Wireless telephony, the transmission of a voice rather than a signal, like Morse code, was developed by

Answers

Answer 1

Wireless telephony, the transmission of a voice rather than a signal, like Morse code, was developed by Alexander Graham Bell.

Who was responsible for the development of wireless telephony?

Alexander Graham Bell is credited with the development of wireless telephony, a groundbreaking technology that enabled the transmission of voice signals without the need for physical wires. In the late 19th century, Bell, a Scottish-born inventor and scientist, made significant contributions to the field of telecommunications.

While he is best known for inventing the telephone, Bell also delved into wireless communication methods. Through his experiments and innovations, he paved the way for wireless telephony, allowing people to communicate vocally across distances without the use of cables or wires.

Learn more about Wireless telephony

brainly.com/question/29491665

#SPJ11


Related Questions

characteristics and purpose of a motherboard ​

Answers

A motherboard is the central board of a computer or server, to which most components of a computer are connected to each other. It essentially has the task of ensuring that the individual components work properly together.

More Complex Answer:

A motherboard can also be understood as a motorway junction of data. All data streams of a computer or data centre server must go through here, if only because servers are computers that act as a central unit of a network and are thus connected and communicate with other computers. In order for a server to fulfil its tasks such as managing domains, names and files, there are special server motherboards in server systems.

Characteristics:

Different system components can be found on a motherboard depending on the design, equipment and integration density.

Slot for the processor

Power supply for the processor

Clock generator

Real-time metre and battery

BIOS

Chipset

System bus

Memory module slots

Slots for the bus systems

Input/output interfaces

Onboard sound

Storage controllers

DMA controller

Interrupt controllers

Floppy controller

Keyboard processor

Connecters for the PC power supply

Fan connecters

Complete the following sentences by choosing the best answer from the drop-down menus.
A computer system is made of two main parts:
and
Examples of
memory
include the central processing unit and random access
The term software refers to
v that direct hardware what to do.
Examples of
include multimedia and presentation applications.
Productivity programs are an example of

Answers

the answers are:

- hardware and software

- hardware

- applications

- software

- software

what elements of the user stories were the most helpful in developing your initial test cases?

Answers

The most helpful elements of user stories in developing initial test cases are: the clear description of the user's goal, the defined roles and actions, and the specific acceptance criteria.

When developing test cases from user stories, it is important to consider the following elements:

1. User persona: User personas provide a better understanding of the user's needs, goals, and behavior. This information is used to develop relevant test cases.

2. User story title: The title of the user story is used to create a test case name.

3. Acceptance criteria: Acceptance criteria provide details on the expected outcome or behavior of the application.

4. Assumptions: Assumptions provide insight into the expected user behavior and are helpful in developing test cases.

5. Business value: Business value helps to prioritize which test cases should be executed first.

Learn more about developing initial test: https://brainly.com/question/14923867

#SPJ11

Find out how to print the below pattern in python and also come up with pseudocode,
you have to use for loop for this, you can use a for loop inside the outer for loop.
You can't use operator like " *" in python , only use print statement to print the below pattern. Find out how to print in 5 lines one by one in python , there is a way to print one line then next
X

XXX

XXXXX

XXXXXXX

XXXXXXXXX

Answers

Answer:

for i in range(5):

   for j in range(2*i + 1):

       print("*", end="")

   print()

Explanation:

for row index going from 0 to 5
           for column index going from 0 to 2*row index + 1
                      print * suppressing new line

          print a new line to move to next row

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

A man receives a fraudulent email from his bank asking him to confirm his user name and password by going to a particular website. What has occurred

Answers

Answer: The man's info has been found and a hacker was trying to make him confirm his passwrd so he can get a hold of it to hack the man further.

Explanation:

True or False A safety data sheet (SDS) is a technical document or bulletin that summarizes the health and safety information available about a controlled product.

Answers

Answer:

True.

Explanation:

The Occupational Safety and Health Administration (OSHA) is a federal agency saddled with the responsibility of assuring and ensuring safe and healthy working conditions for employees by setting and enforcing standards, providing education, trainings and assistance to various organizations.

According to the Occupational Safety and Health Administration (OSHA), trainings on the adoption and application of safety precautions (tools) such as wearing a personal protective equipment e.g masks (respirators), ear plugs, safety boots, gloves, helmet, etc. are very important and are essentially to be used by employees (workers) while working in a hazard prone environment or industries. Therefore, all employers of labor are required to provide work tools and ensure that their employees properly use those tools, as well as abide by other safety precautions and standards highlighted in the safety data sheet.

