another term for a formulat that outlines how to execute a task

Answers

Answer 1

The term for a formula that outlines how to execute a task is "algorithm".

The term that refers to a formula or set of instructions for performing a task is known as an algorithm. It is a step-by-step procedure designed to accomplish a specific goal, such as solving a mathematical problem, organizing data, or carrying out a complex calculation. Algorithms can be expressed in various ways, such as in pseudocode, flowcharts, or programming languages, and they are used in a variety of fields, including computer science, mathematics, engineering, and business. An algorithm can be very simple or incredibly complex, depending on the task it is designed to perform.

You can learn more about algorithm at

https://brainly.com/question/13902805

#SPJ11


Related Questions

what is the rfi manager? a. the person who configured the rfis tool on the project b. a user who is in charge of contacting the external contractor when the rfi has been resolved c. the creator of the rfi d. a user who will receive notification emails when the rfi is responded to or updated

Answers

The RFI Manager is a user who receives notifications when an RFI is responded to or updated.

Option D. A user who will receive notification emails when the RFI is responded to or updated

Role of the RFI Manager

The RFI Manager is a user who receives notification emails when an RFI is responded to or updated. This allows the RFI manager to stay updated on the progress of the RFI and ensure that the external contractor is providing the appropriate response or resolution in a timely manner. The RFI manager is also responsible for configuring the RFI tool on the project, as well as contacting the external contractor when the RFI has been resolved.

Learn more about RFI Manager: https://brainly.com/question/16788821

#SPJ4

window is to pane as book is to​

Answers

Answer:

is to pages

Explanation:

Answer:

A window is made up of panes, and a book is made up of pages. The answer is not (choice a) because a novel is a type of book. The answer is not (choice b) because glass has no relationship to a book. (Choice c) is incorrect because a cover is only one part of a book; a book is not made up of covers.

is to the page

Explanation:

how do you display hyperlinks without an underline?

Answers

You can display hyperlinks without an underline by using the CSS "text-decoration: none" property. You can add this to the link's CSS selector

a {

  text-decoration: none;

}

What is Hyperlinks?
Hyperlinks are pieces of code that allow users to click on text or images, and be taken to a different webpage or document. They are often used to navigate between different webpages within a website, as well as to link to other websites. Hyperlinks can also be used to link to files such as PDFs, Word documents, or even images. Hyperlinks are created using HTML code, which is a type of programming language used to create websites.

To know more about Hyperlinks
https://brainly.com/question/23413848
#SPJ4

9. What are the arguments for and against Java's implicit heap storage recovery, when compared with the explicit heap storage recovery required in C++? Consider real-time systems 10. Analyze and write a comparison of using C++ pointers and Java reference variables to refer to fixed heap-dynamic variables. Use safety and convenience as the primary considerations in the comparison

Answers

The implicit heap storage recovery feature in Java allows for automatic object memory allocation and deallocation without the need for explicit programming. Nevertheless, C++ demands explicit heap storage recovery through the use of new and delete or malloc and free.

Supporters of Java's implicit heap storage recovery include:

1) Safety: Java's implicit heap storage recovery lowers the possibility of memory leaks, which can cause crashes or unpredictable behavior in C++ programs. Memory leaks happen when memory is allocated but not released, resulting in memory loss and possible instability.

2) Convenience: Java's implicit heap storage recovery does away with the necessity for explicit memory management code, which speeds up and improves the convenience of programming. Instead of worrying about memory management minutiae, developers may concentrate on the logic of the program.

Detractors of Java's implicit heap storage recovery include:

1) Performance: Because the JVM must handle memory allocation and deallocation at runtime, Java's implicit heap storage recovery might result in overhead. Real-time systems or applications that need minimal latency may suffer as a result.

2) Predictability: As the garbage collector decides when memory will be allocated or deallocated, Java's implicit heap storage recovery may make it more challenging to forecast when memory will be allocated or deallocated. This can result in unexpected behavior and make memory consumption optimization more challenging.

Comparison of Java reference variables and C++ pointers for fixed heap-dynamic variables

1) Safety: Due to the fact that they cannot be dereferenced to null or random memory locations, Java reference variables are usually thought to be safer than C++ pointers. This removes the chance of accessing erroneous memory and resulting in segmentation issues.

2) Convenience: Java reference variables are easier to use than C++ pointers since they take care of memory management automatically. Programming becomes quicker and simpler as a result of the removal of the necessity for explicit memory management code.

