

Inside the main method,there is a comment indicating that it is the code editor.

The code then prints out a message "And this is the terminal" using the System.out.println() statement. This statement will display the message in the terminal when the code is executed.

A code snippet is a small portion   or fragment of source code that represents a specific functionality or task. It is typically used to demonstrate or illustrate a particular programming concept, technique, or solution.

Learn more about code snippet at:

https://brainly.com/question/30467825

#SPJ1

What is an example of a situation in which you might use the append method? In what ways is the append method limited?


What is the difference between a method and a function? In what ways are they similar? Why do you think Python makes a distinction between methods and functions?

Answers

Answer:

An example of a situation in which I might use the append method is explained below in details.

Explanation:

Append Method

The append() arrangement in python combines a separate item to the present list. It doesn't recover a new record of items but will transform the primary list by combining the item to the conclusion of the record. After completing the process append on the list the size of the list advances by one.

A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability.

Question 1

In your opinion, which domain is the most difficult to monitor for malicious activity? Why? and which domain is the most difficult to protect? Why?

Answers

The most difficult domain to monitor for malicious activity in an IT infrastructure is the Remote Access Domain, while the most difficult domain to protect is the System/Application Domain.

The Remote Access Domain is challenging to monitor due to the nature of remote connections. It involves users accessing the network and systems from outside the organization's physical boundaries, often through virtual private networks (VPNs) or other remote access methods.

The distributed nature of remote access makes it harder to track and detect potential malicious activity, as it may originate from various locations and devices. Monitoring user behavior, network traffic, and authentication attempts becomes complex in this domain.

On the other hand, the System/Application Domain is the most challenging to protect. It encompasses the critical systems, applications, and data within the infrastructure. Protecting this domain involves securing sensitive information, implementing access controls, and ensuring the availability and integrity of systems and applications.

The complexity lies in the constant evolution of threats targeting vulnerabilities in applications and the need to balance security measures with usability and functionality.

To learn more about Remote Access Domain, visit:

https://brainly.com/question/14526040

#SPJ11

A security specialist discovers a malicious script on a computer. The script is set to execute if the administrator's account becomes disabled. What type of malware did the specialist discover

Answers

The security specialist has discovers a malicious script on a computer known as a logic bomb.

Is logic bomb a type of malware?

A logic bomb is known to be a form of a malicious program that is set up or ignited if a logical condition is met, such as after a series of transactions have been done, or on a given date.

Therefore, The security specialist has discovers a malicious script on a computer known as a logic bomb.

Learn more about malware from

https://brainly.com/question/399317

#SPJ1

Answer:

Logic Bomb

Explanation:

Do you believe hackers are a necessary part of ensuring Internet safety and should they be rewarded for their efforts?

Answers

Answer:

The phrase 'Break the Law' means to fail to obey a law; to act contrary to a law. Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. Which in all words saying should not be given a reward for breaking into something unless given the consent of the owners the owners may hire or ask them to help find a fault in there system but in other terms this should not happen.

Once a packet arrives at a gateway router (identified by the Network ID), that gateway router must forward it to the correct system by looking at the ___ ID.

Answers

Once a packet arrives at a gateway router (identified by the Network ID), that gateway router must forward it to the correct system by looking at the Destination ID.

Every device on the network has a unique IP address that identifies it.

The Destination ID is part of the header of the packet, and it tells the router where the packet is supposed to go.

When the router receives the packet, it reads the Destination ID and compares it to its routing table to determine which system to forward it to.

This is how routers direct traffic through the internet, by reading the Destination ID of each packet and forwarding it to the appropriate destination.

Learn more about network ID at

https://brainly.com/question/15991921

#SPJ11j

____________ type of attack attempts to slow down or stop a computer system or network by flooding it with requests for information and data.

Answers

The type of attack that attempts to slow down or stop a computer system or network by flooding it with requests for information and data is called a DDoS (Distributed Denial of Service) attack. In a DDoS attack, multiple computers, often compromised by malware or botnets, are used to flood a targeted system or network with a huge amount of traffic.

