TQ Automation
What is Robotic Process Automation (RPA)?

Answers

Answer 1

Answer:

RPA or Robotic Process Automation allows organizations to automate tasks which human beings were doing across any applications and systems. The purpose of RPA is to transfer the execution of the process from humans to robots.


Related Questions

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

the word "computer" originally refer to as what

Answers

The term "computer", in use from the early 17th century (the first known written reference dates from 1613), meant "one who computes": a person performing mathematical calculations, before electronic computers became commercially available.

Explain download as used in computing environment.

Answers

Explanation:

Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device. Download can refer to the general transfer of data or to transferring a specific file. It can also be called to download, DL or D/L.

please mark be brainliest

Why is it difficult to attribute a single driving motivation to a group like Anonymous (in a way that’s not true for, say, Wal-Mart, Amazon, or Apple)?

Answers

It is difficult to attribute a single driving motivation to a group like Anonymous  because the fact is that Anonymous is said to be way different based on their philosophy that do not really put or place itself onto one kind of central or main idea.

What is a driver motivation?

The term of a driving motivation to a group is known to be based on the  Theory of Needs that was given by David McClelland.

It states that are three key drivers for motivation and they are:

A  need for achievementThe  need for affiliation The need for power.

Hence, It is difficult to attribute a single driving motivation to a group like Anonymous  because the fact is that Anonymous is said to be way different based on their philosophy that do not really put or place itself onto one kind of central or main idea.

Learn more about motivation from

https://brainly.com/question/11871721

#SPJ1

3.12.1: LAB: Instrument information (derived classes)

class Instrument:
def __init__(self, name, manufacturer, year_built, cost):
self.name = name
self.manufacturer = manufacturer
self.year_built = year_built
self.cost = cost

def print_info(self):
print('Instrument Information:')
print(' Name:', self.name)
print(' Manufacturer:', self.manufacturer)
print(' Year built:', self.year_built)
print(' Cost:', self.cost)


class StringInstrument(Instrument):
# TODO: Define constructor with attributes:
# name, manufacturer, year_built, cost, num_strings, num_frets


if __name__ == "__main__":
instrument_name = input()
manufacturer_name = input()
year_built = int(input())
cost = int(input())
string_instrument_name = input()
string_manufacturer = input()
string_year_built = int(input())
string_cost = int(input())
num_strings = int(input())
num_frets = int(input())

my_instrument = Instrument(instrument_name, manufacturer_name, year_built, cost)
my_string_instrument = StringInstrument(string_instrument_name, string_manufacturer, string_year_built, string_cost, num_strings, num_frets)

my_instrument.print_info()
my_string_instrument.print_info()

print(' Number of strings:', my_string_instrument.num_strings)
print(' Number of frets:', my_string_instrument.num_frets)

** I REALLY NEED HELP**

Answers

definitiva year vuelta const

What is referential integrity

Answers

The association between tables is referred to as referential integrity. A primary key is required for each table in a database and can appear in other tables as a result of its connection to the data in those other tables. Foreign keys are used when a primary key from one table appears in another table.

List at least three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials.

Answers

The  three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials are:

Embarrassment and also the loss of customers as a result of data loss.The loss of what we call a proprietary information.The loss of what we call the sensitive business strategy information (such as  planned acquisitions, and other.).

What is E-espionage?

This  term e-Espionage is known to be a form of an unauthorized and it is often seen as a criminal access to a lot of confidential systems and information and it is one whose purpose is that they have or gain a lot of commercial or political advantage.

Hence, the types of espionage are:

Clandestine cell system.Counterintelligence, etc.

Therefore, The  three kinds of harm a company could experience from electronic espionage or unauthorized viewing of confidential company materials are:

Embarrassment and also the loss of customers as a result of data loss.The loss of what we call a proprietary information.The loss of what we call the sensitive business strategy information (such as  planned acquisitions, and other.).

Learn more about electronic espionage from

https://brainly.com/question/312313

#SPJ1

Which factor has not aided the success of some social networking sites?

