which functions are performed by server-side code??​

Answers

Answer 1

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.


Related Questions

colour statement is used for setting .................... and .................. colors​
(a) screen,Paint (b) line,circle
(c) foregroung,Background
(d) none of these

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is C. i,e, foreground, and background.

First, we need to know what is a color statement.

The purpose of the color statement is to select display colors. It is used to select the foreground and background colors of the display.

So, the correct answer is :

Colour statement is used for setting foreground and background colors.

In general, it allows you to select foreground and background colors for a display. You can use different codes to display and see the effect of the color statement.  

While other options are not correct, because the color statement used to select foreground and background color for the display. It does not use for setting screen and paint color in it. It also does not use for drawing lines and circles etc.

Your manager suspects that your network is under attack. you have been asked to provide information regarding traffic flow and statistical information for your network. which tool should you use?

Answers

We use the protocol analyzer tool.

What is the protocol analyzer tool?

The data traffic can be monitored in computer networking to detect any network abnormalities using an analysis tool. This tool is what is often termed a protocol analyzer.

In the scenario above, we are told the manager suspects an abnormality due to a network attack, in this situation using a protocol analyzer, can speed up his ability to provide information regarding the current data traffic flow and other useful statistical information. The Wireshark protocol analyzer is a good example.

You can learn more about the protocol analyzer tool from a related question here https://brainly.com/question/16749354

#SPJ1

How do TV, newspaper and now new media (internet) shape public opinion about an individual, groups or even society in general?

Answers

Answer:

The media plays a central role in informing the public about what happens in the world. People rely on media such as television, the press and online to get news and updates. Anyone can now find out almost anything they want to know by the click of a button on their smartphone or tablet.

Explanation:

Mention 2 precautionary
measures to be observed
when using ICT tools​

Answers

Answer:

ICT is the abbreviated form of Information and Communication. It included different technologies like mobile phones, computers, USBs etc.

Following are two precautionary measures which should be observed when using any kind of ICT:

Use of Antivirus: It can used to protect anything placed inside the technology especially from hacking and viruses which can create many issues.Backup Data: Creating a backup of the data stored in the device is important as it can be recalled when the device malfunctions. Backup of the data can be created through using USBs, CDs etc or through cloud storage

What is optical disc?​

Answers

Answer:

hope this helps

Explanation:

An optical disc is a disc that allows you to play movies, music that is already prerecorded also it uses a laser light the read the data that is on the disc.

Answer:

An optical disc is an electronic data storage medium that can be written to and read from using a low-powered laser beam. Explanation:

Assign numMatches with the number of elements in userValues that equal matchValue. Ex: If matchvalue = 2 and uservals = [2, 2, 1, 2], then numMatches = 3. function numMatches = Findvalues(uservalues, matchvalue) % userValues: User defined array of values % matchValue: Desired match value arraysize = 4; % Number of elements in uservalues array numMatches = 0: % Number of elements that equal desired match value % Write a for loop that assigns numMatches with the number of % elements in uservalues that equal matchvalue.

Answers

The provided code defines a function called "Findvalues" that takes two input arguments: "uservalues" (an array of user-defined values) and "matchvalue" (the desired value to match).

The goal is to determine the number of elements in "uservalues" that equal "matchvalue" and assign this count to the variable "numMatches".To accomplish this, the code initializes "numMatches" to 0 and then utilizes a for loop to iterate through each element in "uservalues". Inside the loop, it checks if the current element is equal to "matchvalue" and increments "numMatches" by 1 if a match is found.

The implementation of the function is as follows:

function numMatches = Findvalues(uservalues, matchvalue)

   arraysize = numel(uservalues); % Number of elements in uservalues array

   numMatches = 0; % Number of elements that equal the desired match value

   % Iterate through each element in uservalues

   for i = 1:arraysize

       % Check if the current element is equal to matchvalue

       if uservalues(i) == matchvalue

           numMatches = numMatches + 1; % Increment numMatches

       end

   end

end

This function can be called with the appropriate arguments to determine the number of elements in "uservalues" that equal "matchvalue". For example, if "uservalues" is [2, 2, 1, 2] and "matchvalue" is 2, the function will return numMatches as 3.

