Which one of the following digital data type is used for managing data for long-term storage and maintain records?

Fragile Data

Archival Data

Metadata

Residual Data

Answers

Answer 1

The digital data type that is used for managing data for long-term storage and maintain records is Archival Data.

Archival data refers to digital data that is stored for long-term retention purposes for historical or reference purposes, such as regulatory compliance and legal hold. It is commonly used by organizations to preserve data that has historical, legal, or business significance, such as financial transactions, legal documents, emails, or medical records.

Archival data is a digital data type that is used for managing data for long-term storage and to maintain records. It's a form of digital storage that has been designed to protect data for the long haul. The digital data in this form is stored in such a way that it can be accessed and used for a variety of purposes, including research, preservation, or just to be kept as a record of a particular event.

To know more about digital data visit:

https://brainly.com/question/33635874

#SPJ11


Related Questions

Please answer question using java code, and follow the coding standards listed below the question to solve the problem. Please use comments inside the code to explain what each part is used for. Please make it as simple as possible and easy to understand as I am struggling with this question.
aa) Write a class Card, described below.
Description of Card class:
· Instance variables:
o a string suit to hold the suit of a card in a deck of playing cards
o an integer face to hold the face of a card in a deck of playing cards
· Function members:
o an explicit constructor which initializes the object to a Card with given suit
and face.
receives: a suit and a face
o an accessor(get operation) GetSuit( ) returns the card’s suit
o second accessor(get operation) GetFace( ) returns the card’s face
o a mutator(set operation) SetCard( ) which sets the face and suit values to the
two instance variables
o a comparison function isLessThan( )
§ receives another Card object C
§ returns: true if and only if card C’s face value is greater, otherwise
false
b) test all of the member functions inside main( ) function.
Coding Standards
1. Objective: Make code correct, readable, understandable.
2. Good Programming Practices
2.1. Modular approach. (e.g. use separate functions, rather than one long main
program.)
2.2. DO use global constants and types; do NOT use global variables. (Variables
used in the main function should be passed as function parameters; variables
used only in a particular function should be declared locally in the function.)
2.3. For parameters which should not be changed by a function, use either value or
constant reference parameters. Use reference parameters for parameters which
will be changed by the function.
2.4. Use constants for unchanging values specific to the application.
2.5. Avoid clever tricks – make code straightforward and easy to follow.
2.6. Check for preconditions, which must be true in order for a function to perform
correctly. (Usually these concern incoming parameters.)
3. Documentation standards
3.1. Header comment for each file:
/* Author:
Date:
Purpose:
*/
3.2. Header comment for each function:
/* Brief statement of Purpose:
Preconditions:
Postconditions:
*/
(Postconditions may indicate: value returned, action accomplished, and/or
changes to parameters,
as well as error handling – e.g. in case precondition does not hold.)
3.3. Use in-line comments sparingly, e.g. in order to clarify a section of code. (Too
many commented sections may indicate that separate functions should have been
used.)
3.4. Identifier names
- spelled out and meaningful
- easy to read (e.g. use upper and lower case to separate words
3.5. Indent to show the logic of the code (e.g. inside of blocks { }, if statements,
loops)
3.6. Put braces { } on separate lines, line up closing brace with opening brace. For
long blocks of code within braces, comment the closing brace.
3.7. Break long lines of code, so they can be read on screen, and indent the
continuing line.
3.8. Align identifiers in declarations.
3.9. Use white space for readability (e.g. blank lines to separate sections of code,
blanks before and after operators).
3.10. Make output readable (e.g. label output, arrange in readable format).

Answers

To solve the given problem, I will create a Java class called "Card" with instance variables for suit and face, along with the required constructor and member functions such as GetSuit(), GetFace(), SetCard(), and isLessThan(). Then, I will test all of these member functions inside the main() function.

In Step a, we are asked to create a class called "Card" in Java. This class will have two instance variables: a string variable named "suit" to hold the suit of a card in a deck of playing cards, and an integer variable named "face" to hold the face of a card in a deck of playing cards.

The Card class should have an explicit constructor that takes a suit and a face as parameters and initializes the object accordingly. It should also have accessor methods (GetSuit() and GetFace()) to retrieve the suit and face values, a mutator method (SetCard()) to set the suit and face values, and a comparison method (isLessThan()) that compares the face value of the current card with another card object.

In Step b, we are instructed to test all of the member functions of the Card class inside the main() function. This includes creating Card objects, setting their values using SetCard(), retrieving their suit and face values using the accessor methods, and comparing two Card objects using the isLessThan() method.

By following the given coding standards, such as using separate functions, proper documentation, meaningful identifier names, modular approach, and readable formatting, we can create a well-structured and understandable Java code to solve the problem.

Learn more about Java class

brainly.com/question/14615266

#SPJ11

Data breaches and identity theft are on the rise, and the cause is often comprised of passwords. After stealing credentials, cybercriminals can use passwords to start disinformation campaigns against companies, use people's payment information for purchases, and spy on users through WiFi-connected security cameras. Thus, suggestions and recommendation usually provided to make your password as mathematically complex as possible, with consists of from one to four symbols chosen from the 26 letters in the alphabet and the ten digits, with repetition allowed. Find the number of ways that the passwords can be arranged. =1679616 (ii) Determine the probability that at random, the passwords contain: (A) repeated symbols. (B) exactly two letters and exactly two digits.

Answers

The given for question is as follows:To find the number of ways that the passwords can be arranged, we need to find the number of permutations of the given string.

Let the length of the password be 4. Then,

Number of permutations = (number of ways to select the first character)(number of ways to select the second character)(number of ways to select the third character)(number of ways to select the fourth character)

= 36 × 36 × 36 × 36= (6 × 6)^4

= 6^8

= 1679616 (ii)

To determine the probability that at random, the passwords contain: (A) repeated symbols. We will find the number of passwords that do not contain any repeated symbols and divide it by the total number of possible passwords. We can select the four characters without repetition in (36 × 35 × 34 × 33) ways. So, the number of passwords that do not contain any repeated symbols is 36 × 35 × 34 × 33. The probability that the passwords contain no repeated symbols.