Answers

Answer:

Explanation:Comunicarse en la era 2.0, es la forma más sencilla que ha tenido el proceso, sobre todo por los diversos canales que tienen las personas para hacerlo en la actualidad. Sin embargo, la comunicación digital va más allá de estar en contacto con otras personas, principalmente porque ahora, socializar se ha convertido en una función más profunda y cercana a dicha actividad.

Y es que, con las redes sociales, estar en contacto unos a otros es, sin lugar a dudas, un proceso sumamente fácil, instantáneo y entretenido, porque gracias a ellas, podemos saber qué hacen los demás en el momento en qué sucede, y palpar sus reacciones, sin necesidad de estar cerca de ellos. Sin embargo, hay cosas que se deben tomar en cuenta al instante de gestionar las mencionadas comunicaciones.

Realidad

En las redes sociales, la popularidad es algo que todos quieren, y la descubren a través de la cantidad de “likes” o comentarios que tengan sus publicaciones. Sin embargo, las personas quieren ver otras personas, reales y genuinas, y no personajes irreales y viciados de credibilidad. ¡No finjas ser quién no eres!

Variedad

A todos les gusta ver cosas distintas cada día. ¡Lo cotidiano aburre, lo sabemos! Por eso, es bueno compartir contenido diferente, pero además, evitar sobresaturar los perfiles de la misma información, o fotografías.

Seguridad

Este punto es sumamente importante para el dueño de la red, porque de él depende su privacidad. Hay que evitar compartir información muy personal, y que pueda poner en riesgo su propia estabilidad.

En fin, todos ahora quieren estar inmerso en la nueva forma de comunicación del siglo XXI, pero la mayoría omite lo anterior. Por ello, en Florida Global University (FGU) le enseñamos cómo hacerlo, a través de nuestra Licenciatura en Periodismo Digital, especializada en la Gestión de Comunicaciones Digitales, donde aprenderá a realizar un manejo exitoso, ¡Y a ser periodista digital, claro está!

Why did NFL equip its players with RDIF tags?

Answers

NFL equip its players with RDIF tags so as aid or support them to take a lot of statistical information about the players e.g. their position, speed, acceleration and others. The data taken is often used in making a lot of analysis and coaching decisions linked to the players.

Why did NFL equip it's players with RFID tags?

This is known to be often done so that it can aid location tracking, a lot of NFL equips each player with a minimum of two RFID tags.

Hence,  NFL equip its players with RDIF tags so as aid or support them to take a lot of statistical information about the players e.g. their position, speed, acceleration and others. The data taken is often used in making a lot of analysis and coaching decisions linked to the players.

Learn more about NFL from

https://brainly.com/question/15262528

#SPJ1

List at least four items that security policy should include

Answers

Answer:

Purpose.

Audience.

Information security objectives.

Authority and access control policy.

Data classification.

Data support and operations.

Security awareness and behavior.

Encryption policy.

Discuss the key benefits organisations like Amazon gain after adopting Cloud Computing.

Answers

Answer:

larger access to storage and the ability to send and receive information at improved speeds

User enters menu items by name or an assigned item number.

Answers

Using the knowledge in computational language in python it is possible to write a code that uses enters menu items by name or an assigned item number.

Writting the code in python:

#Here, file1 is created as object for menu.txt and file2 as object for bill.txt

#It is done using the open() function.

#No module is required to be imported for this function.

#Here, r represents that this file will be used to read data

#and w represents "write"

file1 = open("menu.txt","r")

file2 = open("bill.txt","w")

#this is the welcome statement

print ("Welcome to the Delicious Restaurent:")

print("""Enter "I'm done" or "Exit" or "No" to stop the orders.\n""")

print("The menu is as follows:\nPlease enter the item no. to order.\n")

#readlines(): reads all the lines and return them as each line a string element in a list.

a=file1.readlines()

#we will iterate though each element and print it to the customer

for i in range(len(a)):

   print("{}) {}".format(i+1,a[i]))

   

#variable to store the total bill amount

total=0

#initialize the order variable with 1

order=1

#taking the input

order=int(input("\nEnter order: "))

#This loop will continue untill the customer will enter "exit" or "I'm done"

while(order not in ["i'm done", "I'm done" ,"Exit", "exit","No","no"]):