3) Performance: Because C++ pointers allow for direct memory access and manipulation, they are typically faster than Java reference variables. This can be crucial in real-time systems or programs that need to have little latency.

4) Predictability: Because C++ pointers allow for direct control over memory allocation and deallocation, they offer greater predictability than Java reference variables. This can make it simpler to forecast program behavior and optimize memory use.

To know more about Java

brainly.com/question/12974523

#SPJ4

a server is a special kind of computer that manages access to resources such as files, applications, peripherals, emails, and webpages

true or false

Answers

Answer:

true

Explanation:

The answer to this question is true

Help FAST PLS in complete sentences discuss the process used to determine your credit score. Do you think it is fair? Why or why not? Make sure to use complete sentences.

Answers

Answer:

A fair credit score just means that the credit reference agencies think you're doing an okay job of managing your credit history. ... This means lenders could reject you for some of the best credit cards or loans

Q2-2) Answer the following two questions for the code given below: public class Square { public static void Main() { int num; string inputString: Console.WriteLine("Enter an integer"); inputString = C

Answers

The code given below is a basic C# program. This program takes an input integer from the user and computes its square. The program then outputs the result. There are two questions we need to answer about this program.

Question 1: What is the purpose of the program?The purpose of the program is to take an input integer from the user, compute its square, and output the result.

Question 2: What is the output of the program for the input 5?To find the output of the program for the input 5, we need to run the program and enter the input value. When we do this, the program computes the square of the input value and outputs the result. Here is what the output looks like:Enter an integer5The square of 5 is 25Therefore, the output of the program for the input 5 is "The square of 5 is 25".The code is given below:public class Square {public static void Main() {int num;string inputString;Console.WriteLine("Enter an integer");inputString = Console.ReadLine();num = Int32.Parse(inputString);Console.WriteLine("The square of " + num + " is " + (num * num));}}

To know more about output  visit:

https://brainly.com/question/14227929

#SPJ11

in multiple inheritance, if some members in parent classes overlap, what classes must be defined as virtual?

Answers

In multiple inheritance, if some memebers of the base classes or parent classes, then the base or parent class must be defined as a virtual class and access into child class as a public virtual class.

In multiple inheritance, sometimes the members of the base classes inherited into multiple classes which create ambiguity or confusion. for example, if a base class A is inherited in child class B, and B class is inherited by C, and class D is inherited by both B and C. Then it makes the ambiguity in accessing the members of class. for example, in this scenario, in class D, B and C both inherited by A and there members function duplicated.

#include <iostream>

using namespace std;

class A {

  public:

  int number;

  showNumber(){

     number = 10;

  }

};

class B : public virtual A {

};

class C : public virtual A {

};

class D : public C, public B {

};

int main(){

  //creating class D object

  D object;

  cout << "Number = " << object.number << endl;

  return 0;

}

The above program print 10.

You can learn more about multiple inheritance at:

https://brainly.com/question/14212851

#SPJ4

what are the major responsibilities of the office of inspector general as they relate to coded healthcare data?

Answers

The office of inspector general is primarily responsible for conducting audits and investigations into all facets of the agency's programs and operations with regard to coded healthcare data.

What is the Office of Inspector General's primary focus?

Since its establishment in 1976, the Office of Inspector General (OIG) has spearheaded national initiatives to reduce waste, fraud, and abuse while enhancing the efficiency of Medicare, Medicaid, more than 100 additional programs run by the Department of Health & Human Services (HHS).

What are IG inspections used for?

Inspections. The IG conducts inspections to offer commanders with input so they can take action to strengthen the command and proactively address problems that have an impact on unit readiness and warfighting capacity.

To know more about programs visit:-

https://brainly.com/question/11023419

#SPJ4

choose the answer. which of the following is a computer or device that manages other computers and programs on a network?

Answers

The option that is a computer or device that manages other computers and programs on a network is option A: Servers.

What is a server used for?

A server is a piece of hardware or software that offers a service to a client and it is also known as another computer program and its user. The actual computer that a server program runs on is usually referred to as a server in a data center.

Therefore in the context of the above, Computers called servers store shared data, software, and the network operating system. All users of the network have access to network resources thanks to servers.

Learn more about Servers from

https://brainly.com/question/27960093
#SPJ1

See full question below

choose the answer. which of the following is a computer or device that manages other computers and programs on a network?