Learn more about matchvalue here: brainly.com/question/15739286
#SPJ11

LAB: Parsing dates Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substr() function to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990 Ex: If the input is March 1, 1990 April 2 1995 7/15/20 December 13, 2003 -1 then the output is: 3/1/1990 12/13/2003 LAB ACTIVITY 9.10.1: LAB: Parsing dates 0/10 main.cpp Load default template - COLE > 5 6 int DateParser(string month) 7 int monthInt = 0; if (month January) 10 monthint - 11 11 else if (month -- "February") 12 monthint - 21 13 else if (month - "March) montrent - 3; 15 else if (month -- "April") 16 monthInt - 4 else if (month "ay") monthint - 5 19 else if (month June") antin 6 21 else if (monthuly) 22 monthint - 7 else if (monthst") monthiet 8 LAB ACTIVITY 9.10.1: LAB: Parsing dates main.cpp 22 monthint - 1 23 else if (month == "August") 24 monthInt = 8; 25 else if (month - "September") 26 monthInt = 9; 27 else if (month -- "October") 28 monthInt - 10; 29 else if (month - "November") 30 monthInt - 11; 31 else if (month - "December") 32 monthInt = 12; 33 return monthint; 34 ) I 35 36 int main() { 37 38 // TODO: Read dates from input, parse the dates to find the one 39 1 in the correct format, and output in m/d/yyyy format 40 41) 42

Answers

The python code which can be used to read dates from input, one date per line and each date's format must be as follows: March 1, 1990, is:

Python code

import datetime

inputs = []

result = []

#read the inputs

date = input()

inputs.append(date)

while not date == "-1":

 date = input()

 inputs.append(date)

#check if the input is in the correct format and convert it.

for date_text in inputs:

 try:

   date_text = datetime.datetime.strptime(date_text,"%d %B, %Y")

   result.append(date_text.strftime("%d/%m/%Y"))

 except ValueError:

   pass

   

print(*result, sep = "\n")

The above code would parse the string and extract the date. The split() method was used to break the input into tokens.

Read more about python programming here:

https://brainly.com/question/27666303

#SPJ1

what will be the output for;
for i in range(1,6):
if i==3:
print('hello')
break
else:
print(i)
print('done')

Answers

The output for; for i in range(1,6): if i==3: print('hello') break else: print(i) print('done') the output for the given Python program is 001020340.

What is range () in Python?

The python range() function creates a collection of numbers on the fly, like 0, 1, 2, 3, 4. This is very useful, since the numbers can be used to index into collections such as string. The range() function can be called in a few different way.

The given program is as:i =0while i < 5print(i)i +=1if i==3 :breakelse:print(0)It will give the following as result 001020340Hence, the answer is 001020340.

Read more bout the python :

https://brainly.com/question/26497128

#SPJ1

yourList 20, 40, 60, 80myList 10, 30, 50, 70yourList <-- myList Consider the following code segment.What are the contents of yourList after the code segment is executed?answer choices[10, 30, 50, 70][20, 40, 60, 80][10, 30, 50, 70, 20, 40, 60, 80][20, 40, 60, 80, 10, 30, 50, 70]

Answers

[10, 30, 50, 70, 20, 40, 60, 80] , MyList and yourList are concatenated in the code segment using the + operator, with MyList coming first.

What are the five categories of data?

Integer types, floating point types, character types, string types, and composite types are the five basic data types recognized by modern computer languages. Each general group also contains some specific subtypes.

What is a data type?

