Assignment 7A: Rare Collection. We can make arrays of custom objects just like we've done with ints and strings. While it's possible to make both 1D and 2D arrays of objects (and more), for this assignment we'll start you out with just one dimensional arrays. Your parents have asked you to develop a program to help them organize the collection of rare CDs they currently have sitting in their car's glove box. To do this, you will first create an Audio CD class. It should have the following private attributes. . . String cdTitle String[4] artists • int release Year • String genre • float condition .

Answers

Answer 1

AudioCD class has a constructor that takes in the private attributes as arguments, and initializes them. With this AudioCD class, you can now create an array of AudioCD objects to represent your parents' rare CD collection.

Here's an implementation of the AudioCD class with the private attributes specified in the assignment:

class AudioCD {

 private:

   string cdTitle;

   string artists[4];

   int releaseYear;

   string genre;

   float condition;

  public:

   // Constructor

   AudioCD(string title, string artists[4], int year, string genre, float condition)   {

     cdTitle = title;

     for (int i = 0; i < 4; i++) {

       this->artists[i] = artists[i];

     }

     releaseYear = year;

     this->genre = genre;

     this->condition = condition;

   }

   // Getters

   string getTitle() {

     return cdTitle;

   }

   

   string* getArtists() {

     return artists;

   }

   

   int getReleaseYear() {

     return releaseYear;

   }

   

   string getGenre() {

     return genre;

   }

   

   float getCondition() {

     return condition;

   }

   

   // Setters

   void setTitle(string title) {

     cdTitle = title;

   }

   

   void setArtists(string artists[4]) {

     for (int i = 0; i < 4; i++) {

       this->artists[i] = artists[i];

     }

   }

   

   void setReleaseYear(int year) {

     releaseYear = year;

   }

   

   void setGenre(string genre) {

     this->genre = genre;

   }

   

   void setCondition(float condition) {

     this->condition = condition;

   }

};

Note that the AudioCD class has a constructor that takes in the private attributes as arguments, and initializes them. It also has getter and setter methods for each attribute to allow access to and modification of the object's state.

With this AudioCD class defined, you can now create an array of AudioCD objects to represent your parents' rare CD collection.

To learn more about array : https://brainly.com/question/16644287

#SPJ11


Related Questions

write a program that declares and initializes 2 integer variables var1 and var2 with the values 600 and 30, and calculates their sum, difference, product, and quotient. finally, print the values out. the output should look like this exactly:

Answers

In this program, we declare and initialize two integer variables, `var1` and `var2`, with the values 600 and 30, respectively. Here is a program in Python that accomplishes the task you described:
var1 = 600
var2 = 30
sum = var1 + var2
difference = var1 - var2
product = var1 * var2
quotient = var1 / var2
print("Sum: ", sum)
print("Difference: ", difference)
print("Product: ", product)
print("Quotient: ", quotient)
In this program, we declare and initialize two integer variables, `var1` and `var2`, with the values 600 and 30, respectively. We then calculate the sum, difference, product, and quotient of these two variables. Finally, we print out the values of these calculations.
The output of the program will look exactly like this:
Sum: 630
Difference: 570
Product: 18000
Quotient: 20.0
The sum of `var1` and `var2` is 630, the difference is 570, the product is 18000, and the quotient is 20.0.

To know more about Python visit:

https://brainly.com/question/30391554

#SPJ11

If a salesperson were trying to sell this cabin, which word would be best to use to make its size seem most positive?

small
tiny
cozy
little

THE ANSWER IS C. cozy

Answers

cozy because it gives it more of a positive connotation

Answer:

c

Explanation:

other people said it

A __________ error does not prevent the program from running, but causes it to produce incorrect results. A. Syntax b. Hardware c. Logic d. Fatal 2. A __________ is a single function that the program must perform in order to satisfy the customer. A. Task b. Software requirement c. Prerequisite d. Predicate 3. A(n) __________ is a set of well-defined logical steps that must be taken to perform a task. A. Logarithm b. Plan of action c. Logic schedule d. Algorithm 4. An informal language that has no syntax rules and is not meant to be compiled or executed is called __________. A. Faux code b. Pseudocode c. Python d. A flowchart 5. A __________ is a diagram

