Write a Python function called finalMark that calculates your final mark in ITI1120 (not the average mark). Each mark has a different weight: labs: 10%, Assignments: 24%, Test1: 6\%, Midterm: 20%, Final: 40% ) in our course. The function takes 5 variables as inputs (numbers up 100) and returns that mark. 0 The type contract is: (float, float, float, float, float) → float #test Q2 finalMark (100,100,100,100,100) 100.0 finalMark (50,90.5,60,80,70) 74.32

Answers

Answer 1

The finalMark Python function takes the weighted marks for labs, assignments, Test1, midterm, and final as inputs and returns the final mark in ITI1120.

The final mark is calculated by multiplying each mark with its corresponding weight and then summing up the weighted marks. The formula for calculating the final mark is as follows:

finalMark = (labs * 0.1) + (assignments * 0.24) + (Test1 * 0.06) + (midterm * 0.2) + (final * 0.4)

For example, if the input marks are labs = 100,

assignments = 100,

Test1 = 100,

midterm = 100, and

final = 100, the calculation would be:

finalMark = (100 * 0.1) + (100 * 0.24) + (100 * 0.06) + (100 * 0.2) + (100 * 0.4)

= 10 + 24 + 6 + 20 + 40

= 100

Therefore, the final mark in this case would be 100.0.

The finalMark function calculates the final mark in ITI1120 by applying the appropriate weights to the input marks and summing them up. It provides a convenient way to determine the overall performance in the course based on the specified weightings for different components.

Learn more about Python here:

brainly.com/question/31055701

#SPJ11


Related Questions

What is caching, and how do we benefit from it? (10 pts) What is the purpose of dual-mode operation? (10 pts)

Answers

Caching is a technique used in computer systems to store frequently accessed data in a fast and easily accessible location called the cache. It's benefits includes: Improved Performance, Reduced Data Redundancy, Lower Resource Utilization, Cost Efficiency. Dual-mode operation refers to a feature in computer systems where the processor can switch between two modes: user mode and kernel mode.

Caching:

Caching is a technique used in computer systems to store frequently accessed data in a fast and easily accessible location, known as the cache. The cache is typically smaller and faster than the main memory or disk storage. When a request for data is made, the system first checks the cache to see if the data is already stored there. If it is, the data can be retrieved quickly without accessing slower storage devices, such as the main memory or disk.

Benefits of Caching:

1. Improved Performance:

Caching significantly improves system performance by reducing the latency associated with accessing data from slower storage devices. Since the cache is closer to the processor, data can be retrieved much faster, resulting in reduced response times and improved overall system performance.

2. Reduced Data Redundancy:

Caching helps avoid redundant data fetches by storing frequently accessed data. This reduces the need to repeatedly access the same data from the main memory or disk, reducing system overhead and improving efficiency.

3. Lower Resource Utilization:

Caching helps in reducing the load on resources such as the main memory and disk. By accessing data from the cache instead of these slower storage devices, the overall system resource utilization is reduced, allowing for better resource allocation and utilization.

4. Cost Efficiency:

Caching allows for the utilization of faster and more expensive memory technologies in a smaller cache size, which is more cost-effective compared to using the same technology for the entire memory hierarchy. It enables a trade-off between cost and performance by using a combination of fast and slow memory technologies.

Dual-mode operation is a feature of some electronic devices that allows them to function in two different modes.

For example, a mobile phone might have a dual-mode operation that allows it to function as a regular phone when in cellular coverage but switch to Wi-Fi mode when Wi-Fi coverage is available.

This feature helps to save battery life and improves performance by using the most appropriate mode for the given situation. Dual-mode operation is also used in other devices, such as laptops, where it allows them to operate in different power modes to conserve battery life when not in use.

To learn more about caching: https://brainly.com/question/6284947

#SPJ11

FIill In The Blank, if you want to include a field in your query, but do not want that field to show in datasheet view, click the _______ box to remove the checkmark for the field you want to hide.

Answers

If you want to include a field in your query, but do not want that field to show in datasheet view, click the "Show" box to remove the checkmark for the field you want to hide.

When constructing a query in a database management system, you select the fields you want to include in the query result. By default, all selected fields are displayed in the datasheet view when you run the query. However, there might be cases where you want to include a field for further processing or calculations but do not want it to be visible in the final query result.

To achieve this, you can open the query in design view or the query builder, locate the field you want to hide, and remove the checkmark in the "Show" box associated with that field. This action will exclude the field from being displayed in the datasheet view while still including it in the query's underlying calculations or operations.

By hiding certain fields in a query, you can focus on the essential data and improve the readability and usability of the query result for your specific needs.

learn more about datasheet here:

https://brainly.com/question/32180856

#SPJ11

Implement a method that takes a char array and a char and returns the number of times the char appears in the array. A 0 should be returned if the char is not in the array. Example Input-['f', 'a', 'c', 'a', 'a', 'e', 'e', 'f'], 'a' Output - 3 Reason - In the array there are 3 'a' characters. inport java, util, Arrays; public class Problen2 \{ IJDO NOT CHANGE THIS METHCO HEADER. YOU may nodify it's body. public static int caunt(char characters[], char toCount) \{ retumn θ; 7 public static void main(String[] ares) \{ char arr[] ={ 'f', 'a', 'c', 'a', "a', 'e', 'e', "f'\}; 1nt countà = count(arr, 'a'); 1f( counta =3){ Systen, out, printlni "[1] coprectl"); y else \{ 5ysten, out, printlni "[X] Incoprectl The count should be 3 for 'a", Returned " 4 counthi); j int countD = count(arr, 'd' ) if ( count0 == b) \{ Systen. Dut.printlní" [I] Carrect!"); I else i Systen. out.printlní" [X] Incorrectl The caunt shauld be o for 'd". Returned " + countD);

Answers

The given question demands the implementation of a method that takes a char array and a char and returns the number of times the char appears in the array.

A 0 should be returned if the char is not in the array. To implement this, firstly, we need to initialize a counter variable, let's say `count` with zero value. We then need to traverse the given array and compare each element with the given character `toCount`. If the element matches, we will increase the value of the count variable.

