Which computer is the fastest to process complex data?

Answers

Answer 1

Answer:

Supercomputers for sure.


Related Questions

Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode variable. Store within the variable the following text:

Image Movie Description Score

Open the list10-2.js file and directly below your previous code create a for loop with a counter variable i that goes from 0 to 9. Each time through the for loop add the following text to the htmlCode variable:

Image titles_i
summaries_i
ratings_i

where i is the value of the counter variable, and links_i, titles_i, summaries_i, and ratings_i are the values from the links, titles, summaries, and ratings array with index number i.

After the for loop add the following text to the htmlCode variable:

The other image

Store the value of the htmlCode variable in the inner HTML of the element with the ID list.

Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode
Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode
Open the list10-2.js file and directly below the code populating the links array, declare the htmlCode

Answers

Answer:

// Populating links array

var links = ["link0", "link1", "link2", "link3", "link4", "link5", "link6", "link7", "link8", "link9"];

// Populating titles array

var titles = ["Title 1", "Title 2", "Title 3", "Title 4", "Title 5", "Title 6", "Title 7", "Title 8", "Title 9", "Title 10"];

// Populating summaries array

var summaries = ["Summary 1", "Summary 2", "Summary 3", "Summary 4", "Summary 5", "Summary 6", "Summary 7", "Summary 8", "Summary 9", "Summary 10"];

// Populating ratings array

var ratings = ["Rating 1", "Rating 2", "Rating 3", "Rating 4", "Rating 5", "Rating 6", "Rating 7", "Rating 8", "Rating 9", "Rating 10"];

// Initializing htmlCode variable

var htmlCode = "Image Movie Description Score";

// Adding data to htmlCode variable

for (var i = 0; i < 10; i++) {

 htmlCode += "<br>Image " + titles[i] + " " + summaries[i] + " " + ratings[i];

}

// Adding last line to htmlCode variable

htmlCode += "<br>The other image";

// Storing value of htmlCode variable in the inner HTML of the element with the ID list

document.getElementById("list").innerHTML = htmlCode;

Which pathway includes implementing computer systems and software and database
management?

Answers

The Information Support and Services Pathway (technical) includes implementing computer systems and software and database management.

What is the Technical pathway about?

This is known to be the pathway where the Employees that can be seen in the Information Support as well as Services Pathway tends to implement computer systems as well as software, they provide some measures of assistance and handles  information systems

Therefore, The Information Support and Services Pathway (technical) includes implementing computer systems and software and database management.

Learn more about database management from

https://brainly.com/question/24027204
#SPJ1

SmartArt is a helpful tool to

Answers

Answer:

SmartArt is, basically, a way to make organized presentation art. (Some folks think that SmartArt was created as a tool primarily for PowerPoint.) It is suitable for "organizational" types of artwork, such as organization charts and process lists.

Which function would you use to find the oldest date in a range?
a. Min
b. Max
c. Oldest
d. Median

Answers

A range's oldest date is determined via the MIN function. Dates can be expressed as numbers, therefore you can use the MIN function to represent the oldest date and the MAX function to represent the most recent date.

What is meant by MIN function?The MIN function in Excel is a built-in function that locates the lowest integer among a range. Text-filled cells are disregarded by the function. Only cells with numbers will function. Note: The MAX function does the exact opposite of MIN by locating the highest number inside a range. The MIN function examines your data range and delivers the smallest value found there. Let's say we need to get the minimum values and we have data from A2 to B6. We can utilise Excel's MIN function in this situation. The least value within the A2 to B6 cell range may be obtained in this example by applying the MIN function formula =MIN(A2:B6).

Therefore,

The earliest date is determined using the formula

=MIN(IF(A2:A26=D2,B2:B26)) in cell E2.

For the most recent date, enter

=MAX(IF(A2:A26=D2,B2:B26)) in cell F2.

To learn more about MIN function, refer to:

https://brainly.com/question/30607138

Why are Quick Parts useful in an Outlook message?

Spreadsheet data sources can be hyperlinked to an email message.
Stored text and graphics can be quickly inserted into an email message.
A gallery of shapes will open up, and you can quickly choose one to insert.
Highlighted parts of Word documents can be inserted into a message body.

Answers

Answer:

I hope the picture helped

Why are Quick Parts useful in an Outlook message?Spreadsheet data sources can be hyperlinked to an email

Answer:

B. stored text and graphics can be quickly inserted into an email message

Explanation:

Edge 2021

which is the best online free coding website

Answers

Well you have to install this but Scratch!