Answers

We complete the questions with the correct answers:


1. A Syntax error does not prevent the program from running, but causes it to produce incorrect results. The correct answer A.
2. A Software requirement is a single function that the program must perform in order to satisfy the customer. The correct answer B.
3. A(n) Algorithm is a set of well-defined logical steps that must be taken to perform a task. The correct answer A.
4. An informal language that has no syntax rules and is not meant to be compiled or executed is called Pseudocode. The correct answer B.
5. A Flowchart is a diagram. The correct answer A.

Learn more about Software :

https://brainly.com/question/28224061

#SPJ11

We complete the questions with the correct answers:

1. A Syntax error does not prevent the program from running, but causes it to produce incorrect results. The correct answer A.

2. A Software requirement is a single function that the program must perform in order to satisfy the customer. The correct answer B.

3. A(n) Algorithm is a set of well-defined logical steps that must be taken to perform a task. The correct answer A.

4. An informal language that has no syntax rules and is not meant to be compiled or executed is called Pseudocode. The correct answer B.

5. A Flowchart is a diagram. The correct answer A.

Learn more about Software :

brainly.com/question/28224061

#SPJ11

A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger

share is $450. What is the total sum shared?

Answers

300! Is the answer for this problem. 450 is the bigger sum, and that’s the 3 part of the ratio. So when we divide 450 by 3 it gives us 150. 150 is what one point on the ratio stands for. We’re looking for what 2 points on the ratio is, so 150*2 which gives us 300 … hope this helps

What are 2 ways to send a message to your client when signed in as an accountant user?.

Answers

Answer:

The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.

Is a randomly generated 4-CNF sentence with n symbols and m clauses more or less likely to be solvable than a randomly generated 3-CNF sentence with n symbols and m clauses? Explain.

Answers

It is generally believed that a randomly generated 4-CNF sentence with n symbols and m clauses is less likely to be solvable than a randomly generated 3-CNF sentence with n symbols and m clauses, due to the increased complexity of the 4-CNF format.

Both 3-CNF and 4-CNF are NP-complete problems, meaning that there is no known algorithm that can solve them in polynomial time. Therefore, the difficulty of solving them depends on the specific instance of the problem.

In general, a 4-CNF sentence is more likely to be solvable than a 3-CNF sentence with the same number of variables and clauses. This is because in 4-CNF, each clause has four literals, whereas in 3-CNF, each clause has three literals. This means that 4-CNF can express more complex constraints than 3-CNF. For example, a clause in 4-CNF can express the logical equivalence of two literals, which cannot be expressed in 3-CNF.

However, this does not mean that all randomly generated 4-CNF sentences are more likely to be solvable than randomly generated 3-CNF sentences. The difficulty of solving a specific instance of the problem depends on the specific constraints imposed by the sentence. In practice, the difficulty of solving a 4-CNF sentence with n symbols and m clauses may be similar or even higher than that of solving a 3-CNF sentence with the same number of symbols and clauses.

Example of converting the CFG into CNF:https://brainly.com/question/31484501

#SPJ11

what is definition of browser

Answers

"A web browser, or simply 'browser,' is an application used to access and view websites.

Explanation:

I hope It'll help you...

Answer:

a computer program with a graphical user interface for displaying and navigating between web pages.

Explanation:

Why would a developer use pseudocode in the Design step of the game
development cycle?
OA. To include specific details and outline the logic of a program
OB. To connect key points in a logical way
C. To gather inspiration for a game's artwork
D. To find ideas for level designs or general color schemes.

Answers

The reason that a developer would  use pseudocode in the Design step of the game development cycle is option

A. To include specific details and outline the logic of a program.

B. To connect key points in a logical way.

What is pseudocode?

Pseudocode is a way to express the logic of a program in plain language, making it easy to understand and debug. It also helps to organize the development process, breaking the program into smaller, more manageable parts. This can help them plan and organize the development process more effectively.

Hence options C and D are not related to pseudocode usage in game development process.