Finally, we will return the value of the count variable. Below is the answer to the given question :`import java. util.*;import java .util .Arrays ;public class Problem2{    // DO NOT CHANGE THIS METHOD HEADER. YOU may modify its body.    public static int count(char characters[], char to Count){        int count = 0;        for(int i=0;i

To know more about  counter visit:

https://brainly.com/question/33636316

#SPJ11

Write a function that takes in a vector of angles, and retums a cell array whose elements are the planar rotation matrices corresponding to those angles. Your code may (and should) generate the individual rolation matrices by calling the function "R.planar" as defined in the "Planar Rotation Matrx" exercise above. (Note that in this online test, we will not use your implementation of R.planar, but instead will use a reference implementation stored on the server) Function 8 1 function. R_set = planar_rotation_set(joint_angles) * Generate a set of planar rotation matrices corresponding to the angles in W the input vector 5 Input: 64 7 joint_angles: a 1×n or n×1 vector of joint angtes 9 o dutput: 40 s 11 - Rset: a cell array of the same size as the vector angles, in which 12) I each cell contains the planar rotation matrix for the angle in the 13. A corresponding entry of the vector 14
15

sexesss ​
16 V First, create an enpty cell array called R.set that is the saffe size- 17 s as the vector of joint angles, using the 'cell' and 'size' functions R_set: a cell array of the same size as the vector angles, in which each cell contains the planar rotation matrix for the angle in the corresponding entry of the vector 8 First, create an empty cell array called R_set that is the same size \% as the vector of joint angles, using the 'cell' and 'size' functions R_set = cell(size(joint_angles)); varer 8 Loop over the joint angles, creating a rotation matrix and placing it o in the corresponding entry of R −

set for 1dx=1 : numel(R_set) R_set { id x}= R_planar(idx); end end Code to call your function a 1 \$ This code generates a set of three rotation matrices 5 = planar_rotation_set( (6pipi/4]) celldisp(s)

Answers

The function planar_rotation_set takes in a vector of angles and returns a cell array containing planar rotation matrices corresponding to those angles. It uses a loop to create the matrices and stores them in the cell array.

Here's the implementation of the requested function:

function R_set = planar_rotation_set(joint_angles)

   % Create an empty cell array with the same size as the input vector

   R_set = cell(size(joint_angles));

   % Loop over the joint angles and create rotation matrices

   for idx = 1:numel(R_set)

       R_set{idx} = R.planar(joint_angles(idx)); % Assuming R.planar is a valid function for creating planar rotation matrices

   end

end

To call the function and display the resulting cell array, you can use the following code:

angles = [pi/4, pi/2, 3*pi/4]; % Example joint angles

s = planar_rotation_set(angles);

celldisp(s); % Display the cell array

Note: The function assumes that R.planar is a valid function for generating planar rotation matrices.

Learn more about rotation matrices: brainly.com/question/21752923

#SPJ11

Your task is to find the state with the highest minimum monthly rainfall, and the month in which it occurred, using the weather dataset in climate_data_2017.csv.
In any given month, the minimum monthly rainfall for each state is the lowest rainfall recording from any weather station in that state during that month.
For example, suppose NSW had rainfall recordings of 1, 10, 5, and 7 for January; then its minimum monthly rainfall for January would be min(1,10,5,7)=1, the lowest of those recordings.
If there are several correct answers, your program can output any of the correct answers.
On the given data, your program's output should look like this:
Month: 11
State: QLD

Answers

The state with the highest minimum monthly rainfall is Queensland (QLD) and the month in which it occurred is November (Month 11). To solve the problem, we need to find the state with the highest minimum monthly rainfall and the month in which it occurred by using the given data in climate data 2017.

csv file. To do this, we have to follow the following steps: Step 1: Import necessary libraries and load the dataset into the Jupyter Notebook. Step 2: Create a pivot table to summarize the data and determine the minimum monthly rainfall for each state in each month.  This can be done with the following code:`climate_data = pd.read_csv('climate_data_2017.csv')min rainfall climate data.pivot table(index ['State', 'Month'], values='Rainfall', aggfunc=np.min)`Step 3: Identify the state with the highest minimum monthly rainfall and the month in which it occurred.  

We can use the `idxmax()` function to identify the row with the maximum value, and then extract the state and month from the row.  This can be done with the following code:`max_rainfall min_rainfall['Rainfall'].idxmax()highest_state = max_rainfall[0]highest_month max_rainfall[1]`Step 4: Print the result with the following code:`print('Month:', highest_month)print('State:', highest_state) Therefore, the state with the highest minimum monthly rainfall is Queensland (QLD) and the month in which it occurred is November (Month 11).

To know more about data visit:

https://brainly.com/question/21927058

#SPJ11

explain the virtual vs. actual hardware and if they are different

Answers

The answer to the question "explain the virtual vs. actual hardware and if they are different" is that they are different from each other. The actual hardware is the physical computer hardware, whereas virtual hardware is the hardware that is created using software.

Here's an overview of each:

Actual hardware: The actual hardware is the physical components of a computer, such as the CPU, hard drive, memory, and other components. The actual hardware is installed in a computer system and is used to perform tasks.

Virtual hardware: Virtual hardware is a software emulation of physical hardware. It is created using software that mimics the behavior of physical hardware, so it can be used to perform tasks in the same way that actual hardware would work. Virtual hardware is often used to create virtual machines, which can be used to run multiple operating systems on a single physical computer.

ConclusionVirtual and actual hardware are two different types of hardware. The actual hardware is the physical computer hardware, while virtual hardware is created using software. Although they have different characteristics, both types of hardware are used to perform tasks on a computer system.

To know more about actual hardware visit:

brainly.com/question/28625581

#SPJ11

Which of the following are factors in deciding on database distribution strategies?A) Organizational forcesB) Frequency of data accessC) Reliability needsD) All of the above

Answers

The factors in deciding on database distribution strategies include organizational forces, frequency of data access, and reliability needs. All of the above. Option D.

The factors in deciding on database distribution strategies include organizational forces, frequency of data access, and reliability needs. These factors play a crucial role in determining how data should be distributed across different locations in a database system.

1. Organizational forces: Organizations may have specific requirements or constraints that influence the distribution of data. For example, certain departments or branches may require separate databases to ensure data privacy or to comply with regulations. On the other hand, centralizing data in a single location may be more efficient and cost-effective for smaller organizations.

2. Frequency of data access: The frequency at which data is accessed can impact the distribution strategy. If certain data is frequently accessed by multiple users or applications, it may be beneficial to distribute replicas of that data across different locations. This can improve performance and reduce latency by enabling users to access data from a nearby location.

3. Reliability needs: The reliability requirements of an organization can also influence the distribution strategy. If high availability is critical, the data may be distributed across multiple locations to ensure redundancy and fault tolerance. This way, if one location experiences an outage or failure, the data can still be accessed from other locations.

In summary, when deciding on database distribution strategies, it is important to consider organizational forces, the frequency of data access, and reliability needs. These factors will help determine the most suitable approach to distribute and manage data effectively in a database system.

Hence, the right answer is all of the above. Option D.