Servers

Operating system

Node

Internodes

If a coach sent a weekly update to her team every week, it would be to her benefit to create a _____ to expedite the process.

confidential group
contact group
custom contact
networked group

Answers

Answer:

contact group

Explanation:

Answer:

contact group

Explanation:

did someone hang themselves on set of wizard of oz

Answers

No - its a rumour that has been going around since the films 50th anniversary in 1989.

how can robotics provide help for a community

intial answer :
revised answer :
final answer :​

Answers

Robotics can provide help for a community in many ways. They can help with things like manufacturing, agriculture, construction, and even healthcare. Robotics can also help with things like disaster relief and search and rescue missions.

What is Robotics?
An interdisciplinary area of computer science & engineering is robotics. Design, construction, use, and operation of robots are all part of robotics. Robotics aims to create devices that can aid and support people. Mechatronics, electronics, bioengineering, computer science, control engineering, software engineering, arithmetic, and other disciplines are all integrated into robotics. Robotics creates machines that can replace humans and imitate human behaviour. Robots can take on any shape, but some are designed to look like humans. This is allegedly helpful in getting people to accept robots performing some replicative behaviours that are typically done by people. These robots make an effort to imitate any human activity, including walking, lifting, speaking, and thinking. The field of bio-inspired robotics has benefited from the inspiration of nature found in many of today's robots.

To learn more about Robotics
https://brainly.com/question/28484379
#SPJ1

pls answer i need to turn it in today!!

In computing flowcharts how are decisions represented?

What is the command used most for decisions?

Answers

Answer:

See Explanation

Explanation:

How decisions are represented?

In flowcharts, decisions are represented using diamond shapes (see attachment)

Decisions could be conditional statement or repetition operations which may have the form of loops or iterations.

Either of theses are represented using the diamond shapes.

Take for instance:

To check if a is greater than b... Simply write if a > b i the diamond box

Command used for most decisions

Most decisions are conditional statements; hence, the if command is often used for decisions.

pls answer i need to turn it in today!!In computing flowcharts how are decisions represented?What is

If the start index is __________ the end index, the slicing expression will return an empty string.

Answers

Answer:

"Greater than."

Explanation:

The designated end of a string cannot be reached from the start. For example, if you had a list labeled 'colors' (colors = [1,2,3,4]) and then you tried to bring back that list using colors[1:0], you will recieve an empty string. However, if the starting is lower than the final index, then your program will run. For example, if you use colors[0:1], you will be given the output: [1].

vpn connection failed due to unsuccessful domain name

Answers

The fact that the VPN connection failed due to a failed DNS resolution indicates that there are DNS problems with Cisco VPN. By fiddling with your DNS settings, you can get around this solution. Additionally, this problem can be resolved by changing the content of important files.

What is the DNS Setting

The term "Domain Name System" (DNS) is used. By comparing human-readable domain names (like wpbeginner.com) with the distinctive ID of the server hosting a website, it is a mechanism that enables you to access websites.

Imagine the DNS system as the phone directory for the internet. Instead of listing names and phone numbers for individuals, it lists domain names together with the matching identifiers known as IP addresses. On a user's device, typing a domain name

To know more about DNS Settings Visit here

https://brainly.com/question/28562001

#SPJ4

using the csv file of flowers again, fill in the gaps of the contents of file function to process the data without turning it into a dictionary. how do you skip over the header record with the field names?

Answers

To skip over the header record with the field names in the contentsoffile function, you can use a simple loop to loop through each row of the data and check if the first item in the row is equal to the name of the header field. For example:

def contents_of_file(filename):

   with open(filename) as f:

       reader = csv.reader(f)

       for row in reader:

           if row[0] != 'name':

               # process row data

This way, you can skip over the header record and just process the rows of data that contain the actual flower information.

Learn more about programming:

https://brainly.com/question/26134656

#SPJ4

I need help with this :(( In java
Write a program that has a user guess a secret number between 1 and 10.

Store the secret number in a variable called secretNumber and allow the user to continually input numbers until they correctly guess what secretNumber is.

For example, if secretNumber was 6, an example run of the program may look like this:

I'm thinking of a number between 1 and 10.
See if you can guess the number!
Enter your guess: 4
Try again!
Enter your guess: 3
Try again!
Enter your guess: 1
Try again!
Enter your guess: 10
Try again!
Enter your guess: 6
Correct!
Note:
Make sure that the the secretNumber is 6 when you submit your assignment! It will only pass the autograder if the value is 6.

Answers

Java is an object-oriented coding software used to develop software for a variety of platforms.

What does programmer do in Java?

When a programmer creates a Java application, the compiled code is compatible with the majority of operating systems (OS), including Windows, Linux, and Mac OS.

