what do you mean by hardware and software?

Answers

Answer 1

Answer:

I think the above information will help you a lot.

Have a nice day.

What Do You Mean By Hardware And Software?
Answer 2

Please read the screen shot brainly is not letting me write the whole thing

What Do You Mean By Hardware And Software?

Related Questions

Given an array of integers check if it is possible to partition the array into some number of subsequences of length k each, such that:
Each element in the array occurs in exactly one subsequence
For each subsequence, all numbers are distinct
Elements in the array having the same value must be in different subsequences
If it is possible to partition the array into subsequences while satisfying the above conditions, return "Yes", else return "No". A subsequence is formed by removing 0 or more elements from the array without changing the order of the elements that remain. For example, the subsequences of [1, 2, 3] are D. [1], [2], [3]. [1, 2], [2, 3], [1, 3], [1, 2, 3]
Example
k = 2.
numbers [1, 2, 3, 4]
The array can be partitioned with elements (1, 2) as the first subsequence, and elements [3, 4] as the next subsequence. Therefore return "Yes"
Example 2 k 3
numbers [1, 2, 2, 3]
There is no way to partition the array into subsequences such that all subsequences are of length 3 and each element in the array occurs in exactly one subsequence. Therefore return "No".
Function Description
Complete the function partitionArray in the editor below. The function has to return one string denoting the answer.
partitionArray has the following parameters:
int k an integer
int numbers[n]: an array of integers
Constraints
1 sns 105
1 s ks n
1 s numbers[] 105
class Result
*Complete the 'partitionArray' function below.
The function is expected to return a STRING
The function accepts following parameters:
1. INTEGER k
2. INTEGER ARRAY numbers
public static String partitionArray (int k, List public class Solution

Answers

Answer:

Explanation:

Using Python as our programming language

code:

def partitionArray(A,k):

flag=0

if not A and k == 1:

return "Yes"

if k > len(A) or len(A)%len(A):

return "No"

flag+=1

cnt = {i:A.count(i) for i in A}

if len(A)//k < max(cnt.values()):

return "No"

flag+=1

if(flag==0):

return "Yes"

k=int(input("k= "))

n=int(input("n= "))

print("A= ")

A=list(map(int,input().split()))[:n]

print(partitionArray(A,k))

Code Screenshot:-

Access controls are enforced automatically in FMS service routines that access and manipulate files and directories.
a True
b. False

Answers

Answer:

A. True

Explanation:

In FMS service routines, access controls are enforced automatically

and they that access and manipulate files and directories. Files and directories are usually accessed via access controls in most of the FMSs.

Additional processing overhead are usually imposed by FMS. Also, the FMS tend to restrict and hinder one from accessing secondary storage.

Write a CashRegister class that can be used with the RetailItem class that you wrote in Chapter 6's Programming Challenge 4. The CashRegister class should simulate the sale of a retail item. It should have a constructor that accepts a RetailItem object as an argument. The constructor should also accept an integer that represents the quantity of items being purchased. In addition, the class should have the following methods:
• The getSubtotal method should return the subtotal of the sale, which is the quantity multiplied by the price. This method must get the price from the RetailItem object that was passed as an argument to the constructor.
• The getTax method should return the amount of sales tax on the purchase. The sales tax rate is 6 percent of a retail sale.
• The getTotal method should return the total of the sale, which is the subtotal plus the sales tax.

Demonstrate the class in a program that asks the user for the quantity of items being purchased and then displays the sale’s subtotal, amount of sales tax and total.

Answers

Answer:

Following are the code to this question:

import java.util.*; //import package for user input

class RetailItem//defining class RetailItem  

{

private String desc;//defining String variable

private int unit;//defining integer variable

private double prices;//defining double variable

RetailItem()//defining default Constructor

{

   //Constructor body

}

Output:

The Sub Total value: 199.75

The Sales Tax value: 11.985

The Total value: $211.735

Explanation:

In the above code three class "RetailItem, CashRegister, and Main" is defined, in the class "RetailItem", it defines three variable that is "desc, unit, and prices", inside the class "get and set" method and the constructor is defined, that calculates its value.

In the next step,  class "CashRegister" is defined, and inside the class parameterized constructor is defined, which uses the get and set method to return its value.  

In the next step, the main class is declared, in the main method two-class object is created and calls its method that are "getSubtotal, getTax, and getTotal".  

There is some technical error that's why full code can't be added so, please find the attached file of code.  

a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​

Answers

Answer:

i think is "none of them"

What is the importance of using Onedrive in Windows 10 and how knowledge of it will have an impact in today's workplace?

Answers

The importance of one drive in windows 10 is that it helps the user to synchronize files in their computer.

Onedrive is a cloud storage system that is useful for the storage of files in a secured manner. A person can easily access their files whenever they want to.