Read more about Database Systems at

#SPJ11

Solve the following problem: Write a program to read a list of nonnegative integers and to display the largest integer, the smallest integer, and the average of all integers. The user indicates the end of the input by entering a negative sentinel value that is not used in finding the largest, smallest, and average values. The average should be a value of type double so that it is computed with fractional part. Here is an example of input and output Input: 220105102−5 Output: (Average data type should be double) Minimum Number: 2 Maximum Number: 20 Average Number: 8.1666666 Add 5 comment lines (comment lines start with //) at the very top of your program with your name, your class and section, the project number, due date, and a short description of the program. Please submit the following file(s) to me on the due date. - Soft copy of your program. That is, you need to submit your java file(s) using Canvas. Project Infomation #3 - Class name: LargeSmallAverage

Answers

This JAVA program reads a list of nonnegative integers from the user and displays the largest integer, smallest integer, and average of all the integers.

import java.util.Scanner;

public class FindMinMaxAverage {

   public static void main(String[] args) {

       // Create a Scanner object to read input from the user

       Scanner scanner = new Scanner(System.in);

       // Declare variables to store the minimum, maximum, sum, and count of entered numbers

       int number;

       int min = Integer.MAX_VALUE; // Initialize min to the maximum possible integer value

       int max = Integer.MIN_VALUE; // Initialize max to the minimum possible integer value

       int sum = 0; // Initialize the sum of numbers to zero

       int count = 0; // Initialize the count of numbers entered to zero

       // Ask the user to enter non-negative integers (negative to quit)

       System.out.println("Enter non-negative integers (negative to quit):");

       // Read numbers from the user until a negative number is entered

       while ((number = scanner.nextInt()) >= 0) {

           // Check if the entered number is smaller than the current min

           if (number < min) {

               min = number; // Update the min value

           }

           // Check if the entered number is larger than the current max

           if (number > max) {

               max = number; // Update the max value

           }

           sum += number; // Add the entered number to the sum

           count++; // Increment the count of entered numbers

       }

       // Check if no valid input was entered (i.e., count is still zero)

       if (count == 0) {

           System.out.println("No valid input entered.");

       } else {

           // Calculate the average as a double value (to get decimal values)

           double average = (double) sum / count;

           // Display the minimum, maximum, and average numbers

           System.out.println("Minimum Number: " + min);

           System.out.println("Maximum Number: " + max);

           System.out.println("Average Number: " + average);

       }

       // Close the scanner to free resources

       scanner.close();

   }

}

You can learn more about JAVA at

https://brainly.com/question/25458754

#SPJ11

Where in OuickBooks Online Payroll can you approve time tracked in QuickBooks Time before running payroll? Payroll center > Overview tab > Approve time Gear icon > Payroll settings > Time > Approve time Payroll center > Time tab > Approve time Payroll center > Compliance tab > Approve time

Answers

In QuickBooks Online Payroll, the place where you can approve time tracked in QuickBooks Time before running payroll is the "Payroll center > Time tab > Approve time."

This option can be found in the Payroll Center section. To approve employee hours, follow these simple steps: Click on the Gear icon on the top right corner of your QuickBooks account and choose Payroll Settings. In the Payroll Settings window, click on Time from the left menu bar.

Then, click on the Approve Time option. Under the Approve Time page, select the employee whose time you want to approve for payroll. You can view the employee's name, total hours worked, and the number of hours in each pay period for each pay rate. Once you have reviewed the employee's hours, select the Approve button to approve their time for the current pay period and repeat the process for each employee. QuickBooks Online Payroll makes it easy for you to manage your employees' hours and make sure that payroll is accurate and efficient.

Know more about QuickBooks Online Payroll here:

https://brainly.com/question/32139674

#SPJ11

What does the following function do for a given binary tree? Select one: a. Return diameter where diameter is number of edges on the longest path between any two nodes b. Returns height where height is defined as number of edges on the path from root to deepest node c. Counts total number of internal nodes d. Counts total number of external nodes e. Counts total number of internal and external nodes

Answers

The following function calculates and returns the diameter of a given binary tree, where the diameter represents the number of edges on the longest path between any two nodes. Option A is the answer.

In a binary tree, the diameter is determined by finding the longest path between any two nodes. This function recursively traverses the tree, calculating the height of each subtree. During this process, it keeps track of the maximum diameter encountered so far. The diameter is then returned as the final result. By considering all possible paths, the function accurately determines the longest path in the tree, representing the diameter.

Option A is the answer.

You can learn more about binary tree at

https://brainly.com/question/30391092

#SPJ11

in the us national institute of standards and technology (nist) definition of "cloud computing", what does the statement "shared pool of configurable computing resources" include?

Answers

The definition of cloud computing by the US National Institute of Standards and Technology (NIST) includes the statement "shared pool of configurable computing resources."

This statement refers to the fact that cloud computing provides a large number of users with access to a shared pool of resources that can be allocated and configured as needed. The resources in this pool include computing power, storage, and bandwidth. The pool is also shared among users, meaning that users do not need to have dedicated hardware and software to access the resources. This results in significant cost savings for users, as they do not need to invest in costly IT infrastructure to access the resources they need. In conclusion, the shared pool of configurable computing resources in the NIST definition of cloud computing refers to the provision of a shared pool of resources, including computing power, storage, and bandwidth, that can be allocated and configured as needed by users without the need for dedicated hardware and software.

To know more about resources visit:

brainly.com/question/14289367

#SPJ11

Create a html form that includes the following input type text, input type number, select, checkbox, radio button, password, upload file, url. Include built in validation and styling. Keep the style sheet outside.

Answers

Step 1: Create an HTML form with various input types including text, number, select, checkbox, radio button, password, file upload, and URL.

Step 2: To create the HTML form, you can use the `<form>` tag as the container for all the form elements. Inside the form, you can include the desired input elements with their respective types. For text input, you can use `<input type="text">`. For number input, use `<input type="number">`. For select, use `<select>` with `<option>` tags for the dropdown options. For checkbox, use `<input type="checkbox">`.

For radio button, use `<input type="radio">` with different values for each option. For password input, use `<input type="password">`. For file upload, use `<input type="file">`. For URL input, use `<input type="url">`.

Step 3: To add built-in validation and styling, you can utilize various attributes and CSS classes. For validation, you can use the `required` attribute to make fields mandatory and set the `pattern` attribute to enforce specific patterns (e.g., for URL validation).

You can also use JavaScript or HTML5 form validation to perform custom validation. For styling, you can apply CSS classes to the form elements and define the styles in an external style sheet.

Remember to use proper HTML structure and form element attributes for accessibility and usability.