How did early games in generation 1 or 2 influence zelda botw

Answers

Answer:

Open world exploration and inventory management

Explanation:

In the first Zelda game (NES) and Zelda ii (NES) there were very early open world mechanics along with inventory management.

Answer:

5 or 4

Explanation:

I know that Zelda 1 and Windwaker were inspristions, and then we have Ocarina of Time for the Korok forest, Gerudo Desert, and etc. And A Link to the Past was where Kakriko Village originated and the same theme was used for Botw as an easter egg. You may not believe me, but it's in there. But if you wanna get techinical, tons of outfits from the old games are in botw thanks to the dlcs, so...all of them actually are what botw is on.

what is the runtime of dijkstra's algorithm if we were to make use of a heap of size n (number of vertices), keyed by the dist value? we are looking for a tight bound.

Answers

Dijkstra's algorithm runs in time O(n lg n + m) with a Fibonacci heap, which is at least as efficient as using either an unsorted array or a min-heap.

For each weighted, directed graph with positive weights, Dijkstra's algorithm finds the shortest path. It can handle cycles-based graphs, although negative weights will result in inaccurate results for this approach. We therefore assume that w(e) 0 for all e > E in this case.

Dijkstra's algorithm is depicted by the pseudocode in Algorithm 4.12. In order to retain the unprocessed vertices with their shortest-path estimates est(v) as key values, the method maintains a priority queue minQ. The vertex u with the lowest est(u) is then repeatedly extracted from minQ, and all edges occurring from u to any vertex in minQ are relaxed. The method will consider one vertex as processed once it has been extracted from minQ and all relaxations via it have been finished.

To know more about Dijkstra's algorithm click here:

https://brainly.com/question/17603192

#SPJ4

To increase security for your Windows notebook system while traveling, you decide to require a smart card in order to sign on. You also want users to be signed out automatically when the smart card is removed. What should you do

Answers

To increase security for your Windows notebook system while traveling, you should enable smart card authentication and configure automatic sign-out when the smart card is removed.

To implement smart card authentication, you should set up the system to require a smart card for user sign-on. This means users will need to insert a valid smart card into the system to access their accounts. Additionally, to ensure increased security, you should configure the system to automatically sign out users when the smart card is removed.

This way, if the smart card is accidentally or maliciously removed, unauthorized access to the system is prevented. Enabling this feature adds an extra layer of protection to your Windows notebook system while traveling, reducing the risk of unauthorized access and potential security breaches.

You can learn more about smart card authentication at

https://brainly.com/question/30778509

#SPJ11

how images are encoded

Answers

Answer:

Digital images are encoded in binary. ... Students make connections between the amount of data used by the computer to store, transmit and create an image and the file size of different images (generally, the more pixels and more bits to encode the image, the larger the file size).

What function is used to draw a line in the frame?

Answers

Answer:

DrawLine is simply draws a line connecting the two points that are specified by the coordinate pairs. It should be noted that the drawLine() function is simply an inbuilt function in the GraphicsMagick library that is used to draw the line with specified coordinates.

A software engineer is designing a program to make tasks easier and solve
problems for users. Which computer discipline does this person most likely
work in?
O A. Computer engineering
OB. Applications development
OC. Network administration
OD. Information technology

Answers

I would say that they probably work in network administration

How long you plan to keep your investments in your portfolio refers to:
A. Time horizon
B. Asset allocation
C. Personal financial health
D. Risk tolerance

Answers

Answer:

A, because it has to do with the amount of time you have it in your portfolio.

if you make a typing mistake when entering your program, what sort of error will result

Answers

When you make a typing mistake when entering your program, it can result in a syntax error. A syntax error occurs when the code does not follow the language's grammatical rules and the computer cannot process the program correctly.

For example, if you misspell a keyword or forget to include a semicolon at the end of a line, you may receive a syntax error.

About syntax error

A typing mistake when entering your program will result in a syntax error. Syntax errors occur when the structure or order of your code does not conform to the rules of the programming language. These errors can be caused by typos, missing punctuation, or incorrect use of operators. It is important to carefully proofread your code to avoid syntax errors, as they can prevent your program from running correctly.

Learn more about syntax error at

https://brainly.com/question/28957248

#SPJ11

SumOfEvensParameter: a list of numbers, numListReturn value: the sum of all the even numbers in numList

Answers

The given task involves the use of the parameter 'numList' which is a list of numbers. We are required to sum all the even numbers present in this list.