Learn more about pseudocode from

https://brainly.com/question/24953880

#SPJ1

A friend tells you that they cannot afford to pay for the standardized tests that need to be taken to apply for college and military academies. How could you respond?

Answers

Answer:

you could respond by giving your money to them.

Explanation:

what is an overview of your opinion of Digital Etiquette? Do not look it up bc I will know!

Answers

Answer:

I think digital etiquette is good and it should be know all around the world.

Explanation:

(display nonduplicate words in ascending order) write a program that prompts the user to enter a text in one line and displays all the nonduplicate words in ascending order.

Answers

To write a program that prompts the user to enter a text in one line and displays all the nonduplicate words in ascending order, Loop through each word in the list of words.

Convert the input text to lowercase to avoid case sensitivity issues. Split the input text into individual words using the `split()` method. Create an empty list to store the nonduplicate words. If the word is not already in the list of nonduplicate words, append it to the list. Sort the list of nonduplicate words in ascending order using the `sorted.

Here's what the program would look like: ```# Prompt the user to enter a text in one line input_text = input("Enter a text in one line: ") # Convert the input text to lowercase input_text = input_text.lower() # Split the input text into individual words = input_text.split() # Create an empty list to store the nonduplicate words nonduplicate_words = [].

To know more about program visit:

https://brainly.com/question/30613605

#SPJ11


Help me get this
Also use these commands

Help me get this Also use these commands

Answers

sry for this but you shouldn’t post thsi again and put it closer cause no one can see the pic

how many ones dose it take to get 9 tens

Answers

It takes 90 ones to get 9 tens
The answer would be 90:)

Explanation: there are 10 ones in one 10 so if you multiply 10 times 9 it’s 90

any good movies to watch ??

Answers

Answer:

The mandilorian

Explanation:

if y’all know any tell me too

What kind of route is created when a network administrator configures a router to use a specific path between nodes?.

Answers

The route is created when a network administrator configures a router to use a specific path between nodes is  Static route.

what is static route?A type of routing known as "static routing" involves explicitly specifying routes while configuring a router. No routing protocols are involved in any routing; it just happens. An administrator-defined route known as a "static route" directs packets traveling between the source and destination to follow the designated path.Gamma and neutron radiation are real-time detected and identified by the Static Node, which offers these services in a portable, small frame.The Node can be readily left on to enable inconspicuous neutron radiation detection and gamma isotope identification in any place that requires additional security. The SIGMA Network receives the alerts and other reports.

know more about static route click here:

https://brainly.com/question/6783973

#SPJ4

Mark the following statements as true or false.
a. In a counter-controlled while loop, it is not necessary to initialize the loop control variable.
b. It is possible that the body of a while loop may not execute at all.
c. In an infinite while loop, the while expression (the decision maker) is initially false, but after the first iteration it is always true.
d. The while loop:
j = 0;
while (j <= 10)
j++;
terminates if j > 10.
e. A sentinel-controlled while loop is an event-controlled while loop whose termination depends on a special value.
f. A loop is a control structure that causes certain statements to execute over and over.
g. To read data from a file of an unspecified length, an EOF-controlled loop is a good choice.
h. When a while loop terminates, the control first goes back to the statement just before the while statement, and then the control goes to the statement immediately following the while loop.

Answers

The true or false nature of each statement is given below,

a. False - In a counter-controlled while loop, it is necessary to initialize the loop control variable.
b. True - It is possible that the body of a while loop may not execute at all if the condition is not met initially.
c. False - In an infinite while loop, the while expression is always true, causing the loop to run indefinitely.
d. True - The while loop terminates if j > 10.
e. True - A sentinel-controlled while loop is an event-controlled while loop whose termination depends on a special value.
f. True - A loop is a control structure that causes certain statements to execute over and over.
g. True - To read data from a file of an unspecified length, an EOF-controlled loop is a good choice.
h. False - When a while loop terminates, the control goes to the statement immediately following the while loop.

To know more about loop control variable, click here:

https://brainly.com/question/29422833

#SPJ11

Bubbling-up is applied to Binary Search Tree when an element is added True False

Answers

The given statement "Bubbling-up is applied to Binary Search Tree when an element is added" is false, because bubbling-up is not applied to Binary Search Tree when an element is added.