A Safety Data Sheet (SDS) can be defined as a text-based document or bulletin that provides information with respect to the chemical and physical properties such as flammability, temperature, radioactivity, etc., of a substance or equipment. Also, it contains information on the potential health hazards and safety precautions for proper use (handling), storage and transportation of such substance or equipment.

Hence, a safety data sheet (SDS) is a technical document or bulletin that summarizes the health and safety information available about a controlled product such as toxic chemicals, radioactive elements, weapons or ammunition, etc.

(Aloha Protocol) N users share a telecommunications channel in a given region. When, say user u, has a message for user v, he/she sends it to the satellite which retransmits it to the whole region so that all N users receive it. It may happen that more than one user is trying to transmit messages at a given time period. In this case, users get a garbled message. Assuming - Users send packets of information in time slots of equal length (n=0,1,2,…) - If a user started transmitting a packet at time n, the reception would be completed at time n+1 and every user would know if it was successful (i.e, no garbling) - If garbling occurs, each transmitting user independently decides in each subsequent time slot to attempt retransmission with probability q until success. - At time n, each user has a packet to send with probability p. - Show that the collection of random variables {X n

:n≥0}, where X n

is the number of "backlogged" users (i.e. the users who are trying to retransmit a package) at the beginning of time period n, is a Markov chain by constructing the one-step transition probability matrix.

Answers

The collection of random variables {Xn: n≥0}, representing the number of backlogged users at the beginning of each time period, forms a Markov chain. This can be shown through the construction of a one-step transition probability matrix.

Let's consider a time period n. At the beginning of this period, the number of backlogged users, Xn, can take on values ranging from 0 to N, where N is the total number of users.The probability of transitioning from Xn to Xn+1, i.e., from having Xn backlogged users to Xn+1 backlogged users, depends on the actions of the transmitting users during this time period.

For each transmitting user, there are three possible scenarios:

 1. The user successfully transmits the packet without garbling, resulting in one less backlogged user (Xn+1 = Xn - 1).

 2. The user's transmission is garbled, and they decide to retransmit with probability q. In this case, the number of backlogged users remains the same (Xn+1 = Xn).

 3. The user's transmission is garbled, but they decide not to retransmit with probability (1 - q). This means that the number of backlogged users decreases by one (Xn+1 = Xn - 1).

The one-step transition probability matrix can be constructed as follows:

Let P(i, j) denote the probability of transitioning from state i (Xn = i) to state j (Xn+1 = j).For each possible value of i (0 ≤ i ≤ N):P(i, i - 1) = p(1 - q)^i, representing the probability of i users transmitting and all of them successfully completing their transmissions.P(i, i) = p(1 - q)^i + (1 - p)q^i, accounting for the cases where some transmissions are garbled but users may or may not decide to retransmit.P(i, i + 1) = (1 - p)q^i, representing the probability of i users transmitting, all their transmissions getting garbled, and all of them deciding to retransmit.

By constructing the one-step transition probability matrix using the defined probabilities, we have shown that the collection of random variables {Xn: n≥0} forms a Markov chain. This Markov chain can be used to analyze the behavior of backlogged users in the Aloha Protocol telecommunications system.

Learn more about  Markov Chain :

https://brainly.com/question/17145924

#SPJ11

Write a class named Pet, which should have the following data attributes:
• _ _name (for the name of a pet)
• _ _animal_type (for the type of animal that a pet is. Example values are ‘Dog’, ‘Cat’,
and ‘Bird’)
• _ _age (for the pet’s age)
The Pet class should have an _ _init_ _ method that creates these attributes. It should also
have the following methods:
• set_name
This method assigns a value to the _ _name field.
• set_animal_type
This method assigns a value to the _ _animal_type field.
• set_age
This method assigns a value to the _ _age field.
• get_name
This method returns the value of the _ _ name field.
• get_animal_type
This method returns the value of the _ _animal_type field.
• get_age
This method returns the value of the _ _age field.
Once you have written the class, write a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This data should be stored as the object’s attributes. Use the object’s accessor methods to retrieve the pet’s name,
type, and age and display this data on the screen.

Answers

The class name in this question is Pet. It has three attributes, namely, __name (for the name of a pet), __animal_type (for the type of animal that a pet is), and __age (for the pet's age).