This overwhelms the system's resources and makes it unable to respond to legitimate requests, effectively taking it offline.
DDoS attacks have become increasingly common in recent years, with hackers using them to target businesses, governments, and even individuals. The motivations behind these attacks can vary, from financial gain to political activism or simple mischief.
To defend against DDoS attacks, organizations can implement a range of measures, such as investing in specialized DDoS protection services, deploying firewalls and intrusion prevention systems, and keeping software and systems up-to-date with the latest security patches. It's also important to have an incident response plan in place, so that if an attack does occur, the organization can quickly and effectively respond to minimize the damage.

For such more question on legitimate

https://brainly.com/question/12275136

#SPJ11

freddy wants to take up a few platform-specific courses for his new job. which courses can he take? to be able to perform for programming languages specific to a certain platform, freddy can take courses such as and .

Answers

In order to be able to perform for programming languages specific to a certain platform, Freddy can take courses such as HTML5 and CSS3.

What is CSS 3 ?

CSS 3 is an abbreviation for Cascading Style Sheets revision 3 and it can be defined as a style sheet programming language that is designed and developed for describing and enhancing the presentation of a webpage (document) that is written in a markup language such as:

XMLHTML

What is HTML 5?

HTML 5 is an abbreviation for hypertext markup language revision 5 and it can be defined as a standard programming language which is used for designing, structuring, developing and presenting websites or webpages.

In order to be able to perform several tasks by using programming languages specific to a certain platform, Freddy can take courses such as HTML5 and CSS3.

Read more on HTML 5 here: https://brainly.com/question/28145966

#SPJ1

Complete Question:

Select the correct answer from each drop-down menu. Freddy wants to take up a few platform-specific courses for his new job. Which courses can he take?

To be able to perform for programming languages specific to a certain platform, Freddy can take courses such as and .

first dropdown

a. HTML5

b. Visual C#

c. JavaScript

second dropdown

a. Jquery

b. CSS3

c. .NET

Shonda just wrote an If statement, but it does not work. Which of the following changes should she make to fix her code?

A. Add a period to the end of the first line of her if statement.

B. Add a colon to the end of the first line of her if statement.

C. Make sure the word “if” is capitalized.

D. Add parenthesis around the condition of the if statement.

Answers

Answer:

B  Add a colon to the end of the first line of her statement

Explanation:

its needs a colon at teh end

6. when a program is finished using a file, it should do this. a. erase the file b. close the file c. throw an exception d. reset the read position 17. this class allows you to use the print and println methods to write data to a file. a. file b. filereader c. outputfile d. printwriter 18. this class allows you to read a line from a file. a. filewriter b. scanner c. inputfile d. filereader 19. true or false: the while loop is a pretest loop. 20. true or false: the do-while loop is a pretest loop. 21. true or false: the for loop is a posttest loop. 22. true or false: it is not necessary to initialize accumulator variables. 23. true or false: one limitation of the for loop is that only one variable may be initialized in the initialization expression. 24. true or false: a variable may be defined in the initialization expression of the for loop. 25. true or false: in a nested loop, the inner loop goes through all of its iterations for every iteration of the outer loop. 26. true or false: to calculate the total number of iterations of a nested loop, add the number of iterations of all the loops.

Answers

Answer:

16. close the file

17. Output file

18. scanner

19. true

20. false

21. false

22. false

23. false

24. true

25. true

26. false

Explanation:

Hope it helps!

advanced persistent threat may test their ttps to ensure they bypass your passive defenses before they deploy them actively against you

Answers

Advanced persistent threats (APTs) often test their tactics, techniques, and procedures (TTPs) to ensure they can bypass passive defenses before actively deploying them against a target.

Advanced persistent threats are sophisticated and persistent cyberattacks carried out by skilled adversaries. These attackers employ a variety of tactics, techniques, and procedures to compromise their targets and achieve their objectives. Before launching a full-scale attack, APTs often conduct reconnaissance and testing to evaluate the effectiveness of their TTPs against the target's passive defenses.