For writing a program that has a user guess a secret number between 1 and 10 it can be done as follows:

import random

secretNum = random.randint(1,10)

userNum = int(input("Take a guess: "))

while(userNum != secretNum):

   print("Incorrect Guess")

   userNum = int(input("Take a guess: "))

print("You guessed right")

Thus, by using this program, one can execute the given condition.

For more details regarding Java, visit:

https://brainly.com/question/12978370

#SPJ1

What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(6E_{hex}\)

Explanation:

Required

\(1001011_2 + 100011_2 = []_{16}\)

First, carry out the addition in binary

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(1101110_2\)

The step is as follows (start adding from right to left):

\(1 + 1 = 10\) --- Write 0 carry 1

\(1 + 1 + 1(carry) = 11\) ---- Write 1 carry 1

\(0 + 0 + 1(carry) = 1\) ---- Write 1

\(1 + 0 = 1\) --- Write 1

\(0 + 0 = 0\) ---- Write 0

\(0 + 0 = 0\) ---- Write 0

\(1 + 1 = 10\) --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(1101110_2\)

Next, convert \(1101110_2\) to base 10 using product rule

\(1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0\)

\(1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0\)

\(1101110_2 = 110_{10}\)

Lastly, convert \(110_{10}\) to hexadecimal using division and remainder rule

\(110/16 \to 6\ R\ 14\)

\(6/16 \to 0\ R\ 6\)

Write the remainder from bottom to top;

\(110_{10} = 6(14)_{hex}\)

In hexadecimal

\(14 \to E\)

So, we have:

\(110_{10} = 6E_{hex}\)

Hence:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(6E_{hex}\)

How prepared are you to lead a Internet-based project?

Check all that apply.

I have used an online chat application.

I enjoy solving problems or starting new activities.

I have met with other students online using a web-based conferencing service.

I am comfortable navigating my way around the Internet.

I am an excellent
communicator.

I know how to create and use slide-based presentation software.

Answers

Answer:

Yes all the answers are correct because it says how prepared are you it is asking about you so it is what ever you think

Explanation:

To prepare for leading an internet-based project are:

A. I have used an online talk application.

C. I have met with other students online using a web-based conferencing service.

E. I am an excellent communicator.

F. I know how to create and use slide-based presentation software.

What is an internet-based project?

They are projects that incorporate the usage of the Internet over the course of several lessons. A project that involves students communicating, finding, process, and reporting on material found on external Websites using the Internet.

Nowadays, projects are made on computers because there is so much on the internet and due to technology, information will become very easy to get and its good for students and teachers.

Therefore, the correct options are A, C, E, and F.

To learn more about the internet-based project, refer to the link:

https://brainly.com/question/22076518

#SPJ5

Describe the architecture of modern web applications. How does the architecture of modern web applications drive attacker behavior?

Answers

The architecture of modern web applications can be described as complex and distributed, consisting of multiple layers and components that work together to deliver functionality to end-users.

This architecture typically includes frontend components (such as HTML, CSS, and JavaScript), backend components (such as application servers and databases), and various APIs and services that enable communication and data exchange between different components.

The modern web application architecture also often involves the use of cloud infrastructure, microservices, and containerization, which further increase complexity and introduce new attack vectors for malicious actors. For example, the use of microservices means that an attacker can potentially gain access to a large number of interconnected services by exploiting a single vulnerability in one of them.

The architecture of modern web applications can drive attacker behavior in several ways. First, the complexity of the architecture makes it more difficult to secure, as there are more attack surfaces and potential vulnerabilities. Second, the distributed nature of modern web applications means that there are more potential points of entry for attackers, as they can target different components and layers of the architecture.

To know more about architecture visit:

https://brainly.com/question/20505931

#SPJ11

Months Write a program that will ask the user for a month as input in numeric format and print out the name of the month. Here is a sample run: Enter the Month: 9 It is september!

Answers

The program prompts the user to enter a month in numeric format and then prints the corresponding name of the month. For example, if the user enters 9, the program will output "It is September!" as the result.