Attributes of data, called "data types," tell computer systems how to interpret the values ​​of that data. Knowing the different formats of the data ensures that the values ​​for each property are what you expect and that the data is captured in the proper format

To know more about code segment visit:-

brainly.com/question/30353056

#SPJ4

Which Windows service is used to keep information about the networks the server connects to and communicates network information to applications on the server

Answers

Answer:

windows 7

am I correct..

3.5 code practice
grade = str(input("What year of high school are you in?: "))

if ("grade ==Freshman"):

print("You are in grade: 9")

elif ("grade == Sophomore"):

print("You are in grade: 10")

elif ("grade == Junior"):

print("You are in grade: 11")

elif ("grade == Senior"):

print("You are in grade: 12")

else:

print("Not in High School")

It keeps printing your are in grade 9. Why?

Answers

The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.

grade = input("What year of high school are you in?: ")

if(grade.lower()=="freshman"):

print("You are in Grade 9.")

elif(grade.lower()=="sophomore"):

print("You are in Grade 10.")

elif(grade.lower()=="junior"):

print("You are in Grade 11.")

elif(grade.lower()=="senior"):

print("You are in Grade 12.")

else:

print("Wrong input!")

ESSAY: In two or three sentences,
\( - \)
write your idea on how your knowledge in identifying, selecting and using appropriate kitchen tools, equipment and paraphernalia affects your life. ​

Answers

Answer:

Being able to use tools in the kitchen is essential for basic tasks. Knowing what to use helps to perform tasks properly such as cutting a lemon or peeling an apple. Not knowing how to use such tools can cause accidents that could've been avoided.

how do you stop sharing location without notifying

Answers

Turn On Airplane Mode, Turn Off 'Share My Location', Stop Sharing Location on Find My App, Using GPS Spoofer to Change Location are the ways  to stop sharing location without notifying.

How to Turn Off Location?

If this is your situation, you should keep reading. Many times, we desire to go into stealth mode so that no one can see where we are. In this article, we'll explain how to disable location without the other person noticing.

We have addressed all the frequently asked questions about location sharing and how to disable location sharing so that nobody else can know where you are at any given time.  Because the iPhone is a highly guarded gadget, you must be careful to follow each step and keep your actions to yourself.

Method 1: On the home screen, swipe up until you see an icon with an airplane on it. To switch on airplane mode, tap on it.

Method 2: Tap "Airplane Mode" in the "Settings" app to activate it.

To learn more about Turn Off Location refer to:

https://brainly.com/question/14316404

#SPJ4

Sutherland Company listed the following data for the current yoar:
Budgeted factory overhead #2,214,000
Budgeted direct labor hours $90.000
Budgeted machine hours $45,000
Actual factory overhead $2,201,700
Actual direct labor hours $84,000
Actual machine hours $43,000

If overhead is applied based on machine hours, the over applied under applied
Multiple Choice
a. $86,100 underapplied
b. $86.100 overapplied
c. $68.052 underapplied
d. $68.052 overapplied

Answers

Based on the given data, if overhead is applied based on machine hours, the company will have overapplied overhead of $68,052.

To determine whether overhead is overapplied or underapplied, we need to compare the actual overhead with the applied overhead. The applied overhead is calculated by multiplying the actual machine hours by the predetermined overhead rate.

Predetermined overhead rate = Budgeted factory overhead / Budgeted machine hours

Predetermined overhead rate = $2,214,000 / $45,000 = $49.2000 per machine hour

Applied overhead = Predetermined overhead rate * Actual machine hours

Applied overhead = $49.2000 * 43,000 = $2,118,600

To calculate whether overhead is overapplied or underapplied, we subtract the actual overhead from the applied overhead.

Overapplied overhead = Applied overhead - Actual overhead

Overapplied overhead = $2,118,600 - $2,201,700 = -$83,100

Since the result is negative, it means that overhead is overapplied. However, the options provided in the multiple-choice question do not include a negative value. To obtain the absolute value, we take the absolute value of -$83,100, which is $83,100. However, none of the options provided match this value.