To create an object of the Pet class, we need to first initialize the class attributes using the __init__ method. This method will take three parameters, which correspond to the three attributes.


After initializing the class, we need to create six methods to assign values to the attributes and retrieve the values from the attributes. These methods are set_name, set_animal_type, set_age, get_name, get_animal_type, and get_age.

To create an object of the Pet class, we can use the following code:

pet = Pet()
pet.set_name(input("Enter pet's name: "))
pet.set_animal_type(input("Enter pet's animal type: "))
pet.set_age(input("Enter pet's age: "))
print("Pet's name:", pet.get_name())
print("Pet's animal type:", pet.get_animal_type())
print("Pet's age:", pet.get_age())

This code creates an object of the Pet class and prompts the user to enter the pet's name, type, and age. It then stores this data as the object's attributes using the set methods. Finally, it retrieves the data using the get methods and displays it on the screen.

To learn more about Class name, click here:

https://brainly.com/question/30695303

#SPJ11

which section of the tcp/ip five-layer network model contains the data the application wants to send?

Answers

Transport Layer of the tcp/ip five-layer network model contains the data the application wants to send.


What is Transport Layer?

In computer networking, the transport layer is a theoretical division of techniques in the layered architecture of protocols in the network stack, as defined by the OSI model and the Internet protocol suite. Applications can communicate with one another from beginning to end thanks to the protocols of this layer. Additionally, it offers multiplexing, flow control, reliability, and connection-oriented communication services.

The OSI model of general networking and the implementation details and semantics of the transport layer of the Internet protocol suite, which serves as the backbone of the Internet, are distinct. The development of TCP/IP is where all of the protocols used in this layer of the Internet today had their beginnings. While numbered layers are not used in TCP/IP, the transport layer is frequently referred to as Layer 4 in the OSI model.

Learn more about transport layer

https://brainly.com/question/29671395

#SPJ4

When you connect several home devices using a wireless router, what network topology are you using? A. bus B. mesh C. star D. ring

Answers

Answer:

Star Topology

Explanation:

Because the definition of Star Topoplogy is: In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device wants to send data to other device, it has to first send the data to hub and then the hub transmit that data to the designated device.

what should be chosen as x in the given series of clicks to calculate formulas automatically except for data tables: file < options < x < automatic?

Answers

In order to calculate formulas automatically in Excel except for data tables, "Workbook Calculation" should be chosen as x in the given series of clicks.

What is "Workbook Calculation"?

The mode in which Excel formulas are recalculated, whether manually or automatically. Iteration is the number of times a formula is recalculated until a particular numerical condition is met.

The steps to select "Workbook Calculation" are:

Click on the "File" tab in the ribbon.Click on "Options" in the menu on the left-hand side.In the Excel Options dialog box, click on "Formulas" in the menu on the left-hand side.Under "Calculation options", select "Workbook Calculation" from the drop-down menu next to "Calculation options".Click "OK" to save the changes.

Thus, by selecting "Workbook Calculation" as the calculation option, Excel will automatically recalculate formulas whenever a change is made to the worksheet.

For more details regarding workbook, visit:

https://brainly.com/question/18273392

#SPJ1

An Introduction to Programming with C++ by Diane Zak
Exercise 26:
If necessary, create a new project named Advanced26 Project and save it in the Cpp8\Chap11 folder. Also create a new source file named Advanced26.cpp. Declare
a 12-element int array named days. Assign the number of days in each month to
the array, using 28 for February. Code the program so that it displays the number of
days corresponding to the month number entered by the user. For example, when the user enters the number 7, the program should display the number 31. However, if the user enters the number 2, the program should ask the user for the year. The rules for determining whether a year is a leap year are shown in Figure 11-51. If the year is a leap year, the program will need to add 1 to the number of days before displaying the number of days on the screen. The program should also display an appropriate message when the user enters an invalid month number. Use a sentinel value to end the program. Save and then run the program. Test the program using the number 1, and then test it using the numbers 3 through 12. Test it using the number 2 and the year 2015. Then, test it using the number 2 and the year 2016. Also test it using an invalid number, such as 20.