A binary search tree (BST) is a node-based binary tree data structure in which each node has no more than two child nodes, known as the left child and the right child. The left sub-tree of a node has a key less than or equal to its parent node's key, while the right sub-tree of a node has a key greater than or equal to its parent node's key.

When it comes to adding elements to a binary search tree, the following steps are taken:

Add a new node to the tree by creating it with the appropriate key, left child, and right child pointers.Locate the node in the binary search tree that has a key equal to the new node's key. If the key is already present, the new node will be discarded, since BSTs do not allow duplicate keys. Otherwise, the new node is inserted in the tree as a leaf node.Balancing the tree is the final step. When a node is inserted into a binary search tree, the tree may become unbalanced. To keep the binary search tree balanced, a balancing operation such as bubbling-up or rotating the tree is performed.

You can learn more about Binary Search Tree at

https://brainly.com/question/29038401

#SPJ11

Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________

Answers

Answer:

The offset

Explanation:

In the question, we understand that the original text is HELLO and the encrypted text is OLSSV.

It should be noted that O replaced H, L replaced E, S replaced L and V replacement O.

This is made possible by a term refered to as offset.

The offset is used to determine the character that will replace another when it is encrypted.

7 characters after H is O; this is same for every other characters in the text.

The example given represents a simple shift cipher encryption with each letter in the original text shifted by a fixed value. Hence, the shift value of 7 used in the cipher given is called the key.

Each alphabet on the original text, HELLO is shifted by the key 7 to produce :

H + 7 alphabets gives OE + 7 alphabets gives LL + 7 alphabets gives SL + 7 alphabets gives SO + 7 alphabets gives V

This produces the encryption OLSSV, hence, with the shift of 7 known the encryption letters are each reversed by 7 to obtain the actual phrase 'HELLO'.

LEARN more :https://brainly.com/question/20504501

Is MOOC's potentially harmful to copyright? Why or why not ?

Answers

Answer:

Fair-use exceptions to traditional copyright protection face challenges as well, given a MOOC's potential for global reach. Nonetheless, fair use and MOOCs are not mutually exclusive ideas. MOOCs remain an experiment...

Which activity can produce bugs that are harmful to the security of a Web server?

Which activity can produce bugs that are harmful to the security of a Web server?

Answers

Answer:

A. Software updates

Explanation:

Updating the software of something can affect how the hardware works, which can lead to making the server easier to access. A good example is the US government using at max win 7 (in some cases, XP) due to possible security issues with Win 10.

cloudy computing would like to allow users to relate records to other records of the same object. what type of relationship is this?

Answers

Cloud computing would like to allow users to relate records to other records of the same object by using a Self-relationship.What is Cloud Computing Cloud computing is the on-demand availability of computer resources, particularly data storage and computing power, without direct user management.

In layman's terms, this implies that any individual can access computer resources from any location with internet access, making it possible to create a single, central repository of information that can be accessed by multiple users in real-time.

This provides the user with a platform for easy access to computing power and the storage of information. The use of cloud computing technology eliminates the need for costly and complex hardware and infrastructure for businesses and organisations.

To know more about computing visit:

https://brainly.com/question/32297638

#SPJ11

When exactly is glClear(GL_DEPTH_BUFFER_BIT) and glClear(GL_COLOR_BUFFER_BIT) necessary?

Answers

The functions glClear(GL_DEPTH_BUFFER_BIT) and glClear(GL_COLOR_BUFFER_BIT) are necessary at the beginning of each frame in a rendering loop.

The glClear(GL_DEPTH_BUFFER_BIT) function is used to clear the depth buffer, which is used to store the depth information for each pixel in the scene. Clearing the depth buffer ensures that the depth information from the previous frame is not used in the current frame.

Similarly, the glClear(GL_COLOR_BUFFER_BIT) function is used to clear the color buffer, which is used to store the color information for each pixel in the scene. Clearing the color buffer ensures that the color information from the previous frame is not used in the current frame.