Learn more about HTML form

brainly.com/question/32234616

#SPJ11

## Part 2: R Coding Stephen Curry is one of the most prolific scorers currently in the NBA. We can look at the number of points he scored during games in 2015. 2.1. Read in the csv file "curry2015.csv and store it as the object curry' by modifying the code below to fill in each blank. Some blanks in this lab will have hints to the code you need written in the blanks like this: hint "{r} « Error in goal(curry2015) : could not find function "goal" List Environment History Connections Tutorial Import Dataset Global Environment Data curry 2015 82 obs. of 2 variables a U More C Size Modified 427 B Files Plots Packages Help Viewer New Folder Upload 3 Delete Rename Home > LABS > Lab1_IntroR_S21_student Name L Rhistory curry2015.CSV Lab1_IntroR_S21_Primer.pdf Lab1_IntroR_student_S21. Rproj manatee_mortality_2019.csv shutdown.csv ThompsonA_Lab1_S21_Student. Rmd UrchinSurvey_PtSur_fieldsheet.pdf 570 B 445.1 KB 205 B Feb 4, 2021, 8:28 PM Feb 4, 2021, 4:06 PM Feb 4, 2021, 4:06 PM Feb 4, 2021, 8:28 PM Feb 4, 2021, 4:06 PM Feb 4, 2021, 4:06 PM Feb 4, 2021, 8:21 PM Feb 4, 2021, 4:06 PM 418 B 297 B 9.9 KB 221 KB

Answers

Read the CSV file "curry2015.csv" and create data frames store it as the object "curry" in R.

What is the task in this part of the R coding lab involving Stephen Curry's scoring data, specifically regarding reading and storing a CSV file?

In this part of the R coding lab, the objective is to read a CSV file named "curry2015.csv" containing data about Stephen Curry's points scored during games in 2015.

The task is to use the read.csv function in R to load the data from the CSV file into the R environment and store it as an object named "curry".

The read.csv function is commonly used to read tabular data from CSV files and in R, which allows for further data manipulation and analysis.

Once the data is loaded, the "curry" object will contain the dataset, consisting of 82 observations and 2 variables (presumably date and points scored).

This step is crucial as it sets the foundation for further data exploration, visualization, and analysis of Stephen Curry's scoring performance in 2015.

Learn more about create data

brainly.com/question/32136022

#SPJ11

There are derens of pervonaity tests avalable on the internet. One teit, scored th a scale of 0 to 200 . 3 devigned to cove an lidication of how "petranabie" the test teierili, with kigher scores inscatiq more "personablty?" cersonality teit.

Answers

Personality tests are assessments used to evaluate different aspects of one's personality. They cover a broad range of areas, including attitudes, interests, values, and behavior. Some common personality tests are the Myers-Briggs Type Indicator, the Big Five Personality Traits, and the Enneagram.

However, there are dozens of personality tests available on the internet, which range from quick quizzes to in-depth assessments. One such test scores on a scale of 0 to 200, with higher scores indicating more personality traits. The test is designed to provide an indication of how "petrifiable" the test-taker's personality is. The term "petrifiable" refers to the test-taker's tendency to experience anxiety, fear, and stress in response to stressful or challenging situations. Therefore, higher scores on the test indicate a person with a more anxious personality. While personality tests can be insightful, they should be taken with a grain of salt. A single test cannot determine a person's entire personality, and it's important to remember that personality is not set in stone. People change and grow throughout their lives, and a test taken today may not reflect a person's personality five years down the line. Therefore, it's best to view personality tests as one tool in the broader scope of understanding oneself.

To know more about Personality tests visit:

brainly.com/question/30923709

#SPJ11

Students attending IIEMSA can select from 11 major areas of study. A student's major is identified in the student service's record with a three-or four-letter code (for example, statistics majors are identified by STA, psychology majors by PSYC). Some students opt for a triple major. Student services was asked to consider assigning these triple majors a distinctive three-or four-letter code so that they could be identified through the student record's system. Q.3.1 What is the maximum number of possible triple majors available to IIEMSA students?

Answers

The maximum number of possible triple majors available to IIEMSA students is 1331.

In this question, we are given that Students attending IIEMSA can select from 11 major areas of study. A student's major is identified in the student service's record with a three-or four-letter code (for example, statistics majors are identified by STA, psychology majors by PSYC) and some students opt for a triple major. Student services was asked to consider assigning these triple majors a distinctive three-or four-letter code so that they could be identified through the student record's system. We are to determine the maximum number of possible triple majors available to IIEMSA students.In order to find the maximum number of possible triple majors available to IIEMSA students, we need to apply the Multiplication Principle of Counting, which states that if there are m ways to do one thing, and n ways to do another, then there are m x n ways of doing both.For this problem, since each student has the option of choosing from 11 major areas of study, there are 11 choices for the first major, 11 choices for the second major, and 11 choices for the third major. So, applying the Multiplication Principle of Counting, the total number of possible triple majors is given by:11 x 11 x 11 = 1331Therefore, the maximum number of possible triple majors available to IIEMSA students is 1331.Answer: 1331.

Learn more about statistics :

https://brainly.com/question/31538429

#SPJ11

Create your own a C Console App (.NET Framework) project that implements Stack and Queue data structure. Attach the application source code that uses at least five method members of class Stack and Queue, and output screen. [5 Marks].

Answers

In order to create a C Console App (.NET Framework) project that implements Stack and Queue data structures, attach the application source code that uses at least five method members of class Stack and Queue and output the screen.

1. Create a new project by selecting Visual C# on the left, then selecting Console Application in the center of the screen.

2. In the Solution Explorer window, click the project name to select it. From the menu bar, select Project, then Add New Item.

3. From the list of installed templates, select Class. Name your new class Stack.cs or Queue.cs, depending on which data structure you want to create.

4. Type the following code into your new class: This code defines a class with a Stack or Queue data structure.

5. After writing code in the class, add using System; and using System.Collections.generic namespace before the code to import the relevant namespaces.

6. Create a new file in the project called Program.cs. This file will contain the Main method for the console application.

7. Add the following code to the Main method to create an instance of your Stack or Queue class and demonstrate some of its methods:

8. Finally, run your program by hitting F5 or selecting Debug > Start Debugging from the menu bar.

9. Attach the source code and output screen of the C Console App (.NET Framework) project that implements Stack and Queue data structures.

To know more about the Console App, visit:

https://brainly.com/question/30774114

#SPJ11

the number of regular languages, over the alphabet {0, 1}, is (a) uncountable. (b) undecidable. (c) 2 r

Answers

The number of regular languages, over the alphabet {0, 1}, is (b) undecidable.

A regular language is a language that can be recognized by a finite-state machine, also known as a deterministic finite automaton (DFA). The language consists of all strings that can be generated by a DFA with a certain number of states and a certain number of transitions between states.

The number of regular languages over the alphabet {0, 1} is undecidable because it is not possible to determine whether a given language is regular or not using a deterministic algorithm. This is known as the undecidability of the regular language problem.