Answers

Advanced26.cpp program which displays the number of days corresponding to the month number entered by the user along with the explanation of the code is given below:#include using namespace std;int main() {    int month, year, days[12] = { 31,28,31,30,31,30,31,31,30,31,30,31 };    

cout << "Enter the month number : ";    cin >> month;    if (month < 1 || month > 12)    {        cout << "Invalid month number!";        return 0;    }    if (month == 2)    {        cout << "Enter the year : ";        cin >> year;        if ((year % 4 == 0 && year % 100 != 0) || year % 400 == 0)            days[month - 1] = 29;    }    cout << "Number of days in " << month << " month is " << days[month - 1] << endl;    return 0;}Firstly, the program prompts the user to enter the month number. Then, the program checks whether the entered number is between 1 and 12 or not. If it is not between 1 and 12, it displays an error message "Invalid month number!" and the program terminates. If the entered number is between 1 and 12, the program checks if it is equal to 2.

If the entered number is equal to 2, then the program prompts the user to enter the year. Then, the program checks whether the entered year is a leap year or not. If it is a leap year, then the number of days in the month of February is 29 otherwise it is 28. If the entered month number is not equal to 2, then the program displays the number of days in the corresponding month of the entered month number on the screen along with the message "Number of days in <

To know more about corresponding visit :

https://brainly.com/question/12454508

#SPJ11

Please please please help I beg I'll give brainiest. :(

A digital egg timer uses an input, process and output. (a) Suggest an appropriate input component. (b) Suggest an appropriate output component (c) Circle the most appropriate device below to be used for the timing process. Monostable or Astable

Answers

Answer:

A) toggle switch B) Push to Make switch C) Monostable

Explanation:

toggle because it needs to go off when the timer ends and not when u press a button

Push to make because you turn the timer off manually

Monostable because it needs to go off once not repeatedly

Why do
ve need to add movies in our slide?

Answers

Answer:

movies are awesome! LOL but i dont understand your question...sadly.

Explanation:

dark red colored blood would be found in the ________, traveling to the ________. group of answer choices arteries; heart veins; heart heart; veins capillaries; arteries

Answers

Dark red colored blood would be found in the veins, traveling to the heart.

What are veins?

Veins are a type of blood vessel that carries deoxygenated blood from the various body regions to the heart. They are one of three types of blood vessels, the other two being arteries and capillaries.

They're also known as venules (small veins) or venous vessels. Because veins transport deoxygenated blood and are further from the heart, they have thinner walls and a less muscular lining than arteries. Veins have one-way valves that prevent backflow, allowing blood to flow only toward the heart.

The veins are also responsible for returning waste products to the heart so that they can be eliminated from the body. Dark red colored blood would be found in the veins, traveling to the heart.

Therefore, the correct option is veins; heart.

Read more about Blood at https://brainly.com/question/32316698

#SPJ11

Checking a website author’s credentials is one way to establish a site’s _________. Group of answer choices security information literacy credibility copyright

Answers

Answer:

The answer is "Credibility".

Explanation:

By assessing the excellently-intended, factual, or unbiased" a Site is, users, assess reliability. It can be achieved by developers, which provides a useful set of information sections, and responses to the links for external sources or resources must be provided.  The credibility of its website is mostly about making the site accurate and accurate. Only 52.8% of internet users agree that digital information is consistent, and the incorrect choice can be defined as follows:

Information on security is used in designing, that's why it's wrong.literacy is used in understanding, that's why it's incorrect.copyright refers to the legal right, that's why it's incorrect.

One way to remove an existing sketch entity is to select it and then press the __________ key on the keyboard.

Answers

One way to remove an existing sketch entity is to select it and then press the delete  key on the keyboard.

Do all keyboards have a delete key?

The  desktop computer is known to have keyboards and there are found to be two delete keys that can be seen on the keyboard.

Note that the delete key is seen as the key on a lot of computer keyboards that is said to be used to delete  a given character.

Therefore, One way to remove an existing sketch entity is to select it and then press the delete  key on the keyboard.

Learn more about keyboard from

https://brainly.com/question/26632484

#SPJ1

For the situation below, determine whether the premium will likely increase, decrease, or remain the same.

Kamiah passes a driver’s education course.

Answers

Answer:

decrease

Explanation:

Pleaseee Help!!!!

What industry holds a significant place in the commercial phere of economies all over the world due to factors such as the growing variety of game hardware and peripheral devices, emerging markets, and increasingly diversified demographics?