To know more about permutations  visit:

https://brainly.com/question/15466282

#SPJ11

I would like you to create a linkedlist from a given input file, I want to learn how to insert, delete, and reverse and write the following to an output file based on data from an input file. Input file: - The first line will be a list of integer numbers separated by a comma. There will not be any space in between. This will never be empty or erroneous characters. - The next few line will have some instructions (can be of ANY order): 1. insert at top tells you to insert some number at top position 2. insert at bottom tells you to insert some number at bottom position 3. insert at position N tells you to insert some number at N 'th position. Remember, we start counting from 0 . In case of position N is not present, you do nothing. 4. reverse tells you to reverse the array 5. print middle tells you to print the middle element. In case of two middle elements (even number of total elements), print both separated by a comma 6. keep unique tells you to keep the first unique presence of an element 7. delete at position N tells you to delete the element at position N. In case of the position N is not present, you do nothing. Output file: Except for the print middle, you always print the LinkedList after each operation in a separate line. ** Input and output files should be read from argv[1] and argv[2]. Hardcoding is strictly prohibited. For example, I would recommend using the following for the header for the main function int main(int argc, char* argv[] ) \{ Please remember chegg instructor that, //argv[1] is the input file filled with data, argv[2] is the prefix for the output file name, so when you are reading input file you can do fin.open(argv[1]) and when you are ready to write to output file, you can do fout.open(argv[2].txt) Example of an inputl.txt file: Assume you are given "ans 1 " for argv[2], Then the output file for the above inputl.txt would look like this: ∗∗ You are allowed to use vector only for reading from the file purpose not for linked list itself, do not use arrays or arraylist or vectors to create linkedlist or substitute in place of a linkedlist.

Answers

Follow the provided instructions to read the input file, construct a linked list, and execute the required operations, ensuring dynamic file handling and adhering to the specified restrictions.

How can I create a linked list from an input file and perform operations like insertion, deletion, and reversal?

To create a linked list based on the input file and perform operations like insertion, deletion, and reversal, you can follow the provided instructions. The input file consists of integer numbers separated by commas on the first line, followed by instructions on subsequent lines.

The instructions include inserting at the top, inserting at the bottom, inserting at a specific position, reversing the list, printing the middle element(s), keeping the first unique element, and deleting an element at a specific position.

You need to read the input file from `argv[1]` and the output file prefix from `argv[2]` to ensure dynamic file handling. Use file stream objects like `fin` and `fout` to read from and write to the input and output files respectively.

Implement a linked list data structure in C++, using nodes and pointers. Read the integers from the input file and construct the linked list accordingly. Then, perform the required operations based on the instructions provided in the input file. After each operation, write the resulting linked list to the output file with the corresponding prefix.

Ensure that you adhere to the instructions provided, such as using a vector only for reading from the file and not using arrays or other data structures as substitutes for the linked list.

Learn more about input file

brainly.com/question/32896128

#SPJ11

most ____ allow you to view and manipulate the underlying html code.

Answers

Most web development tools and text editors allow users to view and manipulate the underlying HTML code of a webpage.

The ability to view and manipulate HTML code is essential for web development and customization. Web development tools such as integrated development environments (IDEs) like Visual Studio Code, Sublime Text, and Atom provide features specifically designed for working with HTML. These tools offer syntax highlighting, code completion, and code validation, making it easier to write and edit HTML code. Additionally, they often include a preview option that allows developers to see the rendered webpage alongside the corresponding HTML code.

Text editors, like Notepad++, TextWrangler, and Brackets, also enable users to view and modify HTML code. While they may not have the advanced features of dedicated web development tools, text editors provide a lightweight and versatile option for working with HTML. They offer a clean and distraction-free environment for editing code and can be customized with plugins and extensions to enhance functionality. By opening an HTML file in a text editor, users can directly access the raw HTML code, make changes, and save the file to see the updated webpage.

Learn more about HTML Code here:

https://brainly.com/question/33304573

#SPJ11

1. Do 32-bit signed and unsigned integers represent the same total number of values? Yes or No, and why?
2. Linear search can be faster than hashtable, true or false, and why?

Answers

1. No, 32-bit signed and unsigned integers do not represent the same total number of values.

Signed integers use one bit to represent the sign (positive or negative) of the number, while the remaining bits represent the magnitude. In a 32-bit signed integer, one bit is used for the sign, leaving 31 bits for the magnitude. This means that a 32-bit signed integer can represent values ranging from -2^31 to 2^31 - 1, inclusive.

On the other hand, unsigned integers use all 32 bits to represent the magnitude of the number. Since there is no sign bit, all bits contribute to the value. Therefore, a 32-bit unsigned integer can represent values ranging from 0 to 2^32 - 1.

In summary, the range of values that can be represented by a 32-bit signed integer is asymmetric, with a larger negative range compared to the positive range, while a 32-bit unsigned integer has a symmetric range of non-negative values.

Learn more about 32-bit

brainly.com/question/31054457

#APJ11

Internet programing Class:
Describe the main steps in the domain name registration process.

Answers

The domain name registration process has the following main steps: Step 1: Choose a domain registrar. Step 2: Search for a domain name. Step 3: Register the domain name. Step 4: Verify your registration.

The domain name registration process has the following main steps: Step 1: Choose a domain registrar: When registering a domain name, you should choose a domain registrar. The domain registrar is an organization that provides domain name registration services. The registrar is responsible for managing the domain name registration process, charging fees, and handling registration documents. The most popular domain registrars include GoDaddy, Namecheap, and Bluehost.

Step 2: Search for a domain name: After you have chosen a domain registrar, you should search for a domain name that meets your needs. If the domain name you want is unavailable, you can choose another one. You can also use domain name generator tools to help you find a suitable domain name.

Step 3: Register the domain name: Once you have found a domain name that is available, you can register it. You will need to provide your personal information, such as your name, address, phone number, and email address, and you will also need to choose a payment method. The registration fee varies depending on the registrar and the domain name extension.

Step 4: Verify your registration: After registering your domain name, you will receive a verification email from the registrar. You will need to follow the instructions in the email to verify your registration. After verification, you will receive a confirmation email from the registrar. The domain name registration process is now complete.

Read more about Domain Names at https://brainly.com/question/32402865

#SPJ11

Programming Exercise #5_2 1. Create a new text file named "ex5_1.cpp" and enter the following lines as comments. Be sure to replace "YourFullName" with your real full name. / * * Filename: ex5_2.cpp * Programmer: YourFullName ⋆/ 8. Next to the above lines, enter the following code which will display a digit (0-6) stored in the variable " w ". The value stored in " w " is generated by the "tm_wday" of the "tm" struct of the "ctime" header to indicate today's "day of week". If the value of "w" is 0, it means "Sunday". If 2, it means "Monday", and so on. \#include #include using namespace std; int main() \{ time tt=time(0); tm ⋆
dt
= localtime (\&t); int w=dt−>tm,wday; 1/0-Sun, 1-Mon, 2-Tue, .., 6-Sat \} 9. Use the above given as basis, create a struct named "node" containing three components: (1) one variable named "index" of int type, (2) one variable named "saying" of string type to store one "fortune-cookie saying", and (3) a pointer named "next" of node type. [Hint: review the "real-world sample" section] 10. Create a function named "addnode()" that takes two parameters, one int and one string, to pass the value of "index" and "saying" to the an anonymous instance of the "node" struct. Then, set the "next" pointer to point to the "tail" node. 181 Data Structure and Algorithm - Penn P. Wu, PhD. (Spring 2022 version) 11. Create a function named "findSaying0" that takes one parameter, an int, to pass the value returned by " w " and then use it to search for matching index. Once fond, display the associated saying. 12. In the "main()" function, call the "addnode()" function by passing indexs and sayings as specified below to build a singly linked list using the "node" struct. 13. In the "main()" function, call the "findSaying0" by passing the value stored in " w " to obtain the correct "fortune cookie tips". For example, if the value of " w " is 1 (which means today is Monday), then the output is "1 Believe in yourself and others will too." Make sure the output looks similar to the following. C: \ test\ex5_2.exe 2 Courtesy begins in the home. 2. Capture a screen shot(s) similar to the above one(s) and paste it/them to the Word document (ex05.odc).