In summary, both glClear(GL_DEPTH_BUFFER_BIT) and glClear(GL_COLOR_BUFFER_BIT) are necessary at the beginning of each frame in a rendering loop to ensure that the information from the previous frame is not used in the current frame.

Learn more about  the usage of OpenGL functions:https://brainly.com/question/14505283

#SPJ11

The physical things you can touch that make up a computer

Answers

The physical things you can touch that make up a computer are monitor, mouse, keyboard, and CPU.

What is computer?

A computer can be defined as an electronic device which accepts data, processes data and brings out information known as results.The computer is used to type and edit different forms of documents like word, PDF and Excel.

A computer can be used to perform business transactions online. It is used by both sellers and buyers to market and purchase product respectively.A computer can be used to play music, watch movies and play games.

Therefore, The physical things you can touch that make up a computer are monitor, mouse, keyboard, and CPU.

Learn more about CPU on:

https://brainly.com/question/16254036

#SPJ1

Describe each of the four methodologies and give an example of software that you might development using each of the methods. For one, explain why you chose that method and what would be in each area of the methodology.

Agile development methodology
DevOps deployment methodology
Waterfall development method
Rapid application development

Answers

Agile Development Methodology: Agile development is a iterative and incremental approach to software development that emphasizes flexibility and collaboration between the development team and stakeholders. Agile methodologies prioritize customer satisfaction, working software, and continuous improvement. An example of software that might be developed using agile methodology is a mobile application, where requirements and priorities can change frequently and the development team needs to adapt and deliver new features quickly. Agile methodologies are well suited for projects that have rapidly changing requirements or are highly dependent on external factors.

DevOps Deployment Methodology: DevOps is a set of practices that combines software development and IT operations to improve the speed, quality and reliability of software deployments. DevOps focuses on automation, continuous integration and continuous deployment. An example of software that might be developed using DevOps methodology is an e-commerce platform, where it's important to have a reliable, fast, and secure deployment process, and that is also easily scalable.

Waterfall Development Methodology: The Waterfall methodology is a linear sequential approach to software development where progress is seen as flowing steadily downwards through the phases of requirements gathering, design, implementation, testing and maintenance. An example of software that might be developed using Waterfall methodology is a large enterprise software system that has well-defined requirements and a long development timeline. This methodology is well suited for projects where requirements are well understood and unlikely to change, and the development process can be divided into distinct phases.

Rapid Application Development (RAD): Rapid Application Development (RAD) is a methodology that emphasizes rapid prototyping and rapid delivery of working software. RAD methodologies prioritize rapid iteration and delivery of working software. An example of software that might be developed using RAD methodology is a startup's MVP (Minimum Viable Product), where the goal is to quickly develop a basic version of the product to test with customers and gather feedback. This methodology is well suited for projects where time-to-market is a critical factor and requirements are not fully understood.

What are the methodology  about?

Each methodology has its own advantages and disadvantages, and choosing the right methodology depends on the nature of the project, the goals of the development team, and the available resources.

Therefore, Agile methodologies, for example, prioritize flexibility and continuous improvement, while Waterfall methodologies prioritize predictability and a linear development process. DevOps methodologies prioritize automation, speed, and reliability while RAD methodologies prioritize rapid delivery and customer feedback.

Learn more about Agile development  from

https://brainly.com/question/23661838

#SPJ1

what method does an sdhc card use for storing data

Answers

Secure Digital High Capacity (SDHC) cards use the NAND flash memory method to store data.

SDHC (Secure Digital High Capacity) is a flash memory card standard that supports storage capacities ranging from 4GB to 32GB.

The standard was established in 2006, and the cards are used in various devices, including cameras, smartphones, and portable media players.

They're compatible with a variety of operating systems, including Windows, macOS, and Linux.

NAND flash memory is a non-volatile storage technology that doesn't require power to maintain stored data.

It's widely utilized in storage devices such as USB drives, memory cards, and solid-state drives. Unlike NOR flash memory, which is used for read-only purposes, NAND flash memory is capable of both read and write operations.