Passive defenses refer to the security measures and controls in place to protect a network or system without actively engaging with the attackers. These defenses can include firewalls, intrusion detection systems, antivirus software, and other security solutions. By testing their TTPs against passive defenses, APTs can gauge whether their attack methods can evade detection, bypass filters, or exploit vulnerabilities in the target's infrastructure.

This proactive approach allows APTs to refine their attack strategies and develop customized tools or malware that can effectively penetrate the target's defenses. By testing their TTPs in advance, APTs can increase their chances of success when they launch their attacks actively. Therefore, organizations must not solely rely on passive defenses but also employ active monitoring, threat intelligence, and proactive security measures to detect and mitigate potential APT attacks.

Learn more about Advanced persistent threats here:

https://brainly.com/question/32136025

#SPJ11

How do science, mathematics, and technology each influence engineering

Answers

Answer:

In order to start engineering you must know the basics Science, Math, and Technology. For example you need math to get all the parts in the right place and fix any pieces that need to be angled right, science because you need to know what happens if you put this with that if it’ll spark break or anything, and technology because you need to know the different pieces and their purpose, hope it helps!

Explanation:

Answer:

Math: By using numbers and some problems are really hard and they like solving them makes some kids want to do engineering

Science: By do expirments and getting kids excited about doing something like engineering

Technolgy: I think this speaks for itself by saying that if you like computers and dealing with technogly you would want to do engineering

Explanation:

in the techinsider video case, hackers we able to defeat the two-factor authentication used to protect the account of deray mckesson by doing what?

Answers

But even current security precautions like sending push alerts to a mobile device or scanning a QR code on the screen would be bypassed by this strategy.

In what ways is two-factor authentication vulnerable?

People unintentionally introduce security weaknesses. When users mistakenly install malicious software on computers, tablets, and mobile devices, they leave themselves susceptible to attackers copying and forwarding 2FA one-time passcodes. In the Emmental attacks, for instance, attackers scraped passcodes to bypass 2FA and gain access to multiple bank accounts.

Is it possible to hack two factor authentication?

Malware that actively harvests codes is another tool cybercriminals might use to get around MFA security. As an illustration, hackers might gain access to a person's account by observing the user log in using a trojan virus.

To know more about malware visit:-

https://brainly.com/question/14276107

#SPJ4

A biologist determines that the approximate number, Number, of bacteria

present in a culture after a certain number of days, Time, is given by the following formula:

Number = BacteriaPresent * 2ˆ(Time/10)

where BacteriaPresent is the number present at the beginning of the

observation period. Let the user input BacteriaPresent, the number of bacteria present at the beginning. Then compute the number of bacteria in the

culture after each day for the first 10 days. Do this in a loop so that the user

can see the results in a table. The output table should have headings for Day

and Number of Bacteria Present (on that day).

Answers

Python code takes user input for the initial number of bacteria and calculates the number of bacteria for each of the first 10 days using a loop and the given formula, and then outputs the results in a table format.

Here's some Python code that will allow the user to input the initial number of bacteria, and then output the number of bacteria for each of the first 10 days:

```
bacteria_present = int(input("Enter the number of bacteria present at the beginning: "))

print("Day\tNumber of Bacteria Present")
print("---------------------------------")

for day in range(1, 11):
   number = bacteria_present * 2 ** (day/10)
   print(day, "\t", round(number, 2))
```

The `int(input())` function allows the user to input the initial number of bacteria as an integer. Then, the code enters a `for` loop that goes through the first 10 days, calculates the number of bacteria using the given formula, and prints out the results in a table format with headings for the day and number of bacteria present.

Note that the `round()` function is used to round the number of bacteria to 2 decimal places, since the result from the formula may not be a whole number.

Know more about the click here:

https://brainly.com/question/31055701

#SPJ11

Determine if the given software is system software or application software.

Answers

Answer:

system software: system software maintain the system resource and give the path for application software to run

application software: application software is built for specific task

Explanation:

if you think the answer in your opinion correct then mark me as brain list

Answer:

I believe this to be the answer to the question you refer.

Explanation:

System software:

-data recovery

-macOS

Application software:

-presentation

-spreadsheet

Answers are cut short for convenience so do not worry if they are not the exact same answers from your question.