Therefore, based on the calculation, the correct answer is not provided in the given options.

Learn more about Budgeted here:

https://brainly.com/question/31952035

#SPJ11

After securing your space at the end of the day, you should try to badge back in to ensure it is locked.a. Trueb. False

Answers

Answer:

True

Explanation:

[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE

[SPECIAL]&gt;&gt;&gt;WRITE THIS TEXT IN BINARY CODE

Answers

Answer:

in binary

01000110 01010010 01000101 01000101 00100000 01010000 01001111 01001001 01001110 01010100 01010011

THX:

01010100 01001000 01000001 01001110 01001011 00100000 01011001 01001111 01010101

Answer:

01000110 01010010 01000101 01000101 00100000 01010000 01001111 01001001 01001110 01010100 01010011

Write a program that prints the following pattern. You must use a loop to do this and you may not output the pattern manually using print statements. You should use at max 2 print statements. write the code for python

Write a program that prints the following pattern. You must use a loop to do this and you may not output

Answers

Using the codes in computational language in python it is possible to write a code that se a loop to do this and you may not output the pattern manually using print statements.

Writting the code:

def print_pascal_triangle(size):

   for i in range(0, size):

       for j in range(0, i + 1):

           print(decide_number(i, j), end=" ")

       print()

def decide_number(n, k):

   num = 1

   if k > n - k:

       k = n - k

   for i in range(0, k):

       num = num * (n - i)

       num = num // (i + 1)

   return num

# set rows

rows = 7

print_pascal_triangle(rows)

See more about python at brainly.com/question/18502436

#SPJ1

Write a program that prints the following pattern. You must use a loop to do this and you may not output

A method definition with four formal parameters is generally called with how many actual parameters

Answers

A method definition with four formal parameters is generally called with four actual parameters. The number of actual parameters must match the number of formal parameters in order for the method to be called correctly.

When calling a method, the actual parameters provide the values that are passed to the method, while the formal parameters are used to define the method's signature. It's important to ensure that the data types and order of the actual parameters match the formal parameters to avoid any errors or unexpected behavior.

In summary, when calling a method with four formal parameters, you should provide four actual parameters.

To know more about parameters visit:

https://brainly.com/question/29911057

#SPJ11

how to stop someone from tracking your iphone without them knowing

Answers

To stop someone from tracking your iPhone without their knowledge, follow these steps:

1. Disable location services: Go to Settings > Privacy > Location Services, and toggle off the switch for all apps or specific apps that you believe may be tracking you.

2. Reset advertising identifier: Go to Settings > Privacy > Advertising, and tap "Reset Advertising Identifier." This will disconnect your device from ad-related tracking.

3. Disable Share My Location: Go to Settings > [Your Name] > Find My > Share My Location, and toggle off the switch.

4. Check for unfamiliar apps: Look through your installed apps and delete any that you don't recognize or remember installing.

5. Update your software: Regularly update your iOS to ensure you have the latest security patches.

To prevent iPhone tracking without someone's knowledge, disable location services, reset the advertising identifier, turn off Share My Location, check for unfamiliar apps, and update your software regularly. These steps will help protect your privacy and prevent unwanted tracking.

Protecting your privacy and preventing someone from tracking your iPhone is essential. By following the steps mentioned, you can effectively reduce the chances of being tracked without the person knowing. Stay vigilant and routinely check your settings to maintain your privacy.

To know more about software visit:
https://brainly.com/question/985406
#SPJ11

How do I fix Java Lang StackOverflowError?

Answers

Answer:

A StackOverflowError in Java is usually caused by a recursive method that calls itself indefinitely or by an excessively deep call stack.

Explanation:

To fix this error, you can try the following:

Check your code for any recursive calls that may be causing the error and modify them to avoid infinite recursion.Increase the stack size of your JVM by adding the "-Xss" option when running your application. For example, you can use the command "java -Xss2m MyClass" to increase the stack size to 2MB.Simplify your code or optimize it to reduce the depth of the call stack.If none of the above solutions work, you may need to consider refactoring your code or using a different approach to solve the problem.