Answers

The given exercise involves creating a program in C++ that generates fortune cookie sayings based on the day of the week. Here's an explanation of the steps involved:

Create a new text file named "ex5_1.cpp" and add the required comments including your full name.

Include the necessary headers, such as <iostream> and <ctime>, and use the std namespace for convenience.

Implement the main() function.

Use the time() function to get the current time and store it in the variable tt.

Declare a pointer to a tm struct named dt and assign it the value returned by localtime(&t).

Declare an integer variable w and assign it the value of dt->tm_wday, which represents the day of the week (0-6, where 0 is Sunday).

Create a struct named "node" with three components: an int variable named index, a string variable named saying, and a pointer named next of type node.

Implement the addnode() function that takes an int and a string as parameters, creates an instance of the node struct, sets its index and saying values, and updates the next pointer to point to the tail node.

Implement the findSaying0() function that takes an int parameter, searches for a matching index in the linked list, and displays the associated saying.

In the main() function, call addnode() multiple times to build a singly linked list with index-saying pairs.

Finally, call findSaying0(w) in the main() function, passing the value of w (day of the week) to obtain the corresponding fortune cookie saying.

To capture the program's output, you can run it in a console or terminal and redirect the output to a text file using the command line.

variable https://brainly.com/question/17028904

#SPJ11

Java
Write a program that declares an array of numbers. The array should have the following numbers in it 7,8,9,10,11. Then make a for loop that looks like this for(int i=0; i < 10; i++). Iterate through the array of numbers and print out each number with println(). If you do this properly you should get an error when your program runs. You will generate an array index out of bounds exception. You need to add exception handling to your program so that you can catch the index out of bounds exception and a normal exception. When you catch the exception just print you caught it. You also need to have a finally section in your try/catch block.

Answers

Here is the Java program that declares an array of numbers and catches the index out-of-bounds exception and a normal exception:```
public class Main {
  public static void main(String[] args) {
     int[] numbers = {7, 8, 9, 10, 11};

     try {
        for (int i = 0; i < 10; i++) {
           System.out.println(numbers[i]);
        }
     } catch (ArrayIndexOutOfBoundsException e) {
        System. out.println("Caught ArrayIndexOutOfBoundsException: " + e.getMessage());
     } catch (Exception e) {
        System. out.println("Caught Exception: " + e.getMessage());
     } finally {
        System. out.println("Inside finally block");
     }
  }
}
```The output of this program would be:```
7
8
9
10
11
Caught ArrayIndexOutOfBoundsException: 5
Inside finally block
``` Here, we declared an array of numbers and initialized it with 7, 8, 9, 10, 11. Then, we created a for loop that iterates through the array of numbers and prints out each number with println(). However, this would cause an array index out-of-bounds exception as we are trying to access an element outside the bounds of the array.

Therefore, we added exception handling to the program to catch this exception as well as a normal exception.

To know more about Java programs visit :

https://brainly.com/question/2266606

#SPJ11

Using the set() constructor create a set from an existing collection object, such as a list: 2, 5, 19, 458, 6345,88777. y numbers_list =[2,5,19,458,6345,8877] print("Converting list into set:", set(numbers_list)) Converting list into set: {2,5,6345,458,8877,19} 3. Using the tuple() constructor create a tuple from an existing collection object, such as a list: 561 , 1345,1729,2465. numbers_tuple =(561,1345,1729,2465,, print("Converting tuple into set: ", set(numbers_tuple)) Converting tuple into set: {1345,561,2465,1729} 0. Using the Python collection (array), Tuple, create a Tuple ("packing") with the following elements, nd then unpack the tuple and print: Tesla, Mercedes-Benz, Jeep. # create tuples with cars name # name and store in a list data =[(1, 'Telsa' ),(2, 'Mercedes-Benz' ),(3, 'Jeep' ) print( data) [(1, 'Telsa'), (2,' 'Mercedes-Benz'), (3, 'Jeep')]

Answers

To create a set from an existing collection object, such as a list, you can use the `set()` constructor. Here's an example:

```

numbers_list = [2, 5, 19, 458, 6345, 8877]

set_numbers = set(numbers_list)

print("Converting list into set:", set_numbers)

```

Output:

```

Converting list into set: {2, 5, 19, 458, 6345, 8877}

```

As you can see, the `set()` constructor takes the list `numbers_list` and converts it into a set called `set_numbers`. The output shows the elements of the set in curly braces.

Similarly, to create a tuple from an existing collection object, such as a list, you can use the `tuple()` constructor. Here's an example:

```

numbers_list = [561, 1345, 1729, 2465]

tuple_numbers = tuple(numbers_list)

print("Converting list into tuple:", tuple_numbers)

```

Output:

```

Converting list into tuple: (561, 1345, 1729, 2465)

```

The `tuple()` constructor takes the list `numbers_list` and converts it into a tuple called `tuple_numbers`. The output shows the elements of the tuple enclosed in parentheses.

Lastly, to create a tuple using the "packing" technique, you can define a tuple with multiple elements separated by commas. Here's an example:

```

car_tuple = ("Tesla", "Mercedes-Benz", "Jeep")

print("Tuple with cars:", car_tuple)

```

Output:

```

Tuple with cars: ("Tesla", "Mercedes-Benz", "Jeep")

```

In this example, the tuple `car_tuple` is created with the elements "Tesla", "Mercedes-Benz", and "Jeep". The output shows the elements enclosed in parentheses.

To unpack the tuple and print its elements separately, you can use multiple variables to capture each element of the tuple. Here's an example:

```

car_tuple = ("Tesla", "Mercedes-Benz", "Jeep")

car1, car2, car3 = car_tuple

print("Unpacked tuple:")

print("Car 1:", car1)

print("Car 2:", car2)

print("Car 3:", car3)

```

Output:

```

Unpacked tuple:

Car 1: Tesla

Car 2: Mercedes-Benz

Car 3: Jeep

```

In this example, the tuple `car_tuple` is unpacked into three variables: `car1`, `car2`, and `car3`. Each variable captures one element of the tuple, which is then printed separately.