Also, if these answers do not even apply to your question then you have a different question. Good luck.

If you want to delete all the temporary files created by the operating system use______ ________.

Answers

If you want to delete all the temporary files created by the operating system, use the "Disk Cleanup" utility.

The "Disk Cleanup" utility is a built-in tool in the Windows operating system that allows users to delete unnecessary files from their computer. It specifically targets temporary files, such as those created during software installations, system updates, and internet browsing. To access the utility, you can search for "Disk Cleanup" in the Start menu, and then select the appropriate result. Once opened, you can choose the disk drive you want to clean up and select the temporary files option. The utility will calculate the amount of space that can be freed up and give you the option to delete those files, helping to optimize your system's performance and free up storage space.

Learn more about Disk Cleanup here:

https://brainly.com/question/28649440

#SPJ11

Write a function:
In C# language
class Solution { public int solution (string S); }
that, given a string S of length N, returns the minimum number of substrings into which the string has to be split.
Examples:
1. Given 'world', your function should return 1. There is no need to split the string into substrings as all letters occur just once.
2. Given 'dddd', your function should return 4. The result can be achieved by splitting the string into four substrings ('d', 'd', 'd', 'd').
3. Given 'cycle', your function should return 2. The result can be achieved by splitting the string into two substrings ('cy', 'cle') or ('c', 'ycle').
4. Given 'abba', your function should return 2. The result can be
achieved by splitting the string into two substrings ('ab', 'ba').
Write an efficient algorithm for the following assumptions:
. N is an integer within the range [1..1,000,000);
string S consists only of lowercase letters (a-z).

Answers

The function should return the minimum number of substrings needed to split string S.

How to find the minimum number of string S?

Here's an efficient C# solution for the given task:

class Solution {

   public int solution(string S) {

       int distinctChars = 0;

       int[] charCount = new int[26]; // Array to track the count of each character

       foreach (char c in S) {

           if (charCount[c - 'a'] == 0) {

               distinctChars++;

           }

           charCount[c - 'a']++;

       }

       return Math.Min(distinctChars, S.Length - distinctChars) + 1;

   }

}

This solution utilizes an array, charCount, to track the count of each character in the given string S. By iterating through S, it counts the number of distinct characters and stores their count in charCount.

The minimum number of substrings can be determined by taking the minimum between the distinct character count and the count of non-distinct characters (i.e., S.Length - distinctChars) and adding 1 to account for the entire string as a substring. This algorithm has a time complexity of O(N), where N is the length of the string, and satisfies the given assumptions.

Learn more about solution

brainly.com/question/27589578

#SPJ11

Si una imagen tiene 5 pulgadas de ancho por 7 pulgadas de altura y está escaneada a 300 ppp, ¿Cuál será su dimensión en pixels?

Answers

Si una imagen tiene 5 pulgadas de ancho por 7 pulgadas de altura y está escaneada a 300 ppp, ¿Cuál será su dimensión en píxeles?La dimensión en píxeles de una imagen de 5 pulgadas de ancho por 7 pulgadas de altura escaneada a 300 ppp se puede encontrar de la siguiente manera:Primero.

multiplicamos las dimensiones de la imagen en pulgadas:5 × 7 = 35Luego, multiplicamos el resultado anterior por la resolución de escaneado, es decir, 300 ppp:35 × 300 = 10,500Por lo tanto, la imagen tendrá 10,500 píxeles en su dimensión.

Es decir, tendrá una dimensión de 10,500 píxeles en el ancho y 10,500 píxeles end.

To know more about pulgadas visit:

https://brainly.com/question/29168292

#SPJ11

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

list 20 specific purpose of application software​

Answers

Answer:

1. Word processing

2. Spreadsheet creation and analysis

3. Database management

4. Presentation creation and delivery

5. Graphic design and editing

6. Video editing

7. Music production

8. Web browsing

9. Email management

10. Project management

11. Time tracking and monitoring

12. Accounting and financial management

13. Inventory and supply chain management

14. Human resources management

15. Customer relationship management

16. Sales management

17. Marketing management

18. Education and training

19. Healthcare management

20. Scientific research and analysis

How has music changed with the use of technology?