The regular language problem is undecidable because it is impossible to construct a Turing machine that can recognize all regular languages and determine whether a given language is regular or not. This is because there are languages that are not regular that can be recognized by a DFA, and there are DFAs that can recognize languages that are not regular.

Therefore, the number of regular languages over the alphabet {0, 1} is (b) undecidable.

To know more about languages, visit:

brainly.com/question/20921887

#SPJ11

Team member B is not confident at coding. They wanted to take the lead on documentation in order to avoid coding. However, the instructor was very clear that everyone needs to contribute to the code and and that this will be monitored by the configuration management tool and the code checked in. How should the team address this issue that Team member B wants to try to get by without coding?

Answers

The team should address this issue by encouraging Team member B to improve their coding skills while also finding a suitable role for them within the project.

It is essential for every team member to contribute to the coding process, as stated by the instructor. However, it is also important to consider the individual strengths and weaknesses of team members. In this case, Team member B lacks confidence in coding but shows an interest in documentation.

The team should approach this situation with empathy and support, encouraging Team member B to develop their coding skills while also finding a role that aligns with their strengths.

One possible approach is to pair Team member B with a more experienced coder within the team. This mentorship can provide valuable guidance and support, allowing Team member B to gradually improve their coding skills. By working closely with a mentor, Team member B can gain confidence and become more comfortable with coding tasks.

Additionally, the team can assign Team member B to take the lead on documentation tasks, recognizing their interest and skill in this area. Documentation is an important aspect of software development, and having a dedicated team member handling it can greatly benefit the project. This allows Team member B to contribute meaningfully to the team's overall success while continuing to learn and grow in their coding abilities.

In summary, the team should address Team member B's lack of confidence in coding by providing support, mentorship, and assigning them tasks that align with their strengths. This approach promotes a collaborative and inclusive environment, allowing each team member to contribute effectively to the project.

Learn more about documentation

brainly.com/question/31802881

#SPJ11

Which security principle ensures that the contents of an email have not been read in route? Integrity Accountability Availability Confidentiality

Answers

The security principle that ensures that the contents of an email have not been read in route is Confidentiality.

What is Confidentiality? Confidentiality is a security principle that guarantees the privacy of data or information. The Confidentiality principle ensures that data is not available to unauthorized entities, such as individuals, organizations, or applications.

Confidentiality aims to maintain the confidentiality of sensitive information and limit the data's exposure to an untrusted entity. Thus, Confidentiality is the main answer and the explanation is given above.

To know more about security visit:

https://brainly.com/question/33636509

#SPJ11

power heating ventilation systems hvac and utilities are all componnets of which term

Answers

Power, heating, ventilation systems (HVAC), and utilities are all components of the building services term. Building services are systems that provide safety, comfort, and convenience to occupants of a building. It includes power, lighting, heating, ventilation, air conditioning, drainage, waste management, and water supply systems.

Building services such as HVAC are used to manage the interior environment, providing acceptable levels of thermal comfort and air quality.

HVAC systems are designed to regulate temperature, humidity, and air quality within a building. It is responsible for keeping the environment comfortable and healthy for the occupants.

Apart from the comfort level of the occupant, building services also help to reduce energy consumption. Ventilation is one of the critical aspects of HVAC systems.

It involves exchanging air in a building to provide high indoor air quality. Ventilation systems help to control moisture and prevent stale air from accumulating, ensuring the health and comfort of the occupants.

Building services such as HVAC, plumbing, and electrical systems are integrated to function as a single system. HVAC systems alone are not enough to provide a healthy and comfortable environment for occupants.

The systems must work together to provide a safe and comfortable living environment.

To know more about systems visit;

brainly.com/question/19843453

#SPJ11

What is the worst-case time complexity to determine all duplicates in a sorted Singly linked-list? Select one: a. None of the answers b. O(n) c. O(1) d. O(n 2
) e. O(logn)

Answers

The worst-case time complexity to determine all duplicates in a sorted Singly linked-list is O(n).Option B is correct.

The worst-case time complexity to determine all duplicates in a sorted Singly linked-list is O(n). A singly linked list is a linked data structure consisting of nodes where each node has only one pointer to the next node in the sequence. In contrast, a doubly linked list has two pointers, one to the next node and one to the previous node.Each element in a linked list is known as a node.

The first node is called the head, and the final node is called the tail. To traverse a linked list, we start at the head and work our way through each node until we reach the tail. If we want to look for duplicates in a sorted singly linked list, we must compare each node with the one that follows it to see if they have the same value.

The time complexity of comparing each node to the next node in the sequence is O(n). The time complexity of the algorithm for determining all duplicates in a sorted Singly linked-list is O(n).

So, the correct answer is B

Learn more about nodes at

https://brainly.com/question/29306616

#SPJ11

In C#
Create a Stack Overflow like app that will keep track of users’ questions and answers. Each user will have a first name, last name, e-mail address, and registration date/time. Each question includes a question text and date/time posted. Each answer should have an answer text and date/time posted. The data model must adhere to the following business rules:
Each user can post many questions; each question is posted by one user.
Each user can post many answers; each answer is posted by one user.
Each question can have many answers; each answer applies to one question.
The app should have an interface like Homework 2. A user should be able to perform the following tasks. Structure these tasks similar to Homework 2 with a separate class and code methods within that class for each task. Create an instance of that class and call those methods from Main:
Log In. When your app first starts, ask the user for their email address. If it is already in the database, log the user in automatically, otherwise create a new user account for them. You can use DateTime.Now to store the current date/time as the registration date. You don't need to deal with passwords, just check the email address.
List all questions.
List only unanswered questions. Hint: This is the same as task 2 except you will use a .Where() LINQ method to filter only unanswered questions. Unanswered questions should have their List navigation property with .Count() == 0.
Ask a question.
Remove a question the user previously asked. You will need some business logic to prevent users from removing other users' questions or questions that don't exist.
Answer a question. Notify the user if they try to answer a question that doesn't exist.
The app should be a console app with Entity Framework Core using a SQLite database.
When listing questions, format the printing so that it looks "good" and is easy to read. Display the question ID, the user who posted it, the date it was posted, the question text, and then all answers (including user name and date answer was posted) underneath in a hierarchy. Implement the .ToString() method for each entity.
Don’t forget to include primary keys, foreign keys, and navigation properties in your entity classes. They are always required for your app to work properly even if they are omitted from the business rules.

