Write a script that declares and sets a variable that’s equal to the total outstanding balance due. If that balance due is greater than $10,000.00, the script should return a result set consisting of VendorName, InvoiceNumber, InvoiceDueDate, and Balance for each invoice with a balance due, sorted with the oldest due date first. If the total outstanding balance due is less than $10,000.00, return the message "Balance due is less than $10,000.00."

Answers

Answer 1

Answer:

see explaination

Explanation:

SCRIPT :

drop table Vendor;

create table Vendor (VendorName varchar2(20), InvoiceNumber number (20), InvoiceDueDate date, Balance number(32,6));

insert into VENDOR (VENDORNAME,INVOICENUMBER,INVOICEDUEDATE,BALANCE) values ('ABC',121,TO_TIMESTAMP('01-01-18','DD-MM-RR HH12:MI:SSXFF AM'),1000);

Insert into Vendor (VENDORNAME,INVOICENUMBER,INVOICEDUEDATE,BALANCE) values ('XYZ',1212121,to_timestamp('02-01-18','DD-MM-RR HH12:MI:SSXFF AM'),100000);

declare

cursor c1 is select * from Vendor;

begin

for i in c1

loop

if I.BALANCE < 1001 then

DBMS_OUTPUT.PUT_LINE('Vendor Name '||I.VENDORNAME||', Invoice Number '||I.INVOICENUMBER||', Invoice DueDate '||I.INVOICEDUEDATE||',BALANCE '||I. BALANCE);

else

dbms_output.put_line('Vendor Name '||i.VendorName||', Invoice Number '||i.InvoiceNumber||', Invoice DueDate '|| i.InvoiceDueDate||' Balance due is less than $1000');

end if;

end LOOP;

end;

output : SCRIPT OUTPUT

table VENDOR dropped.

table VENDOR created.

1 rows inserted.

1 rows inserted.

anonymous block completed

dbms output :

Vendor Name ABC, Invoice Number 121, Invoice DueDate 01-JAN-18,BALANCE 1000

Vendor Name XYZ, Invoice Number 1212121, Invoice DueDate 02-JAN-18 Balance due is less than $1000


Related Questions

Some experts believe that the growth in e-commerce will cause states and local govermnets to lose tax revenue, unless Internet transactions are subject to sales tax. What is one argument that supports this view, and one that opposes it

Answers

Answer:

The answer is below.

Explanation:

Increase in e-commerce sales or growth leads to higher quantity of sales that will generate sales-tax numbers that are easily noticeable and can be a good source of revenues for States and local government. Thus, as a result of potential income that e-commerce or internet is capable of generating, both state and local policy makers are working tirelessly, to ensure they maximize every means they can get to reap revenue from the Internet for their treasuries.

However, those not in favour, or opposition, believed that tax imposition of e-commerce or online sales, would negatively affect the growth or cause slow upward movement in the growth and opportunity of e- commerce, before the customers can generally embrace it fully, and see it as the new market hub.

being the server administrator how often will you conduct a server maintenance?

Answers

Weekly server checks

Nonetheless, a weekly check is essential. Another check you should do weekly or even every two weeks is your disk usage. Again, disk usage rarely suddenly changes so it's not something you need to check every day. However running out of disk space can mean that your server breaks down.

Why are chatbots a great tool for strategically using marketing automation and AI?

Answers

The reason that catbots a great tool for strategically using marketing automation and AI is option A: They can mitigate friction regarding availability.

What are the automation about?

With the help of CatBots, your leads and clients may communicate easily without a physical sales representative being there. Before starting the cat, these catbots collect name and email information. Just make sure your bot has a human-like voice.

Catbots can assist in automating marketing communications and offering customers prompt and accurate responses. By integrating conversational AI catbots into your company's marketing initiatives, you may increase conversions and move clients through the sales funnel more effortlessly.

Learn more about automation and AI from

https://brainly.com/question/27873801
#SPJ1

See options below

They can mitigate friction regarding availability.

They are the primary tool for streamlining cadence and content.

They are used for journey mapping.

They can create buyer personas.

5.9.5 Fibonacci

Y’all I’m struggling here do any of you have the code?

Answers

The Fibonacci program is an illustration of loops

What are loops?