Learn more about set() constructor: https://brainly.com/question/14933221

#SPJ11

Which of the following command in Linux is used best condition?

Answers

The command in Linux that is used for conditional execution is the "if" command.

The "if" command allows you to perform different actions based on the outcome of a condition. It is commonly used in shell scripting to make decisions and control the flow of the program. To use the "if" command, you first specify the condition you want to check. This can be any valid expression that evaluates to either true or false. For example, you can check if a file exists, if a variable has a certain value, or if a command succeeds or fails.

After specifying the condition, you use the "then" keyword to indicate the action to be performed if the condition is true. This can be a single command or a block of commands enclosed in curly braces. If the condition is false, the commands following the "then" block are skipped. The "if" command can also be extended with additional keywords like "elif" (short for "else if") and "else" to handle multiple conditions. This allows you to create more complex decision-making structures in your scripts.

Learn more about "if" command: https://brainly.com/question/27839142

#SPJ11

Create a user-defined function called my_fact 2 to calculate the factorial of any number. Assume scalar input. You should use while loop and if statement. Test your function in the command window. You should test three input cases including a positive integer, a negative integer and zero. Your factorial function should return below.

Answers

The function my_fact2 calculates the factorial of a given number using a while loop and if statement. It checks for negative integers and returns None. Test cases are provided to validate the function's behavior.

Create a user-defined function called my_fact 2 to calculate the factorial of any number. Assume scalar input. You should use a while loop and if statement.

Test your function in the command window. You should test three input cases, including a positive integer, a negative integer, and zero. Your factorial function should return the following:

The factorial of a number is the product of all the integers from 1 to that number. For example, the factorial of 4 is 4 × 3 × 2 × 1 = 24. Below is the implementation of the function `my_fact2` to calculate the factorial of a given number using a while loop and if statement:def my_fact2(n):

  # check for negative integers
   if n < 0:
       return None
   # initialization of variables
   fact = 1
   i = 1
   # while loop to calculate factorial
   while i <= n:
       fact = fact * i
       i = i + 1
   return fact

The function `my_fact2` checks for negative integers. If the input integer is negative, it returns None. Otherwise, it initializes the variables `fact` and `i` to 1 and starts a while loop to calculate the factorial of the given input integer.

The function `my_fact2` should be tested with three input cases, including a positive integer, a negative integer, and zero, as follows:print(my_fact2(5))  # output: 120
print(my_fact2(-5))  # output: None
print(my_fact2(0))  # output: 1

Learn more about while loop: brainly.com/question/26568485

#SPJ11

Choose the correct description of String operator % from the following choices: Floating-point real number Signed decimal integer String set

Answers

String operator % is used for string formatting. It returns a string that is a combination of a format string and other arguments passed as a tuple.

The format string contains one or more format codes that specify how to format the values of other arguments. The main answer is: String set.The  operator % is used for string formatting. It returns a string that is a combination of a format string and other arguments passed as a tuple. The format string contains one or more format codes that specify how to format the values of other arguments.

The string format code is preceded by a percent sign (%). The format code is then followed by a conversion code that specifies the type of the value to be formatted. The conversion code is a single character that is used to specify a data type such as a string, an integer, or a floating-point number. Therefore, the correct description of String operator % is String set.

To know more about String operato visit:

https://brainly.com/question/32479473

#SPJ11

Use the given information to find the number of degrees of freedom, the critical values χ2L and χ2R, and the confidence interval estimate of σ. It is reasonable to assume that a simple random sample has been selected from a population with a normal distribution. Nicotine in menthol cigarettes 90% confidence; n=26, s=0.27 mg. df= (Type a whole number.) χ2L= (Round to three decimal places as needed.)

Answers

The number of degrees of freedom is df = n - 1 = 26 - 1 = 25. The critical values χ2L and χ2R depend on the confidence level desired and the degrees of freedom. Since a 90% confidence interval is required, we need to find the critical values corresponding to α = 0.1 (10% significance level) on both sides of the chi-square distribution with 25 degrees of freedom. The critical values χ2L and χ2R are found using a chi-square table or a statistical software.

What are the critical values χ2L and χ2R for a 90% confidence interval with 25 degrees of freedom?

To find the critical values, we can use a chi-square table or a statistical software. From the chi-square table, the critical values for a 90% confidence interval with 25 degrees of freedom are χ2L = 12.401 and χ2R = 38.885 (rounded to three decimal places).

Learn more about confidence

brainly.com/question/29048041

#SPJ11

That Takes As Input A String Will Last Names Of Students Followed By Grade Separated By Blank Space. The Function Should Print Names Of Students Who Got Grade Above 90. Drop("Mike 67 Rachel 95 Rolan 87 Hogward 79 Katie 100") Student Passed: Rachel Student Passed: Katie
PROGRAM A PHYTHON function "drop" that takes as input a string will last names of students followed by grade separated by blank space. The function should print names of students who got grade above 90.
drop("Mike 67 Rachel 95 Rolan 87 Hogward 79 Katie 100")
Student passed: Rachel
Student passed: Katie

Answers

Here is the implementation of the function "drop" that takes a string as input which contains last names of students followed by their grades separated by blank space and prints the names of students who got a grade above 90.

The function "drop" takes a string as input which contains last names of students followed by their grades separated by blank space. It first splits the string into a list of strings where each string contains the name of a student followed by their grade.

Then it iterates over the list and extracts the grade of each student using the "split" method which splits the string into two parts based on the blank space. The first part is the name of the student and the second part is their grade.The extracted grade is then converted to an integer using the "int" method so that it can be compared with 90. If the grade is greater than 90, the name of the student is printed with a message "Student passed:".

To know more about drop visit:

https://brainly.com/question/31157772

#SPJ11

Question 1: A school at your city asked you to create an HTML document that
allows the users to enter his personal information. Write an HTML markup that
produces the webpage as shown below. Use an appropriate CSS for the design.
User Input Form Personal Information Name: Password Gender: Male Female Age: \&1 year old Languages Java C/C+CH C
Instructio SEND CLEAR

Answers

The provided HTML markup creates a user input form with fields for personal information, including name, password, gender, age, and language preferences. It also includes CSS styling for form layout and buttons for submitting and clearing the form.