Answers

It also defines the database context class StackOverflowContext for interacting with the database using Entity Framework Core. The StackOverflow App class includes methods for logging in

Here's an implementation of a Stack Overflow-like app in C# that adheres to the provided business rules.

using System;

using System.Collections.Generic;

using System.Linq;

using Microsoft.EntityFrameworkCore;

// Entity classes

public class User

{

   public int Id { get; set; }

   public string FirstName { get; set; }

   public string LastName { get; set; }

   public string Email { get; set; }

   public DateTime RegistrationDateTime { get; set; }

   

   public List<Question> Questions { get; set; }

   public List<Answer> Answers { get; set; }

}

public class Question

{

   public int Id { get; set; }

   public string QuestionText { get; set; }

   public DateTime PostedDateTime { get; set; }

   

   public int UserId { get; set; }

   public User User { get; set; }

   

   public List<Answer> Answers { get; set; }

}

public class Answer

{

   public int Id { get; set; }

   public string AnswerText { get; set; }

   public DateTime PostedDateTime { get; set; }

   

   public int UserId { get; set; }

   public User User { get; set; }

   

   public int QuestionId { get; set; }

   public Question Question { get; set; }

}

// Database context class

public class StackOverflowContext : DbContext

{

   public DbSet<User> Users { get; set; }

   public DbSet<Question> Questions { get; set; }

   public DbSet<Answer> Answers { get; set; }

   protected override void OnConfiguring(DbContextOptionsBuilder optionsBuilder)

   {

       optionsBuilder.UseSqlite("Data Source=stackoverflow.db");

   }

}

// Main class

public class StackOverflowApp

{

   private StackOverflowContext context;

   public StackOverflowApp()

   {

       context = new StackOverflowContext();

       context.Database.EnsureCreated();

   }

   public void LogIn(string email)

   {

       User user = context.Users.FirstOrDefault(u => u.Email == email);

       if (user != null)

       {

           Console.WriteLine("Logged in as " + user.FirstName + " " + user.LastName);

       }

       else

       {

           user = new User

           {

               Email = email,

               RegistrationDateTime = DateTime.Now

           };

           context.Users.Add(user);

           context.SaveChanges();

           Console.WriteLine("New user registered with email: " + user.Email);

       }

   }

   public void ListAllQuestions()

   {

       

           Console.WriteLine("Answer posted successfully.");

       }

       else

       {

           Console.WriteLine("Question not found or user not found.");

       }

   }

}

// Main method

public class Program

{

   public static void Main()

   {

       StackOverflowApp app = new StackOverflowApp();

       Console.WriteLine("Enter your email address:");

       string email = Console.ReadLine();

       app.LogIn(email);

       Console.WriteLine();

       Console.WriteLine("1. List all questions");

       Console.WriteLine("2. List unanswered questions");

       Console.WriteLine("3. Ask a question");

       Console.WriteLine("4. Remove a question");

       Console.WriteLine("5. Answer a question");

       Console.WriteLine();

       Console.WriteLine("Enter your choice:");

       int choice = Convert.ToInt32(Console.ReadLine());

       switch (choice)

       {

           case 1:

               app.ListAllQuestions();

               break;

           case 2:

               app.ListUnansweredQuestions();

               break;

           case 3:

               Console.WriteLine("Enter your question:");

               string questionText = Console.ReadLine();

               app.AskQuestion(questionText, email);

               break;

           case 4:

               Console.WriteLine("Enter the ID of the question you want to remove:");

               int questionId = Convert.ToInt32(Console.ReadLine());

               app.RemoveQuestion(questionId, email);

               break;

           case 5:

               Console.WriteLine("Enter the ID of the question you want to answer:");

               int answerQuestionId = Convert.ToInt32(Console.ReadLine());

               Console.WriteLine("Enter your answer:");

               string answerText = Console.ReadLine();

               app.AnswerQuestion(answerQuestionId, answerText, email);

               break;

           default:

               Console.WriteLine("Invalid choice.");

               break;

       }

   }

}

It also defines the database context class StackOverflowContext for interacting with the database using Entity Framework Core.

The Main method allows the user to interact with the app by calling the appropriate methods based on their choice.

to know more about the StackOverflow visit:

https://brainly.com/question/31022057

#SPJ11

Singlechoicenpoints 9. Which of the following refers to a type of functions that I defined by two or more function. over a specified domain?

Answers

The range of the inner function is restricted by the domain of the outer function in a composite function.The output of one function is utilized as the input for another function in a composite function.

The type of functions that are defined by two or more function over a specified domain is called composite functions. What are functions? A function is a special type of relation that pairs each element from one set to exactly one element of another set. In other words, a function is a set of ordered pairs, where no two different ordered pairs have the same first element and different second elements.  

The set of all first elements of a function's ordered pairs is known as the domain of the function, whereas the set of all second elements is known as the codomain of the function. Composite Functions A composite function is a function that is formed by combining two or more functions.

To know more about domain visit:

brainly.com/question/9171028

#SPJ11

Explain how multiprogramming is made possible for these models. How is this implemented? 2. With no multiprogramming, why is the input queue needed? Why is the Ready queue needed. 3. What performance metrics does the simulation model compute? 4. After changing some of the parameters in the model (the workload) and executing again the model: 5. What changes in the results do you notice?

Answers

1. Multiprogramming in CPU scheduling models allows a process to be loaded into main memory when the CPU is idle. This approach maximizes CPU utilization and eliminates wastage of CPU cycles. The model switches between processes based on resource availability and CPU allocation.

2. Even without multiprogramming, the input queue serves as a buffer between input devices and the CPU. Without this buffer, devices would continuously wait for the CPU, resulting in time wastage. The ready queue is also necessary as it holds processes that are ready to execute, enabling efficient process switching.

3. Performance metrics computed by the simulation model include mean waiting time, turnaround time, CPU utilization, throughput, and response time.

4. Changing parameters in the model can lead to varying results. Parameters impact the workload and scheduling, resulting in different outcomes. Therefore, modifying parameters may yield a different set of results.

5. Modifying parameters may cause the system to become overloaded, leading to longer queues, increased waiting time, and response time. Additionally, CPU utilization and throughput may decrease if an excessive number of processes overload the system.

Learn more about Multiprogramming from the given link

https://brainly.com/question/31601207

#SPJ11

1. eugene park is a senior consultant for the seven summits group, a consulting firm in denver, colorado. he is working with hardyfit tools, a manufacturer of hand tools, to improve their business operations. he has created a workbook projecting the company's orders and inventory, and asks for your help in completing and formatting the projections.

Answers

Eugene Park is seeking assistance with completing and formatting the order and inventory projections for Hardyfit Tools.

What are the key components of completing and formatting the projections for Hardyfit Tools?

To complete and format the projections for Hardyfit Tools, key components include:

Gathering accurate data on past orders and inventory levels.Analyzing market trends and customer demand to forecast future orders.Applying appropriate forecasting techniques, such as time series analysis or regression analysis, to predict future orders and inventory levels.Creating clear and organized tables or charts to present the projections.Reviewing and validating the projections for accuracy and consistency.