To know more about Secure Digital High Capacity :

https://brainly.com/question/28240780

#SPJ11

What is a class in CSS?
a grouping of HTML tags for which style properties can be declared
a selector used to define a unique style
a tag used to apply styles to a block of content
the part of a declaration describing the type of style to be applied

Answers

A tag used to apply styles to a block of content.

Answer- A: a grouping of HTML tags for which style properties can be declared

Explanation: "In CSS, a class is a group of elements that are the same or similar. You can have as many elements as you want in a class. And each element can be the member of multiple classes. Every class has CSS attributes (like color and font-size) that are specific to that class. CSS classes are similar to a real-life class." skillcrush.com

which storage method ensures the fastest access to input data

Answers

In computing, the storage method that ensures the fastest access to input data is RAM or Random Access Memory.

RAM is a kind of volatile memory that can be accessed in any order, and it allows data to be read from or written to at a very high speed. This storage type is often used in computers and other electronic devices to hold data that is currently being processed.

RAM is a crucial element of a computer system. It holds data that the CPU requires for processing. RAM is where the computer stores data that is actively being used, allowing the processor to access it quickly. This storage type offers fast access to data, making it perfect for the computer's temporary memory requirements.

RAM is frequently utilized in conjunction with a hard disk drive or solid-state drive to keep data that is not being utilized, which is then stored in one of these other storage systems. Hard disk drives and solid-state drives are persistent storage types that keep data even when the computer is turned off.

Know more about the Random Access Memory.

https://brainly.com/question/33455785

#SPJ11

the most powerful computers, , can evaluate complex data very quickly. many of these computers in the united states are owned by the government or major research institutions and can cost $1 million dollars or more.

Answers

The most powerful computers, supercomputers, can evaluate complex data very quickly. Many of these computers in the United States are owned by the government or major research institutions and can cost $1 million dollars or more.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data through the central processing unit (CPU) into an output (information) that could be seen and used by an end user.

What is a supercomputer?

A supercomputer simply refers to one of the most powerful computers that is designed and developed for handling, evaluating, and solving very complicated problems or tasks. Additionally, supercomputers have the ability to carry out trillions of calculations per second.

Read more on supercomputer here: https://brainly.com/question/14883920

#SPJ1

Complete Question:

The most powerful computers, _____, can evaluate complex data very quickly. Many of these computers in the United States are owned by the government or major research institutions and can cost $1 million dollars or more.

One common example of an inconsequential match that would not require documentation is a title, perhaps of a book, a program of study, or even a job description like: Kenneth Trump, the President of the National School of Safety and Security Services.
a. true
b. false

Answers

a. true. An inconsequential match in this context refers to a situation where there is no significant connection between two separate entities. In the given example, "Kenneth Trump" and "the President of the National School of Safety and Security Services" may share a similar title or name with a well-known public figure, but they are not the same person.

Explanation:

An inconsequential match, such as a title of a book, a program of study, or a job description, may not require documentation as long as it is widely known or easily verifiable. In the given example, stating that Kenneth Trump is the President of the National School of Safety and Security Services may not require documentation if this information is widely recognized or can be easily confirmed through reliable sources.

When determining whether documentation is needed, it's important to consider factors such as the familiarity of the information to the intended audience, the availability of reliable sources for verification, and the context of the writing. In general, widely known facts or information that can be easily confirmed through reputable sources are often considered common knowledge and do not require specific documentation.

However, it's important to note that documentation requirements may vary depending on the specific guidelines or requirements of the documentation style being used, such as APA, MLA, or Chicago style. It's always recommended to consult the appropriate style guide or seek guidance from your instructor or editor to ensure you are following the appropriate documentation standards for your particular context.

Therefore, this type of match would not require documentation because it does not have a meaningful impact on the understanding or interpretation of the information being presented.

Know more about the documentation click here:

https://brainly.com/question/14096715

#SPJ11

assuming a is the starting vertex for dfs and b is at the top of the stack after the first iteration of the while loop, which vertices are in the stack after the second iteration of the while loop?

Answers

The vertices that are in the stack after the second iteration of the while loop are ACD. The correct option is A.

What is a while loop?