Here is the HTML markup that will produce the webpage as shown below:

HTML Markup:

```html    User Input Form  /* CSS for form layout */ label { display: block; margin-bottom: 10px; } input[type="text"], input[type="password"], select { width: 200px; padding: 5px; border: 1px solid #ccc; border-radius: 4px; } input[type="radio"] { margin-right: 5px; } input[type="submit"], input[type="reset"] { background-color: #4CAF50; color: white; padding: 10px 20px; margin-top: 10px; border: none; border-radius: 4px; cursor: pointer; } input[type="submit"]:hover, input[type="reset"]:hover { background-color: #45a049; }    

User Input Form

 ```

This HTML markup will produce a user input form that allows users to enter their personal information. The form includes fields for the user's name, password, gender, age, and language preferences.

There are also two buttons at the bottom of the form that allow the user to send the form or clear the form fields.

Learn more about HTML : brainly.com/question/4056554

#SPJ11

Find the big-O analysis of the running time of code 1 and code 2:
Code 1:
for (i = 0; i < n; i++)
for(j=0;j for(k =0; k < j; k++)
sum++;
Code 2:
for (i = 1; i <= n; i++)
for(j=1;j<=i*i; j++)
if (j % i == 0)
for (k = 0; k < j; k++)
sum++;

Answers

The total number of operations is:Σi=1n(i²)/i = Σi=1ni= n(n + 1)/2Then, the big-O of code 2 is O(n²).

Code 1: Finding the big-O analysis of the running time of code 1 can be done by summing up all the operations. Consider the innermost loop, it runs j times for each value of i. Then, for each value of i, the loop runs from 1 to n, hence the big-O of code 1 is O(n³).

Code 2: The innermost loop of code 2 runs for every value of j that is a multiple of i. There are i² such values of j. So, the loop runs i² times for each value of i.

To know more about operations visit:

brainly.com/question/32790916

#SPJ11

Write a Rust function increase that accepts a 64-bit int, adds one to the value, and returns the result.

Answers

The Rust function increase that accepts a 64-bit int, adds one to the value, and returns the result is shown below: fn increase(num: i64) -> i64 {    num + 1} Rust is a modern programming language that was designed to be safe, concurrent, and practical.

It's a high-performance language that is used for a variety of purposes, including systems programming, web development, and game development. The given problem is to write a Rust function increase that accepts a 64-bit int, adds one to the value, and returns the result. To solve the given problem, we have to define a Rust function that accepts a 64-bit int, adds one to the value, and returns the result. The function then adds one to the value of num and returns the result. The result is also of type i64, which is a 64-bit integer.

Rust is a high-level language that was designed to be safe, concurrent, and practical. It's a modern programming language that is used for a variety of purposes, including systems programming, web development, and game development. In the given problem, we have to write a Rust function that accepts a 64-bit int, adds one to the value, and returns the result. To solve the given problem, we have to define a Rust function that accepts a 64-bit int, adds one to the value, and returns the result. The Rust function is defined as follows: fn increase(num: i64) -> i64 {    num + 1}This Rust function is called increase.

To know more about programming language visit:

https://brainly.com/question/23959041

#SPJ11

Instructions a. Add the following operation to the void reverseStack(stackType(Type) \&otherStack); This operation copies the elements of a stack in reverse order onto another stack. Consider the following statements: stackType stacki; stackType

Answers

To implement the 'reverseStack' operation, you can use an auxiliary stack to store the elements in reverse order. Here's a detailed solution in C++:

Code:

#include <iostream>

#include <stack>

template <typename Type>

void reverseStack(std::stack<Type>& otherStack) {

   std::stack<Type> auxStack;

   // Transfer elements from original stack to auxiliary stack

   while (!otherStack.empty()) {

       auxStack.push(otherStack.top());

       otherStack.pop();

   }

   // Transfer elements from auxiliary stack back to original stack

   while (!auxStack.empty()) {

       otherStack.push(auxStack.top());

       auxStack.pop();

   }

}

int main() {

   std::stack<int> stack1;

   std::stack<int> stack2;

   // Push elements to stack1

   stack1.push(1);

   stack1.push(2);

   stack1.push(3);

   stack1.push(4);

   std::cout << "Original Stack1: ";

   while (!stack1.empty()) {

       std::cout << stack1.top() << " ";

       stack1.pop();

   }

   std::cout << std::endl;

   // Call reverseStack operation on stack1

   reverseStack(stack1);

   std::cout << "Reversed Stack1: ";

   while (!stack1.empty()) {

       std::cout << stack1.top() << " ";

       stack1.pop();

   }

   std::cout << std::endl;

   return 0;

}

In this example, we have two stacks: stack1 and stack2. We push elements into stack1 and then call the reverseStack operation on stack1. The reverseStack operation uses an auxiliary stack (auxStack) to reverse the order of elements in stack1. Finally, we print the original and reversed stacks using a while loop.

Output:

Original Stack1: 4 3 2 1

Reversed Stack1: 1 2 3 4

This solution assumes the presence of a stack data structure provided by the C++ Standard Library.

Learn more about stacks: https://brainly.com/question/13160663

#SPJ11

which of the following is the most common use of smartphone technology by businesspeople?

Answers

The most common use of smartphone technology by businesspeople is communication and productivity enhancement.

Businesspeople extensively use smartphones for communication purposes. Smartphones provide various communication channels such as phone calls, text messages, emails, and instant messaging applications, allowing businesspeople to stay connected with clients, colleagues, and partners regardless of their location. The convenience and portability of smartphones enable businesspeople to promptly respond to messages, schedule meetings, and maintain constant communication, thereby enhancing productivity and efficiency in their work.

Additionally, smartphones offer a wide range of productivity-enhancing features and applications. Businesspeople utilize smartphone technology to manage their schedules, set reminders, and access important documents and files on the go. With cloud storage and synchronization services, they can access and share information seamlessly across multiple devices. Smartphones also provide access to various business applications, such as project management tools, collaboration platforms, note-taking apps, and virtual meeting software, which enable businesspeople to streamline their workflow, coordinate with team members, and make informed decisions in real-time.

In conclusion, the most common use of smartphone technology by businesspeople revolves around communication and productivity enhancement. By leveraging the communication capabilities and productivity features of smartphones, businesspeople can efficiently manage their professional responsibilities, collaborate with others, and stay productive while on the move.

Learn more about smartphone technology here:

https://brainly.com/question/30407537

#SPJ11

When Janet saw the banner ad for Dice, an employment agency for software programmers, she used her mouse to access the site's home page. If the advertising rate for the banner ad were determined by the number of people who saw the banner, clicked on it, and visited the home page, then the method would be called:

Answers

The method of determining the advertising rate based on the number of people who saw the banner, clicked on it, and visited the home page is known as cost-per-click (CPC) advertising.

This model allows advertisers to pay for their ads based on the actual clicks and visits they receive, rather than just the number of impressions or views. In Janet's case, when she saw the banner ad and clicked on it to access the home page of Dice, she became part of the audience that the advertising rate is based on.