Here's the solution that satisfies the given problem statement:def sumOfEvens(numList):   '''This function accepts a list of numbers as a parameter, then sums up    all the even numbers present in the list, and returns the result.'''   sum = 0    for num in numList:     if num % 2 == 0:       sum += num   return sumThe above function can be called by passing a list of numbers to it as shown below:numList = [5, 10, 12, 15, 17, 20, 22]print(sumOfEvens(numList)).

The output of the above code should be 64Note: In the above function, a for loop is used to iterate through all the numbers present in the list. For each number, the if condition checks whether the number is even or not. If the number is even, then it is added to the variable 'sum'. After all the numbers have been checked, the final value of 'sum' is returned.

To know more about parameter visit:

https://brainly.com/question/28249912

#SPJ11

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

You are writing a program to help compare two sports teams. A sample member of the list scores is [2. 5] where your team scored 2 and the opponent team scored 5. This part of the program is counting the wins and losses.

What is the missing line of code?

for item in scores:
sum = sum + item[1]
if item[0] > item[1]:

Answers

Answer:

The correct answer is C

Explanation:

The missing line of code is if item[0] > item[1]:. The correct option is C.

What is programing?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programmes.

Coding skills, also known as programming skills, are the art of writing commands in various programming languages to instruct a computer, application, or software programme on the actions it must perform and how.

As an example, consider writing a programme to aid in the comparison of two sports teams. [2. 5] is a sample member of the list score, where your team scored 2 and the opposing team scored 5.

This section of the programme counts the wins and losses. If item[0] > item[1], a line of code is missing.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

The lifetime of a new 6S hard-drive follows a Uniform
distribution over the range of [1.5, 3.0 years]. A 6S hard-drive
has been used for 2 years and is still working. What is the
probability that it i

Answers

The given hard-drive has been used for 2 years and is still working. We are to find the probability that it is still working after 2 years. Let A denote the event that the hard-drive lasts beyond 2 years. Then we can write the probability of A as follows:P(A) = P(the lifetime of the hard-drive exceeds 2 years).By definition of Uniform distribution, the probability density function of the lifetime of the hard-drive is given by:

f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.where a = 1.5 years and b = 3.0 years are the minimum and maximum possible lifetimes of the hard-drive, respectively. Since the probability density function is uniform, the probability of the hard-lifetime of a new 6S hard-drive follows a Uniform distribution over the range of [1.5, 3.0 years]. We are to find the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years.Let X denote the lifetime of the hard-drive in years.

Then X follows the Uniform distribution with a = 1.5 and b = 3.0. Thus, the probability density function of X is given by:f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.Substituting the given values, we get:f(x) = 1/(3.0 - 1.5) = 1/1.5 if 1.5 ≤ x ≤ 3.0; 0 the integral is taken over the interval [2, 3] (since we want to find the probability that the hard-drive lasts beyond 2 years). Hence,P(A) = ∫f(x) dx = ∫1/1.5 dx = x/1.5 between the limits x = 2 and x = 3= [3/1.5] - [2/1.5] = 2/3Thus, the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years is 2/3.

To know more about Uniform distribution visit:

brainly.com/question/13941002

#SPJ11

which technology requires filters to be placed on analog phones?

Answers

Digital subscriber line (DSL) technology requires filters to be placed on analog phones.

What is digital subscriber line?

Digital subscriber line (DSL) represents a swift and efficient method of accessing the internet, employing the very copper wires that facilitate conventional telephone service.

DSL harnesses high-frequency signals to transmit data seamlessly over the identical copper wires typically utilized for analog phone service.

However, in the absence of appropriate filtering measures, analog phones possess the potential to disrupt the DSL signal, leading to complications in the internet connection.

Learn about digital subscriber line here https://brainly.com/question/14599737

#SPJ4

you attempt to jump to a systemd target using the systemctl isolate command, but it will not work. you decide to look at the target unit file. what might you see there that is causing this problem?

Answers

You have modified the /etc/ssh/ssh config file for an OpenSSH service.

What does systemctl isolate do?Use the systemctl isolate command to modify the target unit while still in use without having to restart. Copied! In addition to stopping all other units instantly, this order begins the multi-user target unit and all dependant units.A sandbox called Isolate was created to enable the secure execution of untrusted executables while providing them with a restricted environment that prevents them from interfering with the host system. It utilises namespaces and control groups, two characteristics unique to the Linux kernel.Administrators can control the state of services and the OS by using the systemctl command, which maintains both system and service configurations. Also, systemctl is helpful for simple performance adjustment and troubleshooting.

To learn more about systemctl isolate command, refer to:

https://brainly.com/question/29633383

Name atleast two advantages of using models in science

Answers

When students are engaged in scientific modeling, they are able to notice patterns and develop and revise representations that become useful models to predict and explain, making their own scientific knowledge stronger, helping them to think critically, and helping them know more about the nature of science.