A)The Medical software industry

B)The video game industry

C)The graphic artistry industry

D)The international travel industry

Answers

Answer: B
Hope this helps!!
And do you want an explanation?

how does human readable document work

Answers

Human readable basically means that if the content is displayed by a program that lacks direct, specific awareness of that file's format, that there's at least a reasonable chance that a person can read and understand at least some of it

For example, if a is a string, then print(type(a))
will print -class iste'
What is output by the following code?
print(type("67"))
print (type(67))
print (type("sixty-seven"))

Answers

Answer:

<class 'str'>

<class 'int'>

<class 'str'>

Explanation:

The input

print(type("67"))

will give you the output

<class 'str'>

and the input

print (type(67))

will give you the output

<class 'int'>

and the input

print (type("sixty-seven"))

will give the the output

<class 'str'>

First input give you the output

<class 'str'>

because, the number 67 is an integer but, it is written in the quotes, and the third input give you the output

<class 'str'>

because, it is already a string and also written in quotes. And the second input give you the output

<class 'int'>

because, it is an integer and also written without quotes.

What specific type of dns attack uses public dns servers to overwhelm a target with dns responses by sending dns queries with spoofed ip addresses ?

Answers

A DNS amplification attack is the specific type of DNS attack that uses public DNS servers to overwhelm a target by sending DNS queries with spoofed IP addresses. This attack technique exploits the amplification effect of certain DNS queries, causing a high volume of traffic to be directed towards the target's IP address.

The specific type of DNS attack that uses public DNS servers to overwhelm a target with DNS responses by sending DNS queries with spoofed IP addresses is called a DNS amplification attack. In this attack, the attacker sends a large number of DNS queries to the public DNS servers, but they manipulate the source IP addresses in these queries to appear as the IP address of the target. This causes the DNS servers to send their responses to the target's IP address, overwhelming it with an excessive amount of DNS traffic. DNS amplification attacks are effective because they exploit the large response size of certain DNS queries, such as DNS recursive lookups. By amplifying the amount of traffic directed at the target, the attacker can cause a significant impact on the target's network or servers. This type of attack is also challenging to mitigate because it relies on abusing legitimate DNS infrastructure.

To know more about DNS amplification, visit:

https://brainly.com/question/32270620

#SPJ11

Did anyone do 5. 7. 5 Factorial on Code HS??



20 POINTS

Answers

The 5. 7. 5 Factorial on Code HS is shown below:

function myFunction(num){

n = 0;

total = 1;

while (n < num){

 total *= (num - n);

 n+=1;

}

eturn total;

}

alert(myFunction(6));

What is a programming language?

A method of notation for creating computer programs is known as a programming language. The majority of formal programming languages are text-based, though they can also be graphical.

In this exercise we applied the  use the knowledge of computational language in JAVA to describe the  code shown above.

Learn more about JAVA at :

brainly.com/question/2266606

#SPJ4

Why should we not underestimate the widespread of mass media?
Select one:

a.
While we do not seem to be aware of it, media has always been a useful and influential part of our lives.

b.
Media's span of influence knows no bounds

c.
All of the given choices are correct

d.
The media could reach almost anywhere in the world

Answers

C. A false statement by a good media source can go a long way

We should not underestimate the widespread of mass media because C. All of the given choices are correct.

It should be noted that media has always been a useful and influential part of our lives and its span of influence knows no bounds.

Also, it's important for one not to underestimate mass media because media could reach almost anywhere in the world. Therefore, all the options are correct.

Read related link on:

https://brainly.com/question/23270499

What feature in a relational database management system is similar to an observation in R? a. A row b. A primary key c. A table
d. An attribute

Answers

The feature in a relational database management system that is similar to an observation in R is a. A row.

In a relational database management system, a row represents a single record or observation. Similarly, in R, an observation is a single data point or record. Both rows in a relational database and observations in R contain data about specific attributes or variables.

For example, a row in a database may contain data about a person's name, age, and address, while an observation in R may contain data about a person's height, weight, and blood pressure. Both rows and observations are used to store and organize data in a structured way.

Learn more about database managemen : https://brainly.com/question/24027204

#SPJ11

Describe Barry Boehm's conclusions about Agile and plan-driven methods from the Boehm 2002 reading.
____

Answers

Barry Boehm's 2002 report examines the conflict between plan-driven methods and agile methods in software development. Boehm claims that both approaches have advantages and disadvantages that are dependent on the type of project being undertaken.

Hybrid model: A hybrid model that combines aspects of both agile and plan-driven models, tailored to fit the specific requirements of the project. Boehm acknowledges that this approach is the most flexible and is appropriate for most projects.