Eugene Park needs to gather relevant data on past orders and inventory levels to establish a foundation for the projections. By analyzing market trends and customer demand, he can make informed assumptions and predictions about future orders.

Utilizing appropriate forecasting techniques will enable him to estimate future order quantities and inventory levels. It is essential to present the projections in a clear and organized manner, using tables or charts that are easy to understand.

Finally, Eugene should carefully review and validate the projections to ensure their accuracy and consistency with the overall business strategy.

Learn more Eugene Park

brainly.com/question/31780588

#SPJ11

Consider an e-commerce web application who is facilitating the online users with certain following attractive discounts on the eve of Christmas and New Year 2019 An online user gets 25% discount for purchases lower than Rs. 5000/-, else 35% discount. In addition, purchase using HDFC credit card fetches 7% additional discount and if the purchase amount after all discounts exceeds Rs. 5000/- then shipping is free all over the globe. Formulate this specification into semi-formal technique using decision table

Answers

It's better to note that if the purchase amount exceeds Rs. 5000/- even after the deduction of all discounts, the shipping is free of cost for the online user all over the globe. Explains the discounts on the purchase made on the e-commerce web application of a company during Christmas and New Year 2019.

Decision table to calculate discounts on the eve of Christmas and New Year 2019 of an e-commerce web application which is providing an attractive discount to the online users is given below:

When an online user purchases on the eve of Christmas and New Year 2019, they are eligible for the following discounts:25% discount for purchases lower than Rs. 5000/-35% discount for purchases equal to or more than Rs. 5000/-On top of these discounts, if the online user uses an HDFC credit card, they will receive an additional 7% discount.

The discounts can be summarized in the decision table below where the columns denote the various combinations of discounts that can be applied:Purchase amount Discounts Additional HDFC discountShipping< Rs. 500025%0NoRs. 5000 or more35%7%Yes

The above decision table summarizes the discounts that the online user will get on the purchase made using the e-commerce web application of the specified company.

It's better to note that if the purchase amount exceeds Rs. 5000/- even after the deduction of all discounts, the shipping is free of cost for the online user all over the globe.

Explains the discounts on the purchase made on the e-commerce web application of a company during Christmas and New Year 2019.

To know more about purchase amount visit :

https://brainly.com/question/14719094

#SPJ11

Scientific pitch notation (SPN) is a method of representing musical pitch by combining a musical note's name with a number specifying the pitch's octave. For instance, C4, C5, and C6 are all C notes, each pitched higher than the last.
Thus, a valid note represented in SPN can consist of any letter corresponding to a musical note along with a number between 0 and 9 (inclusive). The seven musical notes are the letters A through G (inclusive). While accidentals can be included, we will ignore them for the purposes of our project.

Answers

Scientific pitch notation (SPN) is a method of representing musical pitch by combining a musical note's name with a number specifying the pitch's octave.

SPN is a standard way of describing a note's frequency, and it's used in various fields, including physics and engineering.

In SPN, a note is represented by a letter indicating the note name, followed by a number that specifies the octave in which the note resides.

For example, C4, C5, and C6 are all C notes in three different octaves.

In the standard piano, the lowest note is A0 and the highest note is C8.

A0 is the A note in the 0th octave, while C8 is the C note in the 8th octave.

Learn more about Scientific pitch notation:

https://brainly.com/question/30715014

#SPJ11

wirte java program to count characters and count words of below string
"This is a test of test"
Expected Output
Counting Chars: { =5, a=1, s=4, T=1, t=4, e=2, f=1, h=1, i=2, o=1}
Counting Words: {a=1, test=2, of=1, This=1, is=1}

Answers

Here's the Java program to count characters and words in the given string:

import java.util.HashMap;

public class CharacterWordCount {

   public static void main(String[] args) {

       String input = "This is a test of test";

       countCharacters(input);

       countWords(input);

   }

   public static void countCharacters(String input) {

       HashMap<Character, Integer> charCount = new HashMap<>();

       for (char ch : input.toCharArray()) {

           if (ch != ' ') {

               charCount.put(ch, charCount.getOrDefault(ch, 0) + 1);

           }

       }

       System.out.println("Counting Chars: " + charCount);

   }

   public static void countWords(String input) {

       HashMap<String, Integer> wordCount = new HashMap<>();

       String[] words = input.split(" ");

       for (String word : words) {

           wordCount.put(word, wordCount.getOrDefault(word, 0) + 1);

       }

       System.out.println("Counting Words: " + wordCount);

   }

}

The Java program provided above consists of two methods: `countCharacters` and `countWords`. In the main method, we initialize a string variable `input` with the given input string "This is a test of test". Then we call both the `countCharacters` and `countWords` methods.

The `countCharacters` method takes the input string and creates a HashMap called `charCount` to store the character count. We iterate over each character in the input string using a for-each loop. If the character is not a space (denoted by `ch != ' '`), we check if it already exists in the `charCount` HashMap. If it does, we increment its count by 1; otherwise, we add the character to the HashMap with a count of 1. Finally, we print the `charCount` HashMap, which gives us the desired output for counting characters.

The `countWords` method takes the input string and creates a HashMap called `wordCount` to store the word count. We split the input string into individual words using the `split` method and the space delimiter (" "). Then, for each word in the `words` array, we check if it already exists in the `wordCount` HashMap. If it does, we increment its count by 1; otherwise, we add the word to the HashMap with a count of 1. Finally, we print the `wordCount` HashMap, which gives us the desired output for counting words.

Learn more about Java program

brainly.com/question/2266606

#SPJ11

Write a program to check given string is palindrome or not using recursion ( in java)

Answers

The program in Java to check whether the given string is a palindrome or not using recursion is as follows:import java.util.Scanner;class Palindrome{ public static void main(String args[]){ String str, rev = ""; Scanner sc = new Scanner(System.in).

system.out.print in("Enter a string:"); str = sc.nextLine(); int length = str.length(); for ( int i = length - 1; i >= 0; i-- ) rev = rev + str.charAt(i); if (str.equals(rev)) System.out.println(str+" is a palindrome"); else System.out.println(str+" is not a palindrome"); }}.The program is about checking whether the given string is a palindrome or not using recursion. Here the program first takes the input string using a scanner and stores it in the variable str. After that, the length of the input string is calculated using the .length() function and stored in the variable length.

Then the main logic starts using a for loop to traverse the string in reverse order to store the reversed string in a variable rev. This is done by starting from the last character of the string and storing it in the rev variable and continuing the loop till the first character of the string is reached.

To know more about Java visit:

https://brainly.com/question/33208576

#SPJ11

What are the advantages and disadvantages of client–server LANs

Answers

Client-Server LANs are a type of network architecture that makes use of a central server to deliver resources and services to multiple clients. A client is a device or computer that receives data or services from a server.