In todays workplace a knowledge of onedrive has a great impact because

Onedrive offers an unlimited access to files whenever they are neededThe files can be available and accessed from anywhereIt helps with the organization of files in the work place.

One drive allows for this to be done even when offline. When online, there is an automatic synchronization of the made changes.

Read more at https://brainly.com/question/17163678?referrer=searchResults

Windows 10's one drive is useful because it enables users to synchronize information among various computers.Onedrive is indeed a cloud storage solution that can be used to store data in a secure environment.The user gets easy access to their files when their desire.In today's workplace, knowing how to use OneDrive is necessary because it gives unrestricted access to files anytime they're needed.The information can be transferred anywhere at.It assists with the arrangement of files in the workplace.It can be done and if you're not linked to the Network. Once you're online, the modifications you've performed are synchronized immediately.

Learn more:

brainly.com/question/24369537

What is the iterative procedure of recursive and nonrecursive?

Answers

Answer:

nonrecursive

Explanation:

You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.

Answers

Answer:

C++ PROGRAM

Explanation:

If the data rate is 10 Mbps and the token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle network with 40 stations? (The average number of stations the token must pass through is 40/2 = 20.) Ignore the propagation delay and the gap Ethernet requires between packets.

Answers

Answer:

1.024x10^-5

Explanation:

To calculate the transmission delay bytes for the token,

we have the token to be = 64bytes and 10mbps rate.

The transmission delay = 64bytes/10mbps

= 51.2 microseconds

A microsecond is a millionth of a second.

= 5.12 x 10^-5

The question says the average number of stations that the token will pass through is 20. Remember this value is gotten from 40/2

20 x 5.12 x 10^-5

= 0.001024

= 1.024x10^-5

Therefore on an idle network with 40 stations, the average wait is

= 1.024x10^-5

Write an INSERT statement that adds this row to the Categories table:

CategoryName: Brass
Code the INSERT statement so SQL Server automatically generates the value for the CategoryID column.

Answers

Answer:

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

Explanation:

The SQL refers to the Structured Query Language in which the data is to be designed and maintained that occurred in the relational database management system i.e it is to be used for maintaining and query the database

Now the INSERT statement should be written as follows

INSERT INTO categories (CategoryName)

VALUES ('Brass Code');

What is system software? Write its types.​

Answers

Answer:

There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)

Answer:

There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)

Explanation:

thanks for question

Scams where people receive fraudulent emails that ask them to supply account information are called ________.

Answers

Answer:

"Phishing" will be the correct approach.

Explanation:

This aspect of cyber attacks or fraud is called phishing, whereby clients or users are questioned for personally identifiable information about them.Attackers could very well-currently the most frequently use phishing emails to exchange malicious programs that could operate effectively in what seems like several different ways. Others would get victims to steal user credentials including payment details.

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page

Answers

Answer:

The correct answer is "List of posts with the most recent ones at the top".

Explanation:

A website that includes someone else's thoughts, insights, views, etc. about a writer or community of authors and that also has photographs as well as searching the web.It indicates that perhaps the blog should distinguish between different articles about the site because then customers who frequent the site will observe and experience the articles on everyone's blogs.

So that the above would be the appropriate one.

Which of the following statements are true about the growth of technology? Select 3 options.
- The Number of devices connected to the internet of things is expected to triple between 2018 and 2023
- The general public began connecting to the internet when the World Wide Web was introduced in 1991
- Individuals in the United States currently own an average of three connected devices.
- By 1995, almost half of the world’s population was connected to the Internet
- Currently, 67% of people on earth use at least one mobile device

Answers

Answer:

1. Currently, 67% of people on earth use at least one mobile device.

2. The general public began connecting to the Internet when the World Wide    Web was introduced in 1991.

3. By 1995, almost half of the world’s population was connected to the Internet.

Explanation:

I just took the test ;)

Answer:

The correct answer :

-The general public began connecting to the Internet when the World Wide Web was introduced in 1991.

-The number of devices connected to the Internet of Things is expected to triple between 2018 and 2023.

-Currently, 67% of people on earth use at least one mobile device.

( not, By 1995, almost half of the world’s population was connected to the Internet. )

Explanation:

edge 2022

What is the difference between business strategies and business models?
A. Business strategies include long-term business plans, while
business models include plans for daily business functions
B. Business strategies focus on specific aspects of a business, while
business models focus on how different aspects affect the whole
business.
C. Business models focus on specific aspects of a business, while
business strategies focus on how different aspects affect the
whole business.
D. Business strategies incorporate forms of traditional business
advertising, while business models incorporate the use of social
media.

Answers

Answer:

A . Business strategies include long-term business plans, while business models include plans for daily business functions

Answer: A

Explanation: A business strategy is a deliberate vision to get toward a desired long-term goal. A business model is a great tool to execute a business strategy. Yet while achieving a long-term goal a business strategy set a vision, mission, and value proposition that can be executed through several possible business models.