Loops are program statements that are used to perform repetition

The main program

The program written in Python, where comments are used to explain each line is as follows:

#This gets the number of terms

nterms = int(input("Terms: "))

# This initializes the first two terms

n1, n2 = 0, 1

kount = 0

# This generates fibonacci sequence

while kount < nterms:

   print(n1)

   nth = n1 + n2

   # This update the values

   n1, n2 = n2, nth

   kount += 1

Read more about loops at:

https://brainly.com/question/14284157

Your computer freezes up on a regular basis. You have checked your hard drive and you have sufficient space. You have not installed any software that could cause disruption. You have recently added more RAM so you realize that you have enough memory and that isn’t causing the problem. Which of the following should you check next?

Answers

Check for any corrupted software that may have ruined the computer
what the other guy says was correct

LIST THE TOP 10 BOOKS FOR PROGRAMMERS

Answers

Answer:

Clean Code: By Robert C. Martin The Mythical Man-month: By Frederick Brooks . The Pragmatic Programmer: Your Journey to Mastery Code Complete (2 Edition): By Steve McConnell The Art of Computer ProgrammingProgramming Pearls Code: Charles Petzold Introduction to AlgorithmsRefactoring: Improving the Design of Existing Code Design Patterns: Elements of Reusable Object-Oriented Software  

Explanation:

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

i. Explain what Race Condition is and how it can be prevented.

Answers

Answer:

In layman terms, a race condition can be defined as, a condition in which two or more threads compete together to get certain shared resources. For example, if thread A is reading data from the linked list and another thread B is trying to delete the same data.

Explanation:

To prevent the race conditions from occurring, you can lock shared variables, so that only one thread at a time has access to the shared variable.

100 PTS! The first network was called:

A. the Internet
B. ARPANET
C. the network
D. networking

Answers

Answer:

B

Explanation:

.....................

Answer: B. ARPANET

Explanation:in full Advanced Research Projects Agency Network, experimental computer network that was the forerunner of the Internet.

While onsite at a customer location, it is determined the processor in the Processor and Heatsink Module (PHM) must be replaced. What are the steps to remove the processor from the PHM? Click and drag the steps into the correct sequence, then click Submit.

Answers

The steps to remove the processor from the PHM:
1. Power off the system and disconnect all cables.
2. Remove the system cover.
3. Remove the processor heatsink.
4. Remove the processor from the socket.

What is PHM?
A longitudinal actionable patient record is created by combining and managing patient data from various health information technology resources, analysing that data, and then taking the necessary steps to enhance clinical and financial outcomes. The PHM programme provides actionable insights for efficiency and patient care by combining clinical, financial, or operational data from many platforms. The PHM program's key components include care management including gap analysis, risk stratification infrastructure, a coordinated delivery system, and a carefully managed partnering network.

To learn more about PHM
https://brainly.com/question/29375394
#SPJ9

What are two examples of ways an electronic record may be distributed to others

Answers

Explanation:

Two ways an electronic record may be distributed are e-mail or printing and publishing to others.

How to use this program

Answers

Answer:

there is no problem

Explanation:

but i hope i can help one day

Please help out with this question ​

Please help out with this question

Answers

Using a programme that highlights the changes between the two portions, such as a version control tool or a plagiarism checker, is one technique to compare different sections of a work.

What is the plagiarism detection tool?

A plagiarism detector searches for similarities between your content and other texts using sophisticated database tools. Universities employ them to scan student assignments. Additionally, you can utilise paid plagiarism detectors to examine your own work before submission.

What do we call the computer programme that can identify plagiarism by examining the uniqueness of a piece of writing?

Software that detects plagiarism compares uploaded materials to other content databases to determine whether they are plagiarised. Checkers for plagiarism are used by writers and content producers to prevent unintentional

To know more about programme visit:-

https://brainly.com/question/30307771

#SPJ1

A UI text element must be added to ______.an empty background container game objecta prefaba slot game objecta tray objecta canvas

Answers

Answer:

canvas

Explanation:

The answer to this question is that A UI text element must be added to a canvas. The canvas is that area that all the unity items (UI) have to be inside.