What is the Boolean Theory?

Answers

Answer:

Boolean theory provides the basic fundamentals for logic operators and operations to perform Boolean algebra. Boolean algebra is a branch of mathematics that includes methods for manipulating logical variables and logical expressions. The Greek philosopher Aristotle founded a system of logic based on only two types of propositions: true and false.

Explanation:

1-DESIGN TAB....................2-LAYOUT TAB .

1-wordart styles,

2-table size,

1-Table styles,

2-alignment,

1-draw borders,

2-rows and columns

1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw

Answers

design tab

wordart stylestable stylesdraw border

layout tab

table sizerows and columnsalignment

Answer:

The person above is correct.

Explanation:

1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw

lock indicates the level of lock use. question 2 options: a) shrinking b) serializability c) growing d) granularity

Answers

In the context of database management systems, different levels of lock usage are implemented to ensure data integrity and prevent conflicts during concurrent transactions.

The given options (shrinking, serializability, growing, and granularity) are related to lock management in databases. The specific term referring to the "level of lock use" in this case is "granularity."

Granularity refers to the size or extent of a lock, ranging from coarse-grained (locking an entire table) to fine-grained (locking a single row or cell). Coarse-grained locking offers better simplicity and ease of implementation but may lead to reduced concurrency, while fine-grained locking allows for higher concurrency at the expense of increased complexity and potential for deadlocks.

Among the given options, the correct answer is "granularity," as it represents the level of lock use in database management systems.

To learn more about database management, visit:

https://brainly.com/question/31733141

#SPJ11

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated
Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

what is protected vs unprotected draft pick?

Answers

Draft picks that are not protected have no limitations on the team that possesses them. The ownership team may select the player of their choice regardless of where that pick is placed in the draught.

What distinguishes protected picks from unprotected picks?

A protected pick is one that a team would hold onto from the first through the tenth picks in the draught. An unprotected pick is one that the team must forfeit under any circumstances; it could be an unfavourable selection in the draught or even a player who is already on their squad.

What does an NBA unprotected draught pick mean?

In the most recent deal involving Paul George and the Los Angeles Clippers, for instance, the Oklahoma City Thunder acquired four first-round selections in the unprotected draught from the the future. This means that the Thunder will receive the Clippers pick no matter what overall it is. If the Clippers get number 1 overall, the Thunder will receive it.

To know more about protected visit:-

https://brainly.com/question/30457171

#SPJ4

How to remove link color and underline in html.

Answers

Answer:

To remove the underline from all hyperlinks on a page, follow these steps:

Open the page that you want to modify.

Click the Codetab.

Put the following HTML code before the <BODY> tag: <STYLE>A {text-decoration: none;} </STYLE>

Click the Designtab. Your hyperlinks no longer contain underlines.

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

Darcie has hired a programmer to make some custom changes to a dbms she plans to move her business database to. What kind of dbms is she using?.

Answers

Since Darcie has hired a programmer to make some custom changes to a dbms she plans to move her business database to, the kind of DBMS she is using open source.

What are open source DBMSs?

Open-source software is computer code that has been made available under a license that allows users to use, examine, modify, and share it with anyone for any reason. Software that is open-source may be created through public collaboration.

Hence, An open source database enables users to build a system based on their particular needs and professional requirements. It costs nothing and may be distributed. Any user preference can be adapted from the source code. Open source databases provide a more affordable means of analyzing data from an increasing number of new applications.

Learn more about open source from

https://brainly.com/question/6065176
#SPJ1

A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working. ​

Answers

The  Audio Size of the 32-second sound clip is given as: = 500 kb

See calculation and explanations below.

What is Audio Size?

The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.



What is the calculation of the size of the audio file?

Step 1

The formula for calculating the Audio Size is:

= Sampling rate x sample size x time x channel

= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)

= 4,096,000 bits

Step 2 - We convert to bytes.