   

   #if customer enters "i'm done" or "exit", he will break out of loop

   if order in ["i'm done", "I'm done" ,"Exit", "exit","no","No"]:

       break

   

   #if customer enters any number between 1 to 12, that item will be added to his bill

   if order in range(1,13):

       

       print("Your order number {} is added.\n".format(order))

       

       #we will get that item by its order number

       item=a[order-1]

       

       #Here i am using string slicing to get the price(it is after the $ sign)

       #We will get the index of $ sign and use the number after that

       # for eg. "Egg burger $34.12"

       # indexi= 11 (Here $ is at 11th position)

       indexi=item.index('$')

       

       #prici will have the price

       prici=(item[indexi+1:])

       

       #add the price of that item to total value

       total+=float(prici)

       

       #write the item and its price to the output file

       file2.write(item)

       

   #For any other inputs, it will print ("Wrong choice")

   else:

       print("Wrong choice")

       

   #It will ask the user, if he/she needs more orders

   print("Do you want to add more")

   order=(input("Enter order: "))

   

   #it will convert the user input into an integer, if possible

   #because he may enter "exit" also.

   try:

       order=int(order)

   except:

       continue

#This is the case outside of the while loop.

#Here, Total amount is printed in the bill.

file2.write("----------------------\n")

file2.write("Your Total amount is $"+str(total))

#We need to close those files as well

#close() function closes the file and frees the memory space acquired by that file.

file1.close()

file2.close()

See more about python at brainly.com/question/18502436

#SPJ1

printer runs out of paper during the printing job. A signal is sent back to the computer to stop temporarily its current task. Name this type of signal

Answers

The signal is sent back to the computer to stop temporarily its current task is known as interrupt signal.

What is  interrupt signal?

An interrupt is known to be a form of a signal emitted by any kind of device such as printer that is said to be attached to a computer or from a program that is seen in the computer.

Hence, The signal is sent back to the computer to stop temporarily its current task is known as interrupt signal.

Learn more about printer from

https://brainly.com/question/145385

#SPJ1

What does it mean when someone says your voice doesn’t match how u look

Answers

Explanation:

it means that your voice it doesn't match with your personality like 2 characteristics by voice and by personality

Why should you make sure the paper being used in a printer is dry and not damp?

Answers

Answer:

because the printer ink is liquid

Explanation:

you need a dry paper to let the ink sit in place and print out the exact same thing that u needed to print if you're printing on a damp paper there is a chance it will affect the output of whatever your printing

Using damp paper in a printer can lead to ink smudging, paper jams, reduced print quality, and potential damage to the printer.

We have,

Using dry paper in a printer is important because damp or wet paper can cause several issues:

- Ink Absorption and Smudging: Damp paper can absorb ink unevenly, leading to smudging, bleeding, and blurred printouts. The ink may not dry properly on damp paper, affecting the print quality.

- Paper Jam: Wet or damp paper can stick together or to printer rollers, increasing the likelihood of paper jams. This can damage the printer and disrupt the printing process.

- Curling and Wrinkling: Moisture can cause paper to curl, warp, or wrinkle, making it difficult to feed through the printer's mechanisms properly. This can result in misaligned printing and paper feeding issues.

- Print Quality: Wet or damp paper can affect the color saturation and clarity of the printouts, resulting in poor print quality and reduced legibility.

- Drying Time: If the paper is wet, it will need time to dry before it can be used in the printer. Printing on wet paper can result in a smeared or faded appearance due to the ink's interaction with moisture.

- Overall Printer Health: Consistently using damp paper can lead to printer damage over time, affecting various components like rollers, cartridges, and print heads.

Thus,

Using damp paper in a printer can lead to ink smudging, paper jams, reduced print quality, and potential damage to the printer.

Learn more about printers here:

https://brainly.com/question/5039703

#SPJ3

Olivia is an amputee who wears a prosthetic right hand. Which technology would most help her operate a computer?

Answers

nerve interface is technology that allows amputees to use thoughts to move prosthetics

Which of the following tasks are suitable for creating an algorithm? Choose all that apply

Answers

A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

What is algorithm?