To implement this program in Python, we can define a dictionary that maps numeric month values to their corresponding names. The program will ask the user to input a numeric month value. It will then retrieve the corresponding month name from the dictionary and print it along with a message. Here's an example implementation:

def print_month_name():

   month_dict = {

       1: "January",

       2: "February",

       3: "March",

       4: "April",

       5: "May",

       6: "June",

       7: "July",

       8: "August",

       9: "September",

       10: "October",

       11: "November",

       12: "December"

   }

   month_number = int(input("Enter the Month: "))

   if month_number in month_dict:

       month_name = month_dict[month_number]

       print("It is", month_name + "!")

   else:

       print("Invalid month number.")

print_month_name()

In this program, the dictionary month_dict maps numeric month values (keys) to their corresponding month names (values). The program prompts the user to enter a month number. If the entered number exists as a key in the dictionary, the corresponding month name is retrieved and printed along with the message "It is [month name]!". If the entered number is not found in the dictionary, an error message is displayed.

Learn more about Python here: https://brainly.com/question/30427047

#SPJ11

a. a large central network that connects other networks in a distance spanning exactly 5 miles. b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings. c. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). d. a network spanning a large geographical area (up to 1000s of miles). e. a network spanning exactly 10 miles with common carrier circuits.

Answers

Complete Question:

A local area network is:

Answer:

b. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings.

Explanation:

A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings.

Generally, some of the network devices or equipments used in a local area network (LAN) are an access point, personal computers, a switch, a router, printer, etc.

predict what the world would be like if no one tried to think critically. explain your predictions

Answers

The world would be in chaos and we would all be dead duh.

Multiple Select

In what

ways

does

a computer network make setting appointments easier?

0, by reassigning workloads to enable attendanre

0 by sending out invitations

by telephoning those involved

providina a common calendar

Answers

A computer network can provide a shared calendar system that allows users to view and update schedules in real-time. This eliminates the need for back-and-forth emails or phone calls to confirm availability and schedule appointments.

Sending out invitations: With a computer network, users can send out electronic invitations that include all the necessary details about the appointment, such as the date, time, location, and attendees. This reduces the chances of miscommunication and ensures that everyone has the same information. Reassigning workloads to enable attendance: In some cases, a computer network can help redistribute workloads to enable more people to attend appointments. For example, if one team member is unable to attend a meeting, they can still participate remotely via video conferencing or other collaboration tools.

A computer network allows users to send out invitations to appointments through email or scheduling applications, ensuring that all invitees receive the information and can confirm their attendance. A computer network also facilitates the use of shared or common calendars, which can help users view and coordinate appointments with others, making it easier to find suitable time slots and avoid scheduling conflicts.

To know more about computer network visit:

https://brainly.com/question/14276789

#SPJ11

Most brass instruments have a ____________________, ____________________, ____________________, and, ____________________.
Bells
Composer
Control
French horn
Highest
Hunting
Largest
Left
Lowest
Mouthpiece
Mute
Oldest
Pitch
Smallest
Tubing
Sousaphone
Trombone
Trumpet
Tuba
Valves

Answers

mouthpiece pitch mute valves

He bring out the paddle, ready to use it on her

Answers

im confused what is the question

How to solve eror: array must be initialized with a brace-enclosed initializer

Answers

A comma-separated set of constant expressions encased in braces () serves as an array's initializer. An equal symbol (=) is placed in front of the initializer. Not every element in an array needs to be initialised.

The array will have random values at each memory place if it is not initialised at the moment of declaration or at any point thereafter. Because zero is the default value for omitted array elements, the compiler will set the first array element to the value you've specified (zero) and all remaining array elements will also be set to zero. 0 for char ZEROARRAY[1024]; The unwritten entries would be filled with zeros by the compiler. As an alternative, you might launch the programme with memset to initialise the array: ZEROARRAY, 0 0 1024;

To learn more about array's click the link below:

brainly.com/question/19570024

#SPJ4

Which term refers the process of giving keys to a third party so that they can decrypt and read sensitive information if the need arises?

Answers

The term that refers to the process of giving keys to a third party so that they can decrypt and read sensitive information if the need arises is called "key escrow." In this process, the keys used for encryption are entrusted to a third party, such as a trusted authority or organization, for safekeeping.

1. Encryption: Sensitive information is encrypted using a specific encryption algorithm and a unique encryption key.
2. Key Escrow: The encryption key is securely stored with a trusted third party, known as the escrow agent.
3. Access Request: If there is a need to decrypt and read the sensitive information, the authorized party can request access from the escrow agent.
4. Key Release: Upon verifying the identity and authority of the requester, the escrow agent releases the encryption key.
5. Decryption: The authorized party can now use the encryption key to decrypt the information and access its contents.

Key escrow is commonly used in scenarios where access to sensitive information may be necessary in certain circumstances, such as law enforcement investigations or emergency situations. It provides a way to balance the need for privacy and security with the requirement for lawful access to encrypted data.