CPC advertising is commonly used in online advertising platforms, where advertisers bid on keywords and pay only when someone clicks on their ads.

Learn more about advertising rate https://brainly.com/question/30037408

#SPJ11

What will happen if you add the statement System.out.println(5 / 0); to a working
main() method?
A. It will not compile.
B. It will not run.
C. It will run and throw an ArithmeticException.
D. It will run and throw an IllegalArgumentException.
E. None of the above.

Answers

If you add the statement System.out.println(5 / 0); to a working main() method, then the answer is: C. It will run and throw an Arithmetic Exception.

When we divide a number by zero, it results in infinity. But, in the case of Java, it will throw an ArithmeticException. Therefore, if we add the statement System.out.println(5 / 0); to a working main() method, it will run and throw an ArithmeticException. The ArithmeticException occurs when we divide a number by zero or when we divide a number that is greater than the maximum limit by 0.The correct answer is option C. It will run and throw an ArithmeticException.

To know more about Arithmetic Exception visit:

https://brainly.com/question/31755607

#SPJ11

as edi really takes hold and international edi becomes more commonplace a major stumbling block will be overcoming the language barriers that now exist. the most widespread edi language in the united states is group of answer choices

Answers

The most widespread EDI language in the United States is ANSI X12.

What is the prevalent EDI language in the United States?

As EDI (Electronic Data Interchange) gains more prominence and becomes increasingly prevalent internationally, one of the major challenges is overcoming language barriers that exist between trading partners. EDI enables businesses to exchange documents electronically, streamlining processes and improving efficiency.

In the United States, the most widespread EDI language is ANSI X12. ANSI X12 is a standard for electronic data interchange developed by the American National Standards Institute (ANSI). It defines a set of transaction sets that facilitate the exchange of various business documents, such as purchase orders, invoices, and shipping notices, among trading partners.

Adopting a common EDI language like ANSI X12 allows businesses to communicate seamlessly, automating data exchange and reducing errors. However, as EDI expands globally, there may be a need to address language differences to ensure smooth international EDI adoption.

Learn more about language

brainly.com/question/15196311

#SPJ11

Network traffic logs show a large spike in traffic. When you review the logs, you see lots of TCP connection attempts from an unknown external server. The destination port of the TCP connections seems to increment by one with each new connection attempt. This is most likely an example of what kind of activity from which tool?
Network traffic logs show a large spike in traffic. When you review the logs, you see lots of TCP connection attempts from an unknown external server. The destination port of the TCP connections seems to increment by one with each new connection attempt. This is most likely an example of what kind of activity from which tool?
Active reconnaissance with Nmap
Passive reconnaissance with Zenmap
Passive reconnaissance with Nmap
Initial exploitation with Zenmap

Answers

The given activity is most likely an example of active reconnaissance with the Nmap tool.

Nmap tool is a very useful tool for reconnaissance or discovering hosts and services on a computer network. The software provides a number of features for probing computer networks, including host discovery and service and operating system detection. An attacker can use the Nmap tool for active reconnaissance. Active reconnaissance, also known as network mapping, involves gathering data from a targeted network by sending network packets to the hosts on the network.

An example of active reconnaissance with the Nmap tool is when an attacker sends TCP connection attempts from an unknown external server with the destination port of the TCP connections incremented by one with each new connection attempt. This activity results in a large spike in traffic, which is similar to the activity described in the question. Therefore, the correct answer is Active reconnaissance with Nmap.

Network traffic logs show a large spike in traffic, which can be a sign of malicious activity. In this situation, the traffic log shows lots of TCP connection attempts from an unknown external server, and the destination port of the TCP connections seems to increment by one with each new connection attempt. This is most likely an example of active reconnaissance with the Nmap tool.

Active reconnaissance is the process of gathering data from a targeted network by sending network packets to the hosts on the network. It is also known as network mapping. Active reconnaissance involves scanning the target network for open ports, operating systems, and services. Attackers use active reconnaissance to identify vulnerabilities and potential targets for further exploitation.

In this case, the attacker is using Nmap tool for active reconnaissance. Nmap is a powerful tool for network exploration, management, and security auditing. Nmap can be used for port scanning, host discovery, version detection, and OS detection. With Nmap, an attacker can identify the IP addresses of the hosts on a network and then target these hosts for further attacks. The attacker can also identify open ports and services on the hosts and use this information to identify vulnerabilities that can be exploited

The large spike in traffic and the TCP connection attempts from an unknown external server with the destination port of the TCP connections incremented by one with each new connection attempt are most likely an example of active reconnaissance with the Nmap tool. Active reconnaissance is a dangerous activity that can be used to identify vulnerabilities and potential targets for further exploitation. Network administrators should always monitor their network traffic logs for signs of active reconnaissance and other malicious activities and take appropriate action to prevent attacks.

To know more about reconnaissance visit

brainly.com/question/21906386

#SPJ11

in a state diagram, the circles represent choice 1 of 4:transition from current to next state choice 2 of 4:outputs of the flip flops choice 3 of 4:inputs to the flip flops choice 4 of 4:active clock edge

Answers

In a state diagram, the circles represent choice 1 of 4: transition from the current to the next state.

In a state diagram, the circles represent the various states that a system can be in. These states are connected by arrows, which indicate the transitions from the current state to the next state based on certain conditions or events. The circles, or nodes, in the state diagram capture the different possible states of the system.

The purpose of a state diagram is to visualize and model the behavior of a system, particularly in relation to its states and transitions. The circles represent the states, and each state has associated actions, conditions, or outputs. By analyzing the transitions between states, we can understand how the system progresses and responds to inputs or events.

While the other choices mentioned (outputs of the flip flops, inputs to the flip flops, active clock edge) are relevant in digital systems and circuit design, in the context of the given question, the circles specifically represent the transitions from the current state to the next state.

Learn more about Transition

brainly.com/question/14274301

#SPJ11

the _________________ requires all federal agencies to create a breach notification plan.

Answers

The Federal Information Security Management Act (FISMA) requires all federal agencies to create a breach notification plan.

FISMA was established to create a framework for ensuring that all government agencies have security measures in place to protect their information technology infrastructure from unauthorized access, use, disclosure, disruption, modification, or destruction. FISMA is a law that sets guidelines for federal agencies to secure their information systems, create policies, and procedures for incident management, and report breaches to relevant stakeholders.

Federal agencies must have a breach notification plan in place to alert people in case their data is breached. It involves identifying the key stakeholders, establishing clear roles and responsibilities, determining how to notify individuals affected by the breach, and planning how to remediate the situation.

The plan should also include how to contain the breach, how to investigate the cause of the breach, and how to document the breach to comply with legal and regulatory requirements.