We insert the Text UI element when we move to the hierarchy of the scene from create we move to UI and then to text.

After all these have been done, we will get a text element which have been added in the Canvas region.

HTML tag that makes a text field used by javascript statement

Answers

I don’t even know I don’t even know I don’t even know

which of the following is not a doctrinal type of command and control (c2) structure for multinational operations

Answers

Multinational operations are operations carried out by forces from two or more different countries, typically within the framework of a coalition or alliance.

What do multinational operations aim to accomplish?

It outlines joint doctrine for operations and training as well as offers military advice on how combatant commanders and other JFCs should exercise their authority.

What is a military that is multinational?

A multinational force is an operation that can be used for peacekeeping, offence, or defence. Several nations join together to carry out multinational activities. Among the multinational forces are: Allied Expeditionary Force Supreme Headquarters (1943-1945)

Multinational force: What is it?

An agreement between the Arab Republic of Egypt and the State of Israel led to the creation of the Multinational Force & Observers (MFO), a multinational peacekeeping force with its headquarters in Rome.

To know more about multinational operations visit;

https://brainly.com/question/16021629

#SPJ4

Multinational operations are actions taken by forces from two or more distinct nations, frequently under the auspices of an alliance or coalition.

What are the objectives of multinational operations?

It provides military advise on how combatant commanders and other JFCs should utilize their power, as well as joint doctrine for operations and training.

What does a multinational military entail?

An operation that may be employed for offense, defense, or peacekeeping is a multinational force. In order to conduct international operations, several nations band together. These international forces include: Supreme Headquarters of the Allied Expeditionary Force (1943-1945)

Multinational force: What is it?

An agreement between the Arab Republic of Egypt and the State of Israel led to the creation of the Multinational Force & Observers (MFO), a multinational peacekeeping force with its headquarters in Rome.

To know more about multinational operations visit;

brainly.com/question/16021629

#SPJ4

Q Which of the following is NOT a doctrinal type of command and control (C2) Structure for multinational operations?

Suppose that someone suggests the following way to confirm that the two of you are both in possession of the same secret key. You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (which should be the same as your key) and sends it back. You check and if what you receive is your original random string, you have verified that your partner has the same secret key, yet neither of you has ever transmitted the key. Is there a flaw in this scheme?

Answers

Answer:

yes, there is a small flaw. You can reconstruct your partner's key even if it is different from yours.

Explanation:

Suppose you have key a and your partner has key b, you want to check if a == b, but if it is not, your partner doesn't want to reveal his key otherwise he could have just sent it.

So you create a random bit string r. and send a⊕r to him. He sends you back a⊕r⊕b. If a==b the a⊕b would cancel each other out, and you would be left with r.

However, if you calculate a⊕r⊕b⊕r⊕a, you would always get b! In other words, you XOR the received value with r and XOR it with your a. Then you get b, whatever it is.

Which statement about the discipline of information systems is true?
A. It involves organizing and maintaining computer networks.
B. It involves connecting computer systems and users together.
C. It involves physical computer systems, network connections, and
circuit boards.
D. It involves all facets of how computers and computer systems
work

Answers

Answer:

C.

Personal computers, smartphones, databases, and networks

Answer:

IT'S B

Explanation:

TRUST ME I HAD TO LEARN THE HARD WAY!!

The measure of a game mechanic is simply how effective it is at drawing a player into your game or creating player immersion.

Question 6 options:

True


False

Answers

The statement "The measure of a game mechanic is simply how effective it is at drawing a player into your game or creating player immersion" is true.

What are the game mechanics?

The guidelines that control a video game's gameplay are known as play mechanics. The game's artificial intelligence (AI) and the activities that users can take within the game's environment are both controlled by the game's play mechanics.

Being able to move a variable amount of space based on a probability distribution produced by a pair of dice is an illustration of a mechanic frequently employed in board games.

Therefore, the statement is true.

To learn more about game mechanics, refer to the link:

https://brainly.com/question/29739190

#SPJ1

Which elements of text can be changed using automatic formatting? Check all that apply.
A) smart quotes
B) accidental usage of the Caps Lock key
C) fractions
D) the zoom percentage
E) the addition of special characters ​

Answers

A) smart quote and B) the zoom percentage and E) the addition of special characters

Answer:a, d, e

Explanation:

System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio

Answers

System testing is a crucial stage where the software design is implemented as a collection of program units.