How can you troubleshoot Internet access problems

Answers

Answer:

When your Internet service is disrupted, there can be many things that have gone wrong. The best way to start is to determine if everything is broken (i.e. you can't access any websites or Internet services) or if the difficulty is only with a certain program or a specific website is not responding.

Check the network icon (or wireless connection settings) to see if you have Internet access. Ensure that your network adapter is not turned off. Check for changes to proxy settings. Check the network cables if your computer is wired to the router. Reset your router. Check your firewall or security software. There are specific troubleshooting steps for ZoneAlarm issues. Check your browser access issues or email problems.

Answer:

Delete items from the cache, check your Internet connection, and try using a different browser.

Explanation:

edge lesson

(CERCLA) If you are named as a prp in a CERCLA case, what are the three defenses you might present to absolve you of liability? (short answer and ref)
A
Question 12 (EPCRA) Where is it mandated that the public must have access to emergency response plans, MSDSs, inventory forms, and followup emergency notices? (ref only)

Answers

A Potentially Responsible Party (PRP) is any individual, company, or entity that is either directly or indirectly responsible for generating, transporting, or disposing of hazardous substances on a Superfund site or in the surrounding areas. To absolve oneself of responsibility, three defenses may be presented by the PRP.

These are: Innocent Landowner Defense - An Innocent Landowner Defense exists for individuals who bought property and were unaware of the contamination before buying it. This defense may help an individual avoid being named as a PRP in a CERCLA case if the contamination occurred before the property was acquired, and the owner was unaware of it when purchasing the property.Bona Fide Prospective Purchaser Defense - A Bona Fide Prospective Purchaser Defense may be used by companies and individuals who bought a property knowing about the pollution but did not contribute to the contamination

. This defense applies to businesses and people who acquire ownership after the site is listed on the National Priorities List, and they take reasonable steps to ensure that they do not contribute to the pollution.Innocent Landowner Defense - This defense is available to persons who have conducted all appropriate inquiry into the previous ownership and use of a property, and to the best of their knowledge, there was no contamination when the property was purchased.

To know more about site visit:

https://brainly.com/question/12913877

#SPJ11

An object is identified by its
characteristics
state
class
attribute​

Answers

Answer:

Characteristics is the correct answer to the given question .

Explanation:

The main objective of object is for accessing the member of class .When we have to access the member of class we can create the object of that class The object  is is identified by there characteristics.The characteristics describe the behavior and state of a class.

With the help of class and object we can implement the real world concept .The object is the run time entity of a class where as the class is physical entity .Without the object we can not implemented the object oriented programming.All the other option are not correct for the object because they are not described the identification of object .

PLS HELP
1. You can tape a movie off Showtime.
a. if you use it for educational purposes.
b. only if you have written permission from the company.
c. so that it may be archived.
d. to use as an entertainment for your great students.

2. You may photocopy parts of the encyclopedia:
a. if it is for your use only.
b. only if your copy is of the subject you are researching.
c. if you don’t have a copy at home.
d. to pass out to all your students.

3. You may record a local symphony concert to share with your class:
a. as long as you don’t sell tickets to hear it.
b. as long as you use it at a listening center in your room.
c. if you relate it to your lessons.
d. you may not record a public performance of any kind.

4. You may make a copy of a computer program:
a. if you are giving it to a friend.
b. as long as you purchased it and are using it for a back-up copy.
c. as long as you downloaded it from the internet.
d. you may not copy software.

5. You may use any image from the Internet or clip art software:
a. if you know that no one will know.
b. if you save it as an “image” and give it a new name.
c. as long as it is confirmed to be “royalty free”.
d. you cannot copy any photograph, artwork, or image without permission.