Agile methods for early phases: Utilize agile methods in the project's early phases to ensure a shared understanding of stakeholder needs and better alignment with business goals.

Rapid application development: Utilize agile methods to rapidly prototype a software solution in a plan-driven framework. Boehm notes that this approach is suitable for projects with high process uncertainty and tight time constraints.

Boehm concludes that agile methods and plan-driven methods should be used together. The advantages and disadvantages of each approach will be balanced by employing hybrid models that are tailored to fit the specific requirements of the project. This hybrid approach maximizes the benefits of both models and results in a more efficient and effective software development process.

To know more about models visit:

https://brainly.com/question/32196451
#SPJ11

PLEASE ANSWER!

The move mouse pointer looks like a ______?
white arrow with a small plus sign
white arrow with black crosshairs
white plus sign
black cross

Answers

The answer is: White arrow with black crosshairs.

"Which of the following statements is/are correct? 1) Primary
data could come from questioning or observation; 2) Observational
data is primary data.
Group of answer choices
A. Both 1 and 2
B. Neither 1 nor 2
C. 1
D. 2

Answers

Answer:

Explanation:

The correct answer is A. Both 1 and 2.

Both statements 1 and 2 are correct.

1) Primary data can indeed come from questioning or observation. Primary data refers to the original data that is collected firsthand from the source. It can be obtained through methods such as surveys, interviews, or direct observation.

2) Observational data is considered primary data. Observational data is collected through direct observation of phenomena or events without any manipulation or intervention. It is an example of primary data because it is collected firsthand from the observation process.

Therefore, both statements 1 and 2 are correct, and the correct answer is option A. Both 1 and 2.

Learn more about primary data and different methods of data collection to understand the importance of obtaining accurate and reliable information for research and analysis.

https://brainly.in/question/43808370

#SPJ11

If you play video games, please answer these questions it’s for a survey for my game development class!!

Why do you play video games?
What types of games do you play?
How long have you been playing video games?
How do you think video games will be played in the future?
Do you think video games will converge to a single platform in the future?

Answers

Answer:

Doom, fortnlte, mlnecraft, ark survival evolved, ark survival of the fittest, terraria, raft, among us, ect.

First person shooters, Third person shooters, Creative games

8-10 years

More VR, better graphics, more realistic

Maybe, not anytime soon.

Explanation:

Other Questions
Round off 37.005 to the nearest 1sf,2dp,3dp,1dp,2sf *. 1st Sub-Question: Suppose we try to exert ourselves to "transcend" a sort of "precariousness" of the circumstances by giving higher priority to (2) over (1). Would this mode of moral thinking be considered as Kantian or Utilitarian? Why? maria told me that she was given a beautiful present by John. change from reported speech to direct speech Step 7: Measuring the Volume of Air Near 60CUse tongs to put the beaker (with tube andthermometer) on the hot plate.1600500600 ml400300200100" HITemperature of gas:CHeight of the column of gas:cm DONEIntro laurent transformCALCULATE THE LAURENT TR. FOR f(nT) = cos (nw Ts) e need help with this please it would be amazing ill give u 100 points and also math smarts What is the central thread that connects the three parts of Section VIII in The Way to Rainy Mountain? brainiest to whoever right plz help me do all of you can (identify the best option for each question ) Adverse Selection ProblemIt is March 2020 and there is evidence of people getting sick from an unknown virus. Only 2 percent of the population have visible symptoms; they require hospitalization and are known to have the virus. Another 10 percent of people are infected with the virus but are asymptomatic and do not know they are infected. The remaining 88 percent of the population are not infected with the virus. As of March 2020, there is no test to determine whether an asymptomatic person has the virus. Hospitalization costs range from $35,000 to $45,000 (with an average of $40,000). In the U.S., anyone who is hospitalized cannot buy health insurance because they already have the condition. These unlucky few must pay for healthcare out of their own pocket.Asymptomatic patients have a 50 percent chance of needing hospitalization. Uninfected patients have a 10 percent chance of eventually needing hospitalization. People who do contract the virus but who do not require hospitalization eventually recover at home and thus do not use insurance. Both the asymptomatic and uninfected population groups want to get insurance as soon as possible. (For ease of calculation, assume you do not need to re-normalize the size of the market to account for the 2% who cannot buy insurance.)Q1. No Insurance Case & Infected scenario. What is the expected cost to someone who has the virus, visible symptoms, and needs hospitalization? _______Q2. No information scenario. If you assume that both uninfected and asymptomatic patients want to buy insurance, how much would an insurance company in a competitive market charge for expected costs?__________________ Neither the insurance firms nor the prospective patients know who is infected and asymptomatic or uninfectedFull information scenario (Questions 3 and 4). Suppose that a test becomes available that can tell definitively whether an asymptomatic person has the virus. The test can also tell if a person is uninfected. Assume the government will pay for the test so neither patients nor insurance firms need to pay for it. What are the prices of insurance offered in the market:Q3. For asymptomatic infected patients, the price is:_______________Q4.For uninfected patients, the price is:___________________Suppose that, before the test becomes available, asymptomatic patients themselves can determine whether they have the virus because they cannot taste strawberries. People who can taste strawberries dont have the virus. Otherwise, there are no outwardly visible signs, and people who can and cannot taste strawberries can easily lie, so both can claim that their taste is fine.Q5.Since asymptomatic patients can easily lie about their tastebuds, insurance firms still have no data about who is uninfected and who is infected and asymptomatic. From their perspective, what is the expected cost of offering insurance to uninfected and infected and asymptomatic patients? _____________Q6. At the expected average insurance cost in Question 4, what can be said about the insurance contract that the uninfected patients will purchase? (Choose best answer):A) they will acutally buy a contract for $5400B) they will actually buy a contract for $5520C)They will not pay $5520 and will exit the marketD) They will actually buy a a contract for $4200 Solve:one half plus two sixths equals blank five sixths three eighths three sixths one fourth What is the prefix for intergrate A migrating bird flies 390 miles in 15 hours. How many miles does it fly in 4 hours? What is the value of this expression?3 +5x4-(8-5x2) = ? Need assistance with #8, #9, #10, and #11 Any help will be graetly apprciated. Studying for final exam can i please have help i dont know the answer to this one a colleague from the plant in germany has arrived at the chicago plant to share insights on a recent product line changeover implemented in germany. this changeover has saved thousands of euros at the german facility, but jim does not think it will work in the united states. jim feels that there is a completely different attitude towards work and innovation in the u.s., and in fact, thinks the german facility is technologically behind his plant. additionally, jims colleague often mispronounces words when they speak english, and they dont dress appropriately for the u.s. office. they showed up to work on the plant floor in formal business attire, with dress shoes that had a slippery sole. however, the colleague is a guest, and it is important that jim pretends to be interested. 22. Thomas lists all of the different arrangements of the letters in the word CABOOSE. How many of Thomas's arrangements begin with a C and end with an E? (A) 100 (B) 120 (C) 80 (D) 90 (E)Other If a b ab - a - b - 1, then what is the value of 2841001? (A) 282435 (B) 283000 (C) 283283 (D) 282000 (E)Other What is the product of 4% of 112 and 61% of 375? (A) 144 (B) 90 (C) 120 (D) 105 (E)Other . Josh rolls two standard six-sided dice. What is the probability that the product of the numbers shown on the dice is a multiple of six? (A) 4/9 B) 1/3 (C) 5/12 D) 1/2 (E)Other What is the remainder when the sum of the terms of the arithmetic series 101 108 + 115 + 290 is divided by 28? (A) 7 (B) 0 (C) 14 (D) 21 (E)Other Two right triangles have the same perimeter, and each triangle's side lengths are all whole numbers. One right triangle has legs of length 10 and 24. The other right triangle has a hypotenuse of length 25. What is the area of the second triangle?A) 150 (B) 112 (C) 120 (D) 144 (E)Other . A function f is defined for positive integers x as f(x) = 0 if x 2. Otherwise, f(x) = f(x - 1) if x is not divisible by 3, and f(x) = 2 + f (3) if x is divisible by 3. What is the value of f(2020)? A) 16 B) 14 C) 12 D) 8 E)Other Suppose that you have the following declaration: stack Type stack(50); double num; and the input is 25 64-3 6.25 36-4.5 86 14 -129 Write a C++ code that processes this input as follows: If the number is non-negative, it pushes the square root of the number onto the stack; otherwise it pushes the square of the number onto the stack. After processing these numbers write a C++ code that outputs the elements of the stack. The Brock family uses up a 12-gallon jug of milk every 3 days. At what rate do they drink milk?Simplify your answer and write it as a proper fraction, mixed number, or whole number Is the graph increasing, decreasing, or constant where 1 < x < 6?AY1088428 10 1224-10A. DecreasingB. ConstantC. Increasing