An algorithm is known to be a form of a procedure that is often employed in the act of solving a problem or carrying out a computation.

Note that in the case above, A tasks are suitable for creating an algorithm are:

giving directions to a location.solving a math problem.tracking money in a bank account.tracking the number of items in inventory.

See options below

giving directions to a location

saving time writing a computer program

solving a math problem

tracking money in a bank account

tracking the number of items in inventory

Learn more about algorithm from

https://brainly.com/question/24953880

#SPJ1

Every problem has a solution, Now
what is the solution of this?

Answers

A. I put my solution in the comments

class Main {

static void printPowers(int howMany, int nrRows) {

int n=1;

while(n<=nrRows) {

int power = 1;

while(power <= howMany) {

System.out.printf("%d ", (int) Math.pow(n,power));

power++;

}

System.out.println();

n++;

}

}



public static void main(String[] args) {

printPowers(3,5);

}

}
1. Rewrite your method printPowers from 7B to use a for loop instead of a while loop.

2. Rewrite your method printPowers from 7B to use a do-while loop instead of a while loop.

Answers

Answer:

class Main {

 static void printPowers(int howMany, int nrRows) {

   for(int n=1; n<=nrRows; n++) {

     for(int power = 1; power<=howMany; power++) {

       System.out.printf("%d ", (int) Math.pow(n, power));

     }

     System.out.println();

   }

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

class Main {

 static void printPowers(int howMany, int nrRows) {

   int n = 1;

   do {

     int power = 1;

     do {

       System.out.printf("%d ", (int) Math.pow(n, power));

       power++;

     } while (power <= howMany);

     System.out.println();

     n++;

   } while (n <= nrRows);

 }

 public static void main(String[] args) {

   printPowers(3, 5);

 }

}

Explanation:

The for loop gives the cleanest, shortest code.

Careers and information technology deal with

Answers

Answer:

computers and telecommunications

Explanation:

PLEASE HELP
7.6 LAB: Replacement words Write a program that finds word differences between two sentences. The input begins with the first sentence and the following input line is the second sentence. Assume that the two sentences have the same number of words. The program displays word pairs that differ between the two sentences. One pair is displayed per line.

Ex: If the input is:

Smaller cars get better gas mileage Tiny cars get great fuel economy

then the output is:

Smaller Tiny better great gas fuel mileage economy


Hint: Store each input line into a list of strings.

Answers

This assignment is required to be executed in python programming language. See the code below.

What is the code that displays word pairs that differ between the two sentences?

# taking two sentence as input s1 = input() s2 = input()  

# getting the words in both sentences in list w1 = s1.split() w2 = s2.split()  # looping through the word lists and checking if they are equal or not for i in range(len(w1)):  

# printing word pairs if they are not equal

if (w1[i] != w2[i]):

 print(w1[i],w2[i])    

Learn more about python programming language at;
https://brainly.com/question/26497128
#SPJ1

Give an example of SaaS (Software as a service) and explain why this can impact organisational security posture

Answers

In the case above, An  example of SaaS (Software as a service) are DropBox, UserGuiding and Salesforce.

How does SaaS (Software as a service) impact organizational security posture?

Software-as-a-Service (SaaS) security posture management (SSPM) is known to  be a kind of a group that is made up of an automated security tools that is used for tracking security threats in regards to SaaS applications.

What is organization level security in Salesforce?

The organizational level is known to be one that gives room for a person to decide if and from where a given users can be able to access the system.

Note that SaaS platforms is made up of software that is said to be available via third-party and they include BigCommerce, Salesforce and others.

Learn more about SaaS from

https://brainly.com/question/24852211

#SPJ1

The unit MIPS is used to measure the speed of a___.
A) Disk drive
B) Tape drive
C) Printer
D) Processor

Answers

Answer:

D) Processor

Explanation:

MIPS refers millions instruction per sec and is used to measure the speed of Processor.

Draw the flow chart to find roots of Quadratic equation ax+bx+c=0

Answers

Using the knowledge in computational language in C++ it is possible to write a code that draw the flow chart to find roots of Quadratic equation.