Answers

Answer:

1. so that it may be archived

2.to pass out to all your students

3.if you relate it to your lessons

4.as long as you've purchased it and you are using it for back up copy

5.C

Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

Answers

which information purpose uses video from a security camera?

Answers

Answer:

robbery

Explanation:

it records a robbery so that police can later find out who did it

Write a class definition for an abstract class, Vehicle, that contains:a double instance variable, maxSpeeda protected double instance variable, currentSpeeda constructor accepting a double used to initialize the maxSpeed instance variablean abstract method, accelerate, that accepts no parameters and returns nothing.a method, getCurrentSpeed, that returns the value of currentSpeeda method, getMaxSpeed, that returns the value of maxSpeeda method, pedalToTheMetal, that repeatedly calls accelerate until the speed of the vehicle is equal to maxSpeed. pedalToTheMetal returns nothing.

Answers

A class definition for an abstract class Vehicle, including the requested terms and methods.



```java
public abstract class Vehicle {
   // Instance variable
   private double maxSpeed;

   // Protected instance variable
   protected double currentSpeed;

   // Constructor accepting a double to initialize maxSpeed
   public Vehicle(double maxSpeed) {
       this.maxSpeed = maxSpeed;
   }

   // Abstract method accelerate
   public abstract void accelerate();

   // Method getCurrentSpeed
   public double getCurrentSpeed() {
       return currentSpeed;
   }

   // Method getMaxSpeed
   public double getMaxSpeed() {
       return maxSpeed;
   }

   // Method pedalToTheMetal
   public void pedalToTheMetal() {
       while (currentSpeed < maxSpeed) {
           accelerate();
       }
   }
}
```

In this class definition, the Vehicle class is declared abstract as it contains an abstract method called accelerate. The class also contains instance variables for maxSpeed and currentSpeed, with currentSpeed being protected. There are methods for getting the values of these variables, as well as a method called pedalToTheMetal that repeatedly calls the abstract accelerate method until the vehicle's speed reaches maxSpeed.

To know more about abstract class Vehicle:

https://brainly.com/question/15046691

#SPJ11

What is the missing line of code? >>>from random import* >>>alist=[10,20,30,40,50]

Answers

The missing line of code to achieve that is random_element = choice(alist).

In Python, the random module provides various functions for generating random numbers and making random selections. To use these functions, you need to import the random module using the statement from random import *.

Once you have imported the random module, you can use the choice() function to make a random selection from a given sequence, such as a list. In this case, the sequence is alist, which contains the elements [10, 20, 30, 40, 50].

The line of code random_element = choice(alist) assigns a randomly selected element from alist to the variable random_element. Each time this line is executed, a different element from the list will be chosen randomly.

This allows you to introduce randomness and variability in your code by selecting elements randomly from a list or sequence.

Learn more about code at https://brainly.com/question/29589542

#SPJ11

Why should you use CSS framework

Answers

CSS frameworks make it simple to create websites compatible with multiple browsers and browser versions. This reduces the likelihood of bugs popping up during cross-browser testing.

A(n) _____, such as microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Answers

A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

What is a personal information manager PIM software?

A personal information manager (PIM) is known to be a kind of a software application that is known to function by the use of  tools to help one or computer users to be able to handle and monitor contacts, calendars, tasks, appointments as well as other forms of personal data.

Therefore, A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Learn more about ​personal information manager (PIM) from

https://brainly.com/question/23664875

#SPJ1

A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.