What is Unit testing?

Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.

It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.

Read more about System testing here:

https://brainly.com/question/29511803

#SPJ1

What is the most efficient solution to keep personal and work emails separate, even if they are in a single email box

Answers

Separate your emails into different folders. adding filters to your email accounts is a smart idea because they will automatically sort your emails into the correct folder. Using a strategy like this will help you stay organized and make managing many email accounts much easier.

What is email ?

Email, or electronic mail, is a communication technique that sends messages via electronic devices across computer networks. The term "email" can apply to both the method of delivery and the specific messages that are sent and received.

Since Ray Tomlinson, a programmer, invented a mechanism to send messages between computers on the Advanced Research Projects Agency Network in the 1970s, email has existed in some form (ARPANET). With the introduction of email client software (like Outlook) and web browsers, which allow users to send and receive messages via web-based email clients, modern versions of email have been widely accessible to the general public.

To know more about Email, check out:

https://brainly.com/question/28802519

#SPJ1

Discuss a series of steps needed to generate value and useful insights from data?​

Answers

The four main steps of the data value chain are collection, publication, uptake, and impact. Identify, gather, process, analyse, release, disseminate, connect, motivate, influence, utilise, alter, and reuse are the twelve phases that are further divided into these four stages.

what is data value?

The material that makes up a record's space is known as a data value. For instance, a database may have a number that denotes the weight of a certain number in one of its fields, which is one of the database's multiple data fields. Data is a priceless corporate asset. Enterprise data isn't like real company assets with a measurable market worth, however how valuable it is. On a budget, line items like real estate, technological equipment, and office furniture are all clearly visible. Even other intangible resources, like people and intellectual property, have set norms and procedures for valuing.

Know more motivate Visit:

https://brainly.com/question/972761

#SPJ1


What are the two basic functions (methods) used in classical encryption algorithms?

Answers

Substitution and transposition

substitution and transport

What does it mean "Be Proactive"?

Answers

Answer:controlling a situation by making things happen or by preparing for possible future problems

Explanation:

Make things happen instead of waiting for them

Help asap PLEASE IM STUCK

Help asap PLEASE IM STUCK
Help asap PLEASE IM STUCK
Help asap PLEASE IM STUCK
Help asap PLEASE IM STUCK

Answers

To sort the filtered data first alphabetically by the values in the Model column and then by icon in the Cmb MPG Icon column so the Signal Meter With Four Filled Bars icon appears at the top, you can follow these steps:

What are the steps!

Select the filtered data.

Click on the "Data" tab in the ribbon.

Click on the "Sort" button in the "Sort & Filter" group.

In the "Sort" dialog box, select "Model" from the "Column" dropdown list and select "A to Z" from the "Order" dropdown list.

Click on the "Add Level" button.

In the "Sort" dialog box, select "Cmb MPG Icon" from the "Column" dropdown list and select "Custom List" from the "Order" dropdown list.

In the "Custom Lists" dialog box, select "Signal Meter With Four Filled Bars" from the list and click on the "Add" button.

Click on the "OK" button in the "Custom Lists" dialog box.

Select "Signal Meter With Four Filled Bars" from the "Order" dropdown list.

Click on the "OK" button in the "Sort" dialog box.

To add subtotals for each change in Model to calculate the average for the Air Pollution Score, City MPG, Hwy MPG, and Cmb MPG, you can follow these steps:

Go to the top of the My Car Data worksheet.

Select the data range.

Click on the "Data" tab in the ribbon.

Click on the "Subtotal" button in the "Outline" group.

In the "Subtotal" dialog box, select "Model" from the "At each change in" dropdown list.

Select the checkboxes for "Air Pollution Score", "City MPG", "Hwy MPG", and "Cmb MPG".

Select "Average" from the "Use function" dropdown list..

Click on the "OK" button.

To collapse the data to show just the total rows, you can click on the "2" button above the row numbers on the left-hand side of the worksheet.

To refresh the PivotTable data on the MPG PivotTable worksheet, you can follow these steps:

Click anywhere in the PivotTable.