A “WhileLoop is used to iterate over a certain block of code until a condition is met. The while statement, also known as the while loop, executes the sequence of statements between the do and end while keywords for as long as the specified condition holds true.

The condition expression is only tested at the beginning of each loop iteration. Because the number of iterations is unknown to the user ahead of time, this loop is also known as a pre-tested loop.

Therefore, the correct option is A, ACD.

To learn more about the while loop, refer to the link:

https://brainly.com/question/13148070

#SPJ1

The question is incomplete. Your most probably complete question is given below, the image is added below:

assuming a is the starting vertex for dfs and b is at the top of the stack after the first iteration
Other Questions
Which linear inequality represents the solution set graphed? small differences in economic growth rates can lead to large differences in standards of living. why is this the case? 2. Simplify the fraction to its simplest form. 54 75 FINANCIAL MATHEMATICSPlease provide and explain how to calculate and get the answer exactly like this, using excel!Answer :1.$5,3532.$2,5843.5.4%Question :1. If $1,000 is invested today and $1,000 is invested at the beginning of each of the next three years at 12% interest (compounded annually), the amount an investor will have at the end of the fourth year will be closest to?2. If $10,000 is invested today in an account that earns interest at a rate of j2 is 9%, what is the value of the equal annual withdrawals that can be taken out of the account at the end of each of the next five years if the investor plans to deplete the account at the end of the time period?3.5.5% coupon, paid semi-annually will mature on April 15, 2026. If the bond price is 102, what is the current yield? Why was industrialization concentrated in the northern United States until the mid-twentieth century? The South lacked infrastructure. Northern governments subsidized industry. Pay rates were lower in the North. Unions prevented industry from moving south. The South was politically isolated. I need a quick and easy answer please :) A store sells a package of 3 notebooks for $2. The point on the graph represents this ratio relationship. Which ordered pairs represent equivalent ratios that would also be on the graph? Choose all the correct answers. A (4, 6) B (6, 4) C (9, 6) D (12, 8) E (15, 9) F (16, 12) in the context of the scenario, explain how the political behavior described in part a can be affected by its interaction with congress. 6. Simplify the followingi. (p + q) - (p - q) + pqii. (2m - 8n)+ (2m + 8n) classify each number according to its most specific number set. resolve into factors x^4+x^2+1 Which of the following is not an employee right under the OSH Act?a) To contest an OSH citationb) To file a complaint with OSHAc) To request access to hazard exposure recordsd) To review the employer's current injury log PLEASE HELP!!!!What is the stressed syllable of the following words?1. Maite2. aguanta3. ahora4. almohada5. amarillo6. aorta7. aplaude8. aries9. auto10. baile11. bien12. brasil13. carro14. ciudad15. cohete16. coincide17. cuba18. cuenta19. cuidado Students must write write an expository essay using one of the following topics: Education also takes place outside the classroomIf I could change the world, I wouldIf I could meet one famous person from history, it would be...Your essay must be full page and include an introduction, body, conclusion, and details that explain your topic. You can use resources but the information must be cited. PLEASE SOME ONE HELP ME PLEASEEE!!! URGENT! HELP NEEDEE jefferson, incorporated, recently issued bonds with a conversion ratio of 17.1 and a par value of $1,000. if the stock price at the time of the bond issue was $48.73, what was the conversion premium? (do not round intermediate calculations and enter your answer as a percent rounded to 2 decimal places, e.g., 32.16.) hurry ii need you help What do you have when there is more than one option to choose from when making a purchase? (2 points) HURRY PLS How does Proclamation 104 reflect Lincoln's belief thathis decision to suspended habeas corpus was the rightthing to do?O It limited suspension of the writ to only theConfederacyO It established a new congressional law to limit theconduct of American citizens.O It extended the suspension of the writ across theentire US.O It rewrote the Constitution to give the president thepower to suspend the writ during times of war. Which terms correctly represent a vector quantity and its respective unit?A weight - kilogramB mass - kilogramC momentum - NewtonD force - Newton Which of the following is a result of continued exercise training?decreased body capacityincreased body disturbanceincreased body adaptationdecreased body efficiency