Writting the code in C++:

#include <math.h>

#include <stdio.h>

int main() {

double a, b, c, discriminant, root1, root2, realPart, imagPart;

printf("Enter coefficients a, b and c: ");

scanf("%lf %lf %lf", &a, &b, &c);

discriminant = b * b - 4 * a * c;

// condition for real and different roots

if (discriminant > 0) {

root1 = (-b + sqrt(discriminant)) / (2 * a);

root2 = (-b - sqrt(discriminant)) / (2 * a);

printf("root1 = %.2lf and root2 = %.2lf", root1, root2);

}

// condition for real and equal roots

else if (discriminant == 0) {

root1 = root2 = -b / (2 * a);

printf("root1 = root2 = %.2lf;", root1);

}

// if roots are not real

else {

realPart = -b / (2 * a);

imagPart = sqrt(-discriminant) / (2 * a);

printf("root1 = %.2lf+%.2lfi and root2 = %.2f-%.2fi", realPart, imagPart, realPart, imagPart);

}

return 0;

}

See more about C++ code at brainly.com/question/19705654

#SPJ1

give two logics how a computer is better then man ​

Answers

Answer:

Remember facts precisely without error or difficulty recalling.Perform repeated operations/actions without getting tired, bored, hungry or sleepy.Numeric calculations.Play certain games: AlphaGo Zero: Learning from scratch | DeepMindDo as they are told (though sometimes too precisely).

Explanation:

Hope it helps!!!

Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.

Answers

In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time.

What is file structure?

A file structure is known to be the ways or combination of depiction for data in files.

Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in  fast time.

Learn more about files from

https://brainly.com/question/1178560

#SPJ1

Explain three ways for the attacker to avoid raising alarms from intrusion detection systems.

Answers

IDS or Intrusion detection system is very powerful but clever attack can make it reckless

#1

Use Insertion attack

It generally denotes to sending dummy intruders in multiple amount the IDS gets confused and attacker can go

#2

Using codewords or doing encoding and decoding(Obfuscating)

Its very useful technique

#3

Using shell codes

IDS will be failed if you successfully implement it

The three ways for the attacker to avoid raising alarms from intrusion detection systems are

Explanation:

Session splicing and fragmentation - involve breaking, slicing, and splitting packets into multiple pieces such that no single packet causes the IDS to trigger an alert.

Invalid packets - Sending invalid TCP packets is another way of evading an IDS.

Polymorphic shellcodes -Most IDS systems have a standard default set of intrusion signatures. Attackers can modify the attack payload so that it doesn’t match the default IDS signature and gets through it.

Hope it helps, any confusion you may ask!

Type the correct answer in the box. Spell all words correctly.
Which professional American organization for designers has set up many standards and guidelines that its members have to follow?

Answers

The professional American organization for designers has set up many standards and guidelines that its members have to follow is known as ANSI.

What mean ANSI?

The American National Standards Institute (ANSI) is known to be a kind of private, non-profit organization that gives or coordinates the U.S. voluntary standards and the conformity in terms of assessment system.

Hence, The professional American organization for designers has set up many standards and guidelines that its members have to follow is known as ANSI.

Learn more about American organization from

https://brainly.com/question/19334871

#SPJ1

Answer: Institute of Graphic Arts

Explanation:

The American Institute of Graphic Arts (AIGA) is a professional membership organization for designers. 

AIGA has set up many standards and guidelines that its members have to follow. 

These standards may be ethical, professional, or even legal.

(Plato)

In this lab, you complete a prewritten Python program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:

The charge for all signs is a minimum of $35.00.
The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.
If the sign is make of oak, add $20.00. No charge is added for pine.
Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.

Instructions
Make sure the file HouseSign.py is selected and open.
You need to assign variables for the following:
A variable for the cost of the sign assigned to 0.00 (charge).
A variable for the number of characters assigned to 8 (numChars).
A variable for the color of the characters assigned to "gold" (color).
A variable for the wood type assigned to "oak" (woodType).
Write the rest of the program using assignment statements and if statements as appropriate. The output statements are written for you.
Execute the program by clicking the Run button at the bottom of the screen. Your output should be: The charge for this sign is $82.0.