Click on the "Analyze" tab in the ribbon.

Click on the "Refresh" button in the "Data" group.

To apply the Pivot Style Medium 1 Quick Style to the PivotTable and display a slicer for the SmartWay field and show only data where the SmartWay value is Elite, you can follow these steps:

Click anywhere in the PivotTable.

Click on the "Design" tab in the ribbon.

Click on the "PivotTable Styles" button in the "PivotTable Styles" group.

Select "Medium 1" from the list of Quick Styles.

Click on the "Insert Slicer" button in the "Filter" group.

Select "SmartWay" from the list of fields.

Select "Elite" from the list of values.

Click on the "OK" button.

Learn more about data on;

https://brainly.com/question/26711803

#SPJ1

Draw a state process model with two (2) suspend states and fully discuss the
transition of processes from one state to the next by OS

Answers

Answer:

asan yong pic

Explanation:

pic po asan

John Doe, the Netcare Hospital's IT director, is in charge of network management. He has asked
for your assistance in developing a network solution that will meet the needs of the hospital. The
hospital is expanding, and the management of the hospital has made funds available for network
upgrades. The medical staff would like to be able to access medical systems from any of the
patient rooms using laptop computers. Access to patient medical records, x-rays, prescriptions,
and recent patient information should be available to doctors and nurses. John purchased new
servers for the data center and installed them. The wireless LAN (WLAN) has about 30 laptops,
with another 15 due in six months. The servers must be highly available. The hospital's patient
rooms are located on floors 6 through 10. Doctors should be able to roam and connect to the
network from any floor.
According to a radio-frequency report, a single access point located in each communication closet
can reach all of the rooms on each floor. The current network is comprised of ten segments that
connect to a single router that also serves the Internet. Routing Information Protocol Version 1
is used by the router (RIPv1). The new back-end servers are housed in the same segment as those
on floor 1. John mentions that users have complained about slow server access, he would like to see a proposal for upgrading the network with faster switches and providing faster access to the
servers. The proposal should also include secure WLAN access on floors 6–10. Include an IP
addressing scheme that reduces the hospital's reliance on Class C networks. He wishes to reduce
the number of Internet service provider-leased networks (ISP).


Draw a logical diagram of the existing network. (8)

Answers

Because the servers in the back end are situated within the identical segment as those found on the first floor, user response times have drastically declined.

How to solve

At present, the network structure is made up of ten distinguishable segments that are all unified through one router.

This router utilizes Routing Information Protocol Version 1 (RIPv1) for the regulation of its routing dynamics.

There is a Wireless Local Area Network (WLAN) spanning across thirty laptops with an estimated fifteen more to be joined onto it in half a year's time. In each communications closet, there is a separate access point extending its reach over all six to ten stories.

Read more about network management here:

https://brainly.com/question/5860806
#SPJ1

Find the following 1+1

Answers

Note that 1 + 1 is = 2. This is called addition in Math.

Why is addition important?

Adding numbers is a fundamental mathematical idea that is required for even the most basic difficulties in our daily lives. One of the most typical uses is when we work with money, such as adding up invoices and receipts.

Many different types of issues are represented and solved using addition and subtraction. Addition and subtraction may be used to depict a wide range of situations. It is critical to learn how to detect these situations and depict them symbolically, building on whole-number counting.

Learn more about addition:
https://brainly.com/question/29560851
#SPJ1

2. Write a C program that generates following outputs. Each of the

outputs are nothing but 2-dimensional arrays, where ‘*’ represents

any random number. For all the problems below, you must use for

loops to initialize, insert and print the array elements as and where

needed. Hard-coded initialization/printing of arrays will receive a 0

grade. (5 + 5 + 5 = 15 Points)

i)

* 0 0 0

* * 0 0

* * * 0

* * * *

ii)

* * * *

0 * * *

0 0 * *

0 0 0 *

iii)

* 0 0 0

0 * 0 0

0 0 * 0

0 0 0 *

2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional

Answers

Answer:

#include <stdio.h>

int main(void)

{

int arr1[4][4];

int a;

printf("Enter a number:\n");

scanf("%d", &a);

for (int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 if(j<=i)