In summary, FISMA has helped federal agencies prioritize information security by requiring them to create and implement a breach notification plan, which helps to protect sensitive information and prevent data loss.

To know more about FISMA visit :

https://brainly.com/question/20888891

#SPJ11

hammond industries has appointed gavin as the network administrator to set up a complete secured and flawless network throughout the office premises. one of the employees has come to him to fix an error message that keeps popping up every time he tries to open the web browser. he also states that this error started popping up after the external hard drive had been used to transfer some of the necessary documents to the hr's office. analyze what kind of malware might possibly be behind this error.

Answers

The error message when opening the web browser may indicate malware presence. Possible types include adware, browser hijackers, trojans, and ransomware. A thorough investigation is needed to determine the exact cause.

The error message that keeps popping up when the employee tries to open the web browser might indicate the presence of malware on the computer. Here are a few types of malware that could possibly be causing this error:

Adware: Adware is a type of malware that displays unwanted advertisements on the user's computer. These ads can sometimes interfere with the normal functioning of web browsers, causing error messages to appear.

Browser hijacker: A browser hijacker is a type of malware that modifies the settings of the web browser without the user's consent. This can result in error messages and redirects to unwanted websites.

Trojan: Trojans are a type of malware that can disguise themselves as legitimate software. They can cause various issues on a computer, including generating error messages when trying to open certain applications or access the internet.

Ransomware: Ransomware is a type of malware that encrypts files on the computer and demands a ransom to unlock them. While ransomware is not directly related to web browser errors, it could have infected the computer during the file transfer process, leading to the appearance of error messages.

To accurately determine the type of malware causing the error message, Gavin, the network administrator, would need to conduct a thorough investigation. This may involve scanning the computer with reputable antivirus or anti-malware software, analyzing system logs, and checking for any suspicious files or processes running in the background.

Learn more about malware : brainly.com/question/399317

#SPJ11

Which of the following is the result of a postfix traversal of this tree? 132564
132654
123456
421365


Question 2 A binary tree of 3 nodes yields the same result under pre-, post- and in-fix traversal. Which statement below explains how this can be the case? The values in the left child must be less than the value in the root. This isn't possible in a binary tree. All the values in the nodes are the same. You can't traverse a tree this small, hence the result is NULL for each one. Question 3 1 pts How do B-Trees speed up insertion and deletion? The use of partially full blocks Ordered keys Every node has at most m children Tree pointers and data pointers

Answers

The result of a postfix traversal of the given tree 132564 is 123654. Therefore, the correct option is 123654. Therefore, the main answer is 123654 and the explanation is already provided.

Question 2In a binary tree of 3 nodes, since there are only three nodes, so the tree can have only 3! i.e. 6 possible different permutations of the nodes. Therefore, it's possible that the tree yields the same result under pre-, post- and in-fix traversal. The correct statement for the given statement is "All the values in the nodes are the same."Therefore, the main answer is "All the values in the nodes are the same."  

Question 3B-Trees speed up insertion and deletion through the use of partially full blocks. The B-tree is a self-balancing search tree that is used to efficiently store large amounts of data that can be sorted. Therefore, the correct option is the use of partially full blocks.

To know more about permutations visit:

https://brainly.com/question/33631983

#SPJ11

you are trying to set up and configure microsoft defender advanced threat protection on your network. one of the client machines is not reporting properly. you need to verify that the diagnostic data service is enabled. which command can you run to check this?

Answers

To check if the diagnostic data service is enabled on a client machine, you can use the following command:

``

Get-MpComputerStatus

```

What is the purpose of the "Get-MpComputerStatus" command?

The "Get-MpComputerStatus" command is a PowerShell cmdlet used to retrieve the status of Microsoft Defender on a client machine. By running this command, you can verify whether the diagnostic data service is enabled. The diagnostic data service is responsible for collecting and sending diagnostic information from the client machine to Microsoft, helping to identify and troubleshoot any potential issues with Microsoft Defender Advanced Threat Protection.

Learn more about: client machine

brainly.com/question/31325313

#SPJ11

Create a new class called Library which is composed of set of books. For that, the
Library class will contain an array of books as an instance variable.
The Libr-ny class will contain also the following:
An instance variable that save the number of books in the library
First constructor that takes a number representing the number of books and
initializes the internal array of books according to that number (refer to
addBook to see how to add more books)
Second constructor that takes an already filled array of books and assigns it to
the instance variable and then we consider the library is full; we cannot add
more books using addBooks
addBook method receives a new book as parameter and tries to add it if
possible, otherwise prints an error message
findBook method receives a title of a book as parameter and returns the
reference to that book if found, it returns null otherwise
tostring method returns a string compiled from the returned values of
tostring of the different books in the library
Create a test program in which you test all the features of the class Library.

Answers

Library class is composed of a set of books and the Library class contains an array of books as an instance variable. The Library class also contains the following.

An instance variable that saves the number of books in the library The first constructor takes a number representing the number of books and initializes the internal array of books according to that number (refer to add Book to see how to add more books.

The second constructor takes an already filled array of books and assigns it to the instance variable and then we consider the library is full; we cannot add more books using add Books The add Book method receives a new book as a parameter and tries to add it if possible, otherwise, prints an error message .

To know more about library visit:

https://brainly.com/question/33635650

#SPJ11

Solve it with proper steps
Q2: Based on Rectangle transposition, decrypt the following cipher text. "REEOERCEPVIFTIPTERNLOEORSOEN". (2 Points)

Answers

Based on Rectangle transposition, decrypt the following cipher text. (2 Points)Rectangle Transposition Cipher Rectangle Transposition Cipher is one of the classical ciphers.

The encryption technique is a simple transposition cipher that modifies the order of the plaintext's character. The method replaces the text's characters in accordance with a typical path through a rectangular table according to the secret key. The decryption process reverses the encryption process to retrieve the initial plaintext. It's also known as the Route Cipher.

Transposition is the name for a method of encryption in which plaintext is moved around or scrambled. A Route Cipher is a kind of transposition cipher that involves writing the plaintext in a grid of specific dimensions and then rearranging the letters to create the cipher. :The encrypted text is ".Let's decrypt the cipher using Rectangle Transposition.  

To know more about rectangle visit:

https://brainly.com/question/33636357

#SPJ11

Other Questions
which change related to the vital signs is expected in pregnant women? Create a student class with attributes of names and scores of student objects. The student objects could be stored in an array or arraylist. The student class should implement two interfaces listing methods to get name, compute average of the scores and compute the sum of s ores. Choose which method(s) to include in either interfaces, you could add other methods and attributes as you please. Complete the following code to toggle B4 every 2 ms. Prescaling =64, and the frequency of the oscillator is 16MHz. CALL delay PORTB, 4 CALL delay JMP loop delay: LDI R16, TCNT1H, R16 LDI R16, TCNT1L, R16 LDI R16, TCCR1A, R16 LDI R16, TCCR1B, R16 again: JMP again LDI R16, TCCR1B, R16 LDI R16, TIFR1, R16 STS OUT \begin{tabular}{|l|l|l|l|l|l|l|l|l|} \hline PORTB 032 & & CBI & TIFR1 & 0 & PINB & 6 \\ \hline \end{tabular} A certain first-order reaction has a rate constant of 0.007801/min at 300 K. What is the half-life (in minutes) of this reaction? Question 2 A certain first-order reaction with a single reactant has a rate constant equal to 0.0751/s at 1000 K. If the initial reactant concentration is 0.150M, how many seconds does it take to decrease to 0.0250M ? Question 3 1pts What data should be plotted to show that experimental concentration data fits a second-order reaction? 1/ [reactant] vs. time [reactant] vs. time In[reactant] vs. time why do you think the new expended restaurants didn't succeed In translating this chapter specifically for the responsive app Bikes and Barges I can not get the webview to work nor can I get the program to run on the emulator? Can someone please share the source code for all elements: manifest, activitymain, fragments, placeholder (no longer Dummy), and anything else I might require to get this app to function in the latest version of Android Studio? The equation of line g is y=-(1)/(3)x-8. Line h includes the point (-10,6) and is parallel to line g. What is the equation of line h ? Use the Table of integrals in the back of your textbook to evaluate 8sec^3(2x)dx Perform the substitution u= Use formula number 8sec^3(2x)dx=_____+c Physical Science A 15 -foot -long pole leans against a wall. The bottom is 9 feet from the wall. How much farther should the bottom be pulled away from the wall so that the top moves the same amount d A survey was conducted that asked 1005 people how many books they had read in the past year. Results indicated that x = 12.9 books and s = 16.6 books. Construct a 95% confidence interval for the mean number of books people read. Interpret the interval.Click the icon to view the table of critical t-values.Construct a 95% confidence interval for the mean number of books people read and interpret the result. Select the correct choice below and fill in the answer boxes to complete your choice.(Use ascending order. Round to two decimal places as needed.)A. There is a 95% probability that the true mean number of books read is betweenandB. If repeated samples are taken, 95% of them will have a sample mean betweenandOC. There is 95% confidence that the population mean number of books read is between A bag contains 10 yellow balls, 10 green balls, 10 blue balls and 30 red balls. 6. Suppose that you draw three balls at random, one at a time, without replacement. What is the probability that you only pick red balls? 7. Suppose that you draw two balls at random, one at a time, with replacement. What is the probability that the two balls are of different colours? 8. Suppose that that you draw four balls at random, one at a time, with replacement. What is the probability that you get all four colours? why is ""connective tissues"" an appropriate name for the types of tissues found in this class? when the show/hide hidden formatting button is toggled on, a raised dot () shows where the enter key was pressed. the sales process begins with the salesperson locating companies or people who are most likely to buy the seller's offerings. this activity is called: group of answer choices sodium nitrite (nano3) reacts with 2-iodooctane to give a mixture of two constitutional isomers having molecular formula of c8h17no2 with a combined yield of 88%. suggest reasonable structures for these two isomers. The health care provider prescribes a low-fat, 2-gram sodium diet for a client with hypertension. The nurse should explain that the purpose of restricting sodium is to:1.Chemically stimulate the loop of Henle2.Diminish the thirst response of the client3.Prevent reabsorption of water in the distal tubules4.Cause fluid to move toward the interstitial compartment Please write a short letter to Miguel. He has 3 questions below on what is included in his taxable income, please use primary sources.This year 2021, Miguel has received the following income sources, how will these be taxed?1. Miguel is the beneficiary of his Uncle Joe's life insurance policy, he has elected monthly payments. Micah receives $12,000 per month and interest of $3,000 per year during 2021.2. Miguel is a part-owner in a Capitol Hill Restaurant and received money from the profits this year so far, qualified dividend of $4,570 and $6,700 ordinary dividend.3. Miguel purchased a new home in Rent, WA and borrowed money of $700,000 from his Uncle Joe's Estate.His interest rate is 1.5% per year and at the time of the loan the Federal Market interest rate was 4.35% The concept of being risk averse meansA. for a given situation investors would prefer relative certainty to uncertainty.B. investors would prefer investments with low standard deviations and greater opportunity for gain.C. that the lower the risk the lower the expected return must be.D. all of the above answers are correctI guess D is correct. Hope someone can confirm please. Thanks Vaughn Manufacturing has recently decided to go public and has hired you as an independent CPA. One statement that the enterprise is anxious to have prepared is a statement of cash flows. Financial statements of Vaughn Manufacturing for 2022 and 2021 are provided below. BALANCE SHEETS 12/31/22 12/31/21 Cash $407000 $ 194000 Accounts receivable 360000 216000 Inventory 386000 479000 Property, plant and equipment $610000 $959000 Less accumulated depreciation (320000) 290000 (306000) 653000 $1443000 $1542000 Accounts payable Income taxes payable Bonds payable Common stock Retained earnings $ 174000 352000 359000 240750 317250 $1443000 $ 97000 391000 600000 216000 238000 $1542000 $8380000 7154000 1226000 INCOME STATEMENT For the Year Ended December 31, 2022 Sales revenue Cost of sales Gross profit Selling expenses $602000 Administrative expenses 191000 Income from operations Interest expense Income before taxes Income taxes 793000 433000 74000 359000 89750 $ 269250 Net income The following additional data were provided: 1. Dividends for the year 2022 were $190000. 2. During the year, equipment was sold for $240000. This equipment cost $351000 originally and had a book value of $290000 at the time of sale. The loss on sale was incorrectly charged to cost of sales. 3. All depreciation expense is in the selling expense category. Under the direct method, the total taxes paid is $54000. $128750. $89750. $39000. Selma Shalom had the following income for the year of assessment ending 28 February 2022.ItemSalaryAmount N$84 000Director's Fee60 000Interest from FNB11 000Interest from ABSA (SA)23 00045 000Dividends35 000Legacy received15 000Gift from a friend40 00018 000Profit on sale of a house Share premium receiptSubsidy on soil erosion30 000Annuity from a UK Insurance company10 000Lump sum from employer50 000 22 000Profit from business branch KenyaCompensation for damages to office block120 000Owned by a property investor Sale of shares held as:Investment80 000Trading Stock65 000Bet win on results of a soccer match7 50015 000Interest from Bank WindhoekRestraint of trade payment receivedProfit from Namibian Business branch25.00Gross income55 000?Calculate the gross income of Selma Shalom for the year of assessment ending at 28 February 2022. As part of your answer provide a reason for every item excluded from gross income.