In conclusion, key escrow is the process of entrusting encryption keys to a third party for the purpose of decrypting sensitive information if needed.

Learn more about key escrow: https://brainly.com/question/33480153

#SPJ11

Why is a disorganized room considered a study distraction? Check all that apply.

-Clutter is distracting.
-Students waste time searching for supplies.
-It is nearly impossible to read in messy spaces.
-Disorganized rooms are poorly lit.
-Important papers can get lost.
-Study materials and books can get misplaced.

Answers

Answer:-Clutter is distracting.

-Students waste time searching for supplies.

-Important papers can get lost.

-Study materials and books can get misplaced.

Explanation:

Answer:

A,B,E,F

Explanation:

Clutter is distracting.

Students waste time searching for supplies.

Important papers can get lost. 

Study materials and books can get misplaced. 

Other Questions
Write an equation of the line with a slope : -3/4 and y-intercept : -1/4 . A month later into your work, you were conducting your weekly PC maintenance; you discovered that most of the laptops fell victim to the Blue Screen of Death errors. Apply your operating systems knowledge, to explain to the IT manager what could have caused this and what should be done to resolve the problem. A business owner who takes risk describes which of the following?a. Entrepreneurb. Status quoC.Inventord. Entrepreneurship What is the difference between explicit and implicit prejudice? How have thesechanged over time? FILL IN THE BLANK. a __________ is a dna stretch of 180 bp that specifies a 60 amino acid homeodomain. two poverty alleviation programmes What is the monitoring delay in cw mode on the sunsdr2 dx?. Your task now is to implement a bootstrap re-sampling method and determine several bootstrap confidence intervals. For this problem, do not use the boot package. You are expected to "manually" implement the bootstrap method. Part a) Percentile Method Given the following vector of 10 measurements x=c(14.42,11.44,7.99,11.33,6.74,10.95,9.87,9.43,7.58,8.21) Construct 10,000 bootstrap re-samples, and determine the upper and lower bounds of the 95% confidence interval for the sample mean, using the percentile method. Be sure to take exactly 10,000 re-samples. Create an R vector of length two, so that the first and the second entries are the lower and the upper end points of your confidence interval, respectively. Note: Due to randomness you will never get the same exact bootstrap distribution or Cl. However, you should be well within 1% of the Cl used to check your answer (the autograder takes this into account) In trapezoid ABCD, O is the point of intersection from the diagonals. The area of AOD is 15 ft^2. The altitudes from B and O to the longer base are in a 5:3 ratio. Find the area of ABD and the area of MOC if M is the midpoint of the leg CG Lupe y Guillermo ___ mucho en la clase de arte Place the human into each of the seven hierarchical taxonomic categories, beginning with Kingdom and ending with the scientific name.1. Kingdom - Animalia2. Phylum - ? _______________3. Class - ? _______________4. Order - ? _______________5. Family - ? _______________6. Genus - ? _______________ please help with my problem 20 + 20 25 3. (30 %) Find an equation of the tangent line to the curve at the given point. (a) x = 2 cot 0 , y = 2sin0,(-73) (b) r = 3 sin 20, at the pole Suppose a Canadian company has to pay 5 m sometime during the next 3 months. To hedge this the importer buys options on the , and the option premium is $0.0220/, for options with K = $1.50/ What is the actual amount that the importer will pay if the spot rate at the end of 3 months is $1.46/? Suppose a Canadian company has to pay 5 m sometime during the next 3 months. To hedge this the importer buys options on the , and the option premium is $0.0220/, for options with K = $1.50/ What is the actual amount that the importer will pay if the spot rate at the end of 3 months is$1.46/? $ 1.022 / $ 0.022 / $ 1.46 / $ 1.482 / If f(1) = 1 and f(n) = -3f(n-1) then find the value of f(5). Which of the following is an example of a worker strike?Drivers refuse to follow traffic lights.People at a grocery store refuse to stand in a check-out line.All the teachers in a school refuse to work for a day.A child refuses to eat broccoli. Percent Composition of Sugar in Bubble Gum(Please see the questions in the image) What is the moral of the story turtles all the way down? Suppose that the Duration of Assets (DA) is 5 years and the duration of liabilities (DL) is 3 years. The current market value of assets is 100 million pounds and the market value of liabilities is 80 million pounds. What would be the effect (loss or gain) on the market value of equity (dE) if interest rates increase from 5% p.a. to 7% p.a. ? during the message development process, business professionals should identify the ______ their ideas clearly.