 {

  arr1[i][j]=a;

 }

 else

 {

  arr1[i][j]=0;

 }

}

}

for(int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 printf("%d", arr1[i][j]);

}

printf("\n");

}

printf("\n");

int arr2[4][4];

int b;

printf("Enter a number:\n");

scanf("%d", &b);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j>=i)

  {

   arr1[i][j]=b;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

int arr3[4][4];

int c;

printf("Enter a number:\n");

scanf("%d", &c);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j!=i)

  {

   arr1[i][j]=c;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

return 0;

}

Explanation:

arr1[][] is for i

arr2[][] is for ii

arr3[][] is for iii

2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional
2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional
Other Questions
Which example of it lifelong learning is most likely to lead to a promotion? a. a supervisor learns about personal finance. b. a developer learns a new programming language. c. a database manager learns a foreign language. d. a technician learns music history. Let be a matrix. What must a and b be if we define the linear transformation by T: Ra --> Rb as T(x)=Ax a= b= A fringe pattern is formed on an observation screen in a double slit experiment by light of a single wavelength. What is the path length difference between the light travelling from each slit, for the dark fringe right next to the bright central maximum? a. 1/4 wavelength b. 1/2 wavelength c. 1 wavelength d. 1 1/2 wavelengths e. 2 wavelengths Why did Walter Mitty imagine himself facing a firing squad? Evaluate what he was sayingabout his life with such a statement. calculate the distance between each line and the point. round your answer to one decimal place.A) y = 4x - 2, (-3, 3)B) y = -x + 5, (-1, -2)How do I do these?? The answer for A) is about 4.1 units (but I got 5.8 ???) and for B) its about 5.7 units. One cubic foot of a crushed mineral weighs 160 pounds. How many pounds of the crushed mineral can a container with the dimensions shown hold?The container can hold__pounds of the crushed mineral. the market for land is competitive and in equilibrium at the rental rate of $500 per acre. if the supply of land is perfectly inelastic at 1000 acres, the total economic rent on this land is equal to: Problem 3: Consider the following simple model for the random evolution of a stock price for a certain stock (lets call it stock A). Each day, the stock price increases by $1 with probability r = 0.17, moves down $1 with probability p = 0.15, or remains the same with probability 9 = 1-p-r. Today (day zero), the stock price is $13. Stock price of $0 is an absorbing state; once the stock price hits zero, it remains there forever (out of business etc.), Consider the following trading strategy: we hold on to the stock until its price becomes $35, at which point we sell. (a) Draw a transition diagram of the process. You can draw this for the first three and last three states, and leave ... in between. Is this stochastic process irreducible? Explain your answer. (10 Points) Your firm is planning to invest in an automated packaging plant. Harburtin Industries is an all-equity firm that specializes in this business. Suppose Harburtin's equity beta is 0.85, therisk-free rate is 4.0 %, and the market risk premium is 5.0 %. If your firm's project is all-equity financed, estimate its cost of capital. Problem # 21The sum of two numbers is 27. Thedifference of the same twonumbers is 3. What are the twonumbers? To write professional email messages, A) avoid subject lines.B) pay attention to quality of writing.C) soften the tone with lots of humor.D) avoid using a greeting in the first line.E) keep the message informal and casual by ignoring grammar conventions. Why should African Americans be denied the right to vote according to Congressman Boyer?Document for a pair of distantly related species, why might it be problematic to estimate sequence divergence simply by counting up the number of observed nucleotide differences? eve100 3= 1/4(b - 8) use the Distributive property 7^2 + 4^3 2^5Lol please help Alicia bought two slices of pizza and a bottle of juice for $4.95. The juice was $1.65. How much is one slice of pizza? If f(x) = x+1 and g(x) = x2 find (fg)(x)a. x-4x+5 go to station 5b. x-3 go to station 9c. x-1 go to station 7d. x-2x+5 go to station 3e. x-5 go to station 2 The sum of 4 consecutive integers is 26. What is the least of 4 integers? when a client experiences consistent hypotension, an increase in which hormone would likely help raise the blood pressure? -5(x+1)= - 3(2x-2)x= 11X=-3x=3x= -11 please help quick!!!