Here are some advantages and disadvantages of client-server LANs.

Advantages of Client-Server LANs:Improved Security: In a client-server LAN environment, data can be backed up, and disaster recovery mechanisms can be put in place to prevent data loss. This can increase the security of data in the network.

Ease of Management: Client-Server LANs make it easy to manage network resources, as the server has control over who can access data or services. This also makes it easier to deploy new applications to the network because administrators can update a single server instead of every client computer.

Centralization: By having a central server that manages network resources, client-server LANs can make more efficient use of hardware. This helps businesses save money by allowing them to purchase fewer computers and storage devices.

Disadvantages of Client-Server LANs:Expensive: Implementing a client-server LAN can be costly, as the server and associated hardware and software must be purchased.

Learn more about client-server at

https://brainly.com/question/30042674

#SPJ11

Other Questions
which economic system is mostly closely Associated with the activities shown in this art work? A) manorialism B) capitalism C) communism D) socialism The degrees of freedom associated with SSE for a simple linear regression with a sample size of 32 equals:O 31 O 30O 32 O 1 Which of the following is correct?A.Bread is an example of a good that is nonrival in consumptionB.Internet service is a good example of a price-excludable public good.C.Clubs are a means of providing congestible public goods through markets.D.National defense is an example of a price-excludable public good. You're going write a Java program that will prompt the user to enter in certain information from the user, save these words to a number of temporary String variables, and then combine the contents of these variables with some other text and print them on the screen.The prompts should look like the following:(1) Enter your first name:(2) Enter your last name:(3) Enter your age:(4) Enter your favorite food:(5) Enter your hobby: Use critical thinking to analyze issues:- Creativity and innovation at the organisational level What are the three images in IPE and what is the second image reversed?What is Open economy Politics?What does an "interests" based analysis in IPE mean?How do "domestic structures" influence international policy according to Peter Katzenstein?How do instructions impact trade policies?What is the "two-level game" Metaphor?What is the declinist point of view regarding the effects of globalization on the welfare state?What is the transformationist response to the declinist point of view?Why has constructivism remained relatively marginal in orthodox IPE?Why is the domestic politics approach more compatible with the liberal paradigm? Beauty Cosmetic produces hair tonic through two manufacturing processes; Mixing and Packaging. Production begins in the Mixing Department where materials are added at the beginning of the process and conversion costs are incurred uniformly throughout the process. The company uses a weighted average process costing system to accumulate production and cost data. On 1 January 2022, the beginning work in process inventory consist of 13,000 units, which were 40% complete. The company incurred a total cost of RM255,575 and RM220,800 of which were materials costs. Cost and production data for the month of January are as follows: Materials added Conversion costs incurred Units completed and transferred out in January Units in ending work in process on 31 January (70% complete) RM309,450 RM176,800 26,2509,000Required (a) Compute the physical units, equivalent units of production for materials and conversion costs in the Mixing Department for the month of January. Show all your workings. (b) Compute the costs assigned to the ending work in process inventory on 31 January. Show all your workings. (c) Compute the costs accounted for the month of January. Show all your working. Compute the mean, median, and mode of the data sample. (If every number of the set is a solution, enter EVERY in the answer box.) \[ 2.4,-5.2,4.9,-0.8,-0.8 \] mean median mode please briefly describe the steps un the marketing researchprocess. (think flow chart)and which steps are the most important?Please briefly describe the steps in the marketing research process (think "fow chart"). Which step is the most important? For the toolbar, press ALT \( +F 10(P C) \) or \( A L T+F N+F 10 \) iMari Computer System Architecture Performance Evaluation SystemInstruction:Create a program to evaluate the performance of a computer system. wrigte an equation of the line in point -slope form that passes through the given points. (2,5) and (3,8) The random variable X is given by the following PDF. f(x)={ 23(1x 2),0x1 A. Check that this is a valid PDF B. Calculate expected value of X C. Calculate the standard deviation of X if z=x^2-5x^2+2y^6 where x=cos(3m) and y=sin(3m) find dz/dm whenm=pi/4 Ben Gordon, Inc. manufactures 2 products, wheels and seats. The company has estimated its overhead in the assembling department to be $660, 000. The company produces 300, 000 wheels and 600, 000 seats each year. Each wheel uses 2 parts, and each seat uses 3 parts. How much of the assembly overhead should be allocated to wheels? $165, 000. $220, 000. $264, 000. $282, 856. 4To repair a large truck or bus, a mechanicmight use a parallelogram lift. The figureshows a side view of the lift. FGKL, GHJK,and FHJL are parallelograms. Check all that apply "please do not give the same answer as the other 2 questionsposted. they are wrong1. (2 marks) Consider preferences defined over the nonnegative orthant by \( \left(x_{1}, x_{2}\right) \succeq\left(y_{1}, y_{2}\right) \) if and only if \( \left(2 x_{1}+x_{2}\right)^{3} \geq\left(2 " For the purposes of Assignment 2, you will be using your final database design for Assignment 1. You will be required to write a number of SQL scripts to create the database, its tables and populate it with some data.1. Using your DBMS (SQL Server, or MySQL) create the Urban Real Estate Database.2. Write an SQL script that will create the tables for the Urban Real Estate Database based on your design. You tables should include the proper field names, data types, and any specific details such as allowing or not allowing null values.3. Write a script or series of scripts that will populate the tables with the following details. Create 5 employees of your choice, 3 of which are agents Add 10 clients Add 6 properties to the properties tables ( include the required details) Add 4 complete transactions where at least one is a rental Populate any lookup tables that your design may include (this is for items like property types or transaction types.4. Write a script that will display the Client details for the clients that have purchased a property.5. Write a script that will show the properties that each agent has listed grouped by agent.6. Write a script that will show the commission earned for each agent ( Must use a calculated field for this The Ohm Depot Co. is currently considering the purchase of a new machine that would increase the speed of manufacturing electronic equipment and save money. The net cost of the new machine is $ 66,000. The annual cash flows have the following projections:YearAmount ($)0( 66,000)121,000229,000336,000416,00058,000If the cost of capital is 10 percent, find the following:a. The NPVb. The IRR_c. Payback_ Increased blood vessel formulation is a predictive factor in survival for a certain disease. One treatment is stem cell transplantation with the patient's own stem cells. The accompanying data table represents the microvessel density for patients who had a complete response to the stem cell transplant. The measurements were taken immediately prior to the stem cell transplant and at the time the complete response was determined. Complete parts (a) through (d) below.Patient Before After1 171 2532 199 1123 247 2824 355 2345 377 2326 429 1857 411 266The T stat is 2.10b. The p-value is 12. Which of the following day count conventions applies to a US Treasury bond?A. Actual/360B. Actual/Actual (in period)C. 30/360D. Actual/365