To convert to bytes, we divide our answer in bits by 8; hence

= 4,096,000/8

= 512,000

Step 3 - convert to kilobytes by dividing by 1024

Therefore, answer in kilobytes

= 512,000/1024

= 500 kb

See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1

Other Questions
At least two different household products are available in the marketplace that make use of the phenomenon of sensory adaptation: Febrezes NOTICEables. and Glades Lasting Impressions Air Freshener. Both products are air fresheners that use warmed oil to scent the air with fragrances. a. If you were a marketing manager for an air freshener company, why should you be concerned about sensory adaptation? Be sure to provide a general definition of sensory adaptation in your response Studies indicate that children raised in the democratic style perform well in school. true or false a woman purposely drinks poison then goes to the hospital. her diagnosis would be . In an attempt to increase sales, a breakfast cereal company decides to offer a promotion. Each box of cereal will contain a collectible card featuring one NASCAR driver: Kyle Busch, Hailie Deegan, Chase Elliott, Kevin Harvick, or Bubba Wallace. The company says that each of the 5 cards is equally likely to appear in the 100,000 boxes of cereal that are part of this promotion. You buy 12 boxes and let X = the number of Kyle Busch cards in the sample. Is the probability distribution of X approximately normal ? Justify your answer. What is the degree of freedom ?a) ethanol, water and ice mixture b) partially decomposed NH4Cl Pls po i really need this help. I'll mark brainliest who answered po.Design Your Offspring:Create your imaginary offspring. Bring in a picture or drawing of yourself and of your sweetheart, favorite celebrity, or dream girl or guy (these are not included).1. Attach your picture to your poster (these are not included). Next to each picture, describe the traits and give each a genotype. (Use your imagination)2. Identify two different possible children. Show and describe the phenotypes and genotypes for each children.3. Show a monohybrid cross using your trait. (Example. Mm x mm). Show the Punnet and the ratios produced. Include the genotype and phenotype in the punnet square. The author, teacher, and promoter of american nationalism who is best known for his spellers and dictionaries is ______. Given the following information, formulate an inventory management system. The item is demanded 50 weeks a year. PARAMETER VALUE Item cost $8.00 Order cost $178.00 /order Annual holding cost 29 % of item cost Annual demand 28,100 units Average weekly demand 562 /week Standard deviation of weekly demand 25 units Lead time 4 week Service probability 98 % a. Determine the order quantity and reorder point. (Use Excels NORMSINV( ) function to find your z-value and then round that z-value to 2 decimal places. Do not round any other intermediate calculations. Round your final answers to the nearest whole number.) Optimal order quantity Answer 2057 units Reorder point Answer 576 units b. Determine the annual holding and order costs. (Do not round any intermediate calculations. Round your final answers to 2 decimal places.) Holding cost($)Answer 2386.12 Ordering cost($)Answer 2431.60 c. Assume a price break of $50 per order was offered for purchase quantities of 2,100 units per order. If you took advantage of this price break, how much would you save annually? (Do not round any intermediate calculations (including number of setups per year). Round your final answer to 2 decimal places.) Please help asap! Finding the Volume of a Cylinder... Tysm! 100 points pls hurry and mark brainly Question 1 Company A signed a contract with Company B on 1 January 2021. It was stated in the contract that the United Nations Convention on Contracts for the International Sale of Goods (CISG) is the governing law of the contract.Under the contract, Company A, as the seller, would deliver 10,000 tons of coal to Company B at the amount of USD100 per ton. The delivery date, as stipulated in the contract, was on or before 31 December 2021. On 1 June 2021, there was a sudden increase in demand of coal, and thus, the price of coal increased to USD200 per ton.Company A sought to renegotiate the price with Company B but Company B rejected the request. On 31 December 2021, Company A only delivered 5,000 tons of coal to Company B. Company B sued against Company A for damages.Advise whether Company A was liable for damages and whether Company A could rely on any defence under the CISG. Use the relevant CISG provisions and case laws (from any jurisdiction) to support your answer. Which amendment was the focus of the Brown v. Board of Education court case? In what ways was the Revolution like a civil war? From a hot-air balloon, Addison measures a 27 angle of depression to a landmarkthat's 989 feet away, measuring horizontally. What's the balloon's vertical distanceabove the ground? Round your answer to the nearest tenth of a foot if necessary. i will give ur brain thingits urgent Klein first became fascinated with crows at what event?1 His wedding2 An outdoor concert3 A marathon4 A cocktail party (02.07A HC)Part A: The Sun produces 3.9 1033 ergs of radiant energy per second. How many ergs of radiant energy does the Sun produce in 2.45 105 seconds? Express your answer in scientific notation and show your work. (5 points)Part B: Which is the more reasonable measurement of the distance between the tracks on a DVD:7.4 104 mm or 7.4 104 mm? Justify your answer. (5 points) evaluate 6+4/a + b/3 when a=4 and b=3 Which of the following are types of tests included in the Nurse Logic Tutorial? (SATA)1. Beginner2. Advanced The operation of pneumatic DCVs is the same as electrical DCVs except ________ the operation pneumatic DCVs means there is flow.