Musicians can now share their music on the World Wide Web.

Music can easily be created and edited with different applications.

Developers can include music in the background of their websites.

all of the above

please help

Answers

Answer: All of the above

Explanation:

Music like most other things, has been changed by its interaction with technology. Music for instance can now be shared on the internet to people far away from each other with services like Apple music and Tidal benefitting from this.

Different applications have also been created that can help make music from being able to create instrumentals to changing the voices of singers.

Developers are now even able to include their music in their website background as way to market their product, proof of another way music has changed due to technology.

Answer:

all of the above

Explanation:

Other Questions
Why is it so hot along the equator? On a coordinate plane, a rectangle has points (1, 2), (1, negative 2), (negative 4, negative 2), (negative 4, 2).Use the rectangle plotted on the coordinate plane to complete the statements.The length of the rectangle is units.The width of the rectangle is units. Angle C is a right angle. Find the side indicated to the nearest tenth. Find c if b=11.9, mB=20A.) 45.2B.) 43.1C.) 42D.) 34.8 Wallace is the CEO of Lustig Industries. He is very involved with strategic planning for the organization as well as monitoring control processes. These activities make use of Wallace's: When 50% of a number is added to the number, the result is 135 The force, f acting on a chraged object varies inversley to the square of its distance from another charged object. when the two objects are 0.64 meters apart, the force acting on them is 8.2 netwons Look at the graph. Which part of the line shows a timewhen the object was not moving? solve the simultaneous equation:y=x^2+3y-2x=18 83 fish of 40% of what number of fish? suppose lawn mowers are part of the market basket used to compute the cpi. suppose also that the quality of lawn mowers deteriorates while the price of lawn mowers stays the same. if the bureau of labor statistics is able to precisely adjust the cpi for the improvement in quality, then, other things equal, a. the cpi will rise. b. the cpi will fall. c. lawn mowers will no longer be included in the market basket. d. the cpi will stay the same. How many Borns humans have Simplify 5^25^4A. 58B. 5^8C. 5^2D. 5^6 WILL GIVE BRAINLIEST!! Find the component form of the vector v with magnitude 6 and direction angle 235a.b.c.d. which one of the following is not a way to improve the p/q rating of a company's brand of action-capture cameras? Help help help help help!!!!! Visual Basic Help:Code a program that reads a test score (number) from a text-box, each time a button is clicked. In other words, every time a new score is entered in the text-box, the score should be taken by the program, stored and the text-box should be cleared, so that the user can enter a new score. The program should be able to check that the user is entering a number. If the user enters something different than a number (or leaves the text-box empty), the program should not continue and it should display a warning message to the user. After entering as many scores as wanted, the user should be able to click on a second button to display the two highest scores, among all the ones entered until that point. The program should also display the total number of scores entered by the user. Also, once the user clicks on the button to display the results and the results are displayed, the program should get ready to get a new set of scores and start again. If the user starts writing a new score, the text-boxes with the results should be cleared.Example: Assume the user enters the following scores: 10, 5, 20. The scores are entered once at the time in the top text-box; when a score is entered, the user presses the button to "Read" the score. The score is taken by the program and the text-box is cleared, so that the next score can be entered. This process can be repeated as many times as the user wants and for as many scores as the user wants. Once all the scores are entered and read(or taken-in)by the program, the user clicks on the second button to display the results. The program should then display the two highest scores, among the ones entered. So, in the example, this would be 10, 20. And it should display the total number of scores entered by the user. In the example, it would be 3.After that, the user should be able to repeat the process and enter a new set of scores, if wanted. The program should therefore be ready to take in new inputs and start the process again. When the user starts typing the new score, the text-boxes with the previous results (two highest scores and total num. of scores) should get cleared how do you back your car out To The right when you leave The parking lot where should you Turn your steering wheel pleaseee help me thank u $250.00 is left in a savings account at 4.0% and the interest is compounded continuously. If the balance is now$330.78, then how many years was the money been in the account?Need it worked out ________ tell(s) the researcher exactly what needs to be gathered and analyzed to allow managers to make decisions related to a problem.