Answers

Using the computer language in python to write a function code that personalized house signs

Writting the code in python:

#Assign varibles

charge = 0.00

numChars = 8

color = "gold"

woodType = "oak"

#Checking for number of characters

if numChars > 5:

charge = 35 + (numChars-5)*4

elif numChars > 0:

charge = 35

#Checking wood type

if woodType == "oak":

charge += 20

#Checking for color

if color == "gold":

charge += 15

#Print output

print("The charge for this sign is $"+str(charge)+".")

See more about python at brainly.com/question/13437928

#SPJ1

In cell I5, enter a formula without using a function that divides the General Medicine total in cell H5 by the annual total in cell H9 to display the department’s percentage of total revenue. Use an absolute reference for cell H9, and then enter the same formula without formatting from cell I5 to the range I6:I9.

Answers

The formula to enter in cell I5 is  = $H$5/H9

How to enter the formula?

The given parameters are:

Cell H5 = Medicine TotalCell H9 = Annual Total

To divide H5 by H9, we have

H5/H9

Cell H5 is to be referenced by absolute reference

So, we have:

$H$5/H9

To enter the formula in cell I5, we use the following:

= $H$5/H9

When the same formula is entered in I6 to I9, we have:

= $H$5/H10

= $H$5/H11

= $H$5/H12

= $H$5/H13

Read more about Excel formulas at:

https://brainly.com/question/14299634

#SPJ1

Other Questions
Beginning with the graph of f(x) x2, what transformations are needed to form g(x) = 3(x + 2)2 - 1?O The graph of g(x) is narrower than f(x) and S shifted to the right 2 units and down 1 unit.O Thegraph of g(x) is narrower than f(x) and is shifted to the left 2 units and down 1 unit. The graph of g(x) is wider than f(x) and is shifted to the left 2 units and down 1 unit. The graph of g(x) is wider than f(x) and is shifted to the right 2 units and down 1 unit. On a coordinate plane, a line goes through (negative 4, 0) and (4, negative 4). a point is at (2, 3). what is the equation of the line that is parallel to the given line and passes through the point (2, 3)? x 2y = 4 x 2y = 8 2x y = 4 2x y = 8 WILL MARK BRAINLIEST!! In those days the Church was not merely a thermometer that recorded the ideas and principles of popular opinion; it was a thermostat that transformed the mores of society.Type of figurative language:Meaning of figurative language:Effect on tone and mood:Effect on audience: need help on this problem The congressional research service and the government accountability office are examples of? The choice database does not have any impact on the relevancy of search results true or false In the opening passage, the author recalls his experience as he joined the band of wine-drinking, inner-city men in Washington, DC. Based on this experience, which statement best summarizes the experience of the author?Group of answer choices1) He concluded homeless men have no system of values, norms, or beliefs.2) The author observed that street men are influenced by the norms and beliefs of society.3) The author was using his sociological imagination by mingling with the homeless.4) He was lost in the inner city environment with little hope of surviving the evening. Which five agencies should you have emergency numbers written down and posted in your child care environment for? need help with this asap When parking uphill without a curb, which way should you turn your front wheels?. How can clearly defined and strictly enforced property rights increase economic growth in a dvc? Which structure is highlighted and indicated by the leader line? Which statement is an example of one that must appear on advertisements for educational events Refer to the above diagram for the milk market. If the price were $2.00 per gallon, then there would be There are 10 M&Ms of which 6 are green, in a bowl. You select 2 of them and eat each after it is selected. Is this a binomial experiment? Why or why not? What is the total pressure of a mixture of he and h2 if the partial pressures are 320 mm hg and 800 mm hg respectively The ___________ is a plane perpendicular to the optic axis through the focal point. kn, PUSA Write a letter to your friend Describing advantage dis advantage smart phone A legal document contains pages numbered 1 through 50. What is the probability that the lawyer will flip to a page number that is not a multiple of 4 [tex]\mathbb Question[/tex]Attached above!!