a. swim lane

b. ​personal information manager (PIM)

c. ​fact-finding application

d. ​enterprise architecture

Other Questions
Which research question is most effective?A. How did natural gas affect the ozone layer in 1975?B. How do fossil fuels affect the atmosphere?C. When were fossil fuels first discovered?D. What are fossil fuels? Suppose that the functions h and g are defined as follows. h(x) = (x+2)(x-1) g(x) = x-3 find ( h/g)(-6) (b) Find all values that are NOT in the domain of h/g If there is more than one value, separate them with commas. Read the excerpt from The Miracle Worker by William Gibson.CHILDREN: [DELIGHTED] Theres another present! Beatrice! We have a present for Helen, too! Give it to her, Beatrice. Here, Annie!(This present is an elegant doll, with movable eyelids and a momma sound.)Its for Helen. And we took up a collection to buy it. And Laura dressed it.ANNIE: Its beautiful!CHILDREN: So dont forget, you be sure to give it to Helen from us, Annie!ANNIE: I promise it will be the first thing I give her. If I dont keep it for myself, that is, you know I cant be trusted with dolls!Select the excerpt from The Story of My Life by Helen Keller that shows Helens viewpoint of this event.AMy aunt made me a big doll out of towels. It was the most comical shapeless thing, this improvised doll, with no nose, mouth, ears, or eyesnothing that even the imagination of a child could convert into a face.BThe morning after my teacher came she led me into her room and gave me a doll. The little blind children at the Perkins Institution had sent it and Laura Bridgman had dressed it; but I did not know this until afterward. COne day, while I was playing with my new doll, Miss Sullivan put my big rag doll into my lap also, spelled "d-o-l-l" and tried to make me understand that "do-l-l" applied to both. Earlier in the day, we had had a tussle over the words "m-u-g" and "w-a-t-e-r." DDr. Bell advised my father to write to Mr. Anagnos, director of the Perkins Institution in Boston, the scene of Dr. Howe's great labors for the blind, and ask him if he had a teacher competent to begin my education. Mobil Corporation bonds have a 7% coupon rate, 2 years to maturity, and pay semiannual coupon payments. Risk free rate is 1.5% and risk premium is 3.5% based on the AA bond rating.1) What is the YTM of the bond? What is the price of the bond?2) What is the duration of the bond?3) Risk-free rate just dropped from 1.5% to 1.4%, what is the new YTM and bond price? What is the bond price sensitivity to YTM?4) Based on bond duration in 2), estimate the expected bond price change if risk free rate increase from 1.5% to 1.6%. What is acharacteristic of a good summary? (1 point) thickness or thinness of a line "Clear-cutting" a forest means:-Forest environments do not remain intact-The cutting of older trees is not balanced by the planting of new trees-Forest resources are not being carefully managed.-All of the above. Help me with this please anyone A old computer model that cost $599(whole) is marked down 5%. How much money will the customer save (what is the discount only)? How many cups of rice are needed to serve 45 people What was Ronald Reagan's nickname while in office?Select one:O a. BonzoO b. GrandpaO c. The Great PretenderOd. The Great Communicator in this image, why does the value in cell g1 look slightly different from the value in the formula bar? Automation is the process of physically moving or carrying goods during production, warehousing, and distribution.FalseTrue Jim can make 2 cupcakes (the y value) with one cup of flour (the x value). How many cupcakes can he make with5 cups of flour? A spring of force constant 1500 Nm-l is actedupon by a constant force of 75 N. Calculatethe potential energy stored in the spring. In an organization with self-managed work teams, one of the teams decides that instead of reaching a consensus on some issue, it will simply vote on what to do. The majority then makes the decision. Of which type of strategy for conflict management is this an example?Forcing a solution What two numbers add to 6 and multiply to 58 3. (x,y) (x + 2,y) (x, y)-10-8-4-210862-2TID-6-8-109104. (x,-10-8 HELPPP PLSSSS What product is obtained when ethylamine reacts with excess methyl iodide in a basic solution of potassium carbonate? Draw a molecule on the canvas by choosing buttons from the Tools (for bonds and charges), Atoms, and Templates toolbars, including charges where needed. 2 C X H* 2D EXP. L CONT. H C z o S N Br Marvin JS [1] A 1 by I ChemAxon P F lan worked 25 hours at the grocery store last week and 36 hours this week.What is the percent change?O 44% IncreaseO 44% DecreaseO 31% IncreaseO 31% Decrease