Write a program that uses input to prompt a user for their name and then welcomes them. Note that input will pop up a dialog box. Enter Sarah in the pop-up box when you are prompted so your output will match the desired output.

Answers

user_name = str (input = ("Please enter your name: "))

def greet (user_name):

print ("Welcome to your ghetto, {0}!".format(user_name) )

Suppose we have 999 records of employees Emp1, Emp2, Emp5, Emp6 and so on up to Emp998 and Emp999 stored in a sequence. Hence, records are nothing but a row in the table. In the employee table, we want to insert new records Emp3 and Emp4 in the sequence, and once we have done insertion we need to update and retrieve the record efficiently to optimize the performance of a database by minimizing the access time when query is being executed.

You are required to solve the problem with the index sequential access method with pros and cons in the given scenario

Answers

The records in the table represents the employee ID of each employee. Assume the table name is EMPLOYEES and the field name of employee IDs is ID, the following SQL query inserts Emp3 and Emp4 into the employees table.

INSERT INTO EMPLOYEES (ID) values (Emp3), (Emp4)

The advantage of using ISAM is that priorities are given to the indices of the records being inserted. So, Emp3 and Emp4 will be inserted immediately after Emp2.

However, a major disadvantage of using ISAM is that it is very expensive to keep the indices in a sequential order;

See attachment for the illustration of Index sequential access method (ISAM).

Read more about Index sequential access method (ISAM) at:

https://brainly.com/question/4692093

Your location has been assigned the 172.149.254.0 /24 network. You are tasked with dividing the network into 13 subnets with the maximum number of hosts possible on each subnet.

Required:
a. What is the dotted decimal value for the subnet mask?
b. How many additional bits will you need to mask in the subnet mask?

Answers

The subnet mask would be a 32-bit integer which is formed by assigning the host bits to all 0's and the networking bits to so many 1's.In this method, the subnetting separates the IP address between host and network addresses.The subnet mask covers an IP address with its 32-bit number, thus the term "mask".

Given:

Network IP address [tex]\bold{= 172.149.254.0 /24}[/tex]

Subnet numbers [tex]\bold{= 13}[/tex]

Calculating the borrow bits:

[tex]\to \bold{= ceil(\log_{2} 13) = 4 \ bits}[/tex]

a)

Calculating the dotted decimal value for the subnet mask:

[tex]\to \bold{11111111.11111111.11111111.00000000}\\\\\to \bold{255.255.255.240}\\\\[/tex]

b)

The additional bits which will be needed to mask the subnet mask that is = 4.

Learn more: brainly.com/question/2254014

Cloud computing gives you the ability to expand and reduce resources according to your specific service requirement.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

In Computer science, one of the most essential characteristics or advantages of cloud computing is rapid elasticity.

By rapid elasticity, it simply means that cloud computing gives you the ability to expand and reduce resources according to your specific service requirement because resources such as servers can be used to execute a particular task and after completion, these resources can then be released or reduced.

Some of the examples of cloud computing are Google Slides, Google Drive, Dropbox, OneDrive etc.

Convert the following decimal numbers into their binary equivalent: a. 13
b. 32 or 42
c. 292
d 12
e. 61
f. 120
g.29
h. 44
67
98

Answers

Answer: a. 1101 b. 10000 or 101010 c. 100100100 d. 1100 e. 111101 f. 1111000 g. 11101 h. 101100 1000011 1100010

Although slow start with congestion avoidance is an effective technique for coping with congestion, it can result in long recovery times in high-speed networks, as this problem demonstrates.

A) Assume a round-trip delay of 60 msec (about what might occur across the continent) and a link with an available bandwidth of 1 Gbps and a segment size of 576 octets. Determine the window size needed to keep the pipeline full and the a worst case estimate of the time it will take to reach that window size after a timeout occurs on a new connection using Jacobson’s slow start with congestion avoidance approach.

B) Repeat part (a) for a segment size of 16 kbytes.

Answers

Answer:

The answer to this question can be defined as follows:

In option A: The answer is "13020".

In option B: The answer is "468 Segments".

Explanation:

Given:

The value of round-trip delay= 60 m-second

The value of Bandwidth= 1Gbps

The value of Segment size = 576 octets

window size =?

Formula:

[tex]\text{Window size =} \frac{(\text{Bandwidth} \times \text{round} - \text{trip time})}{(\text{segment size window })}[/tex]

                     [tex]=\frac{10^9 \times 0.06}{576 \times 8}\\\\=\frac{10^9 \times6}{576 \times 8\times 100}\\\\=\frac{10^7 \times 1}{96 \times 8}\\\\=\frac{10^7 \times 1}{768}\\\\=13020.83[/tex]

So, the value of the segments is =13020.833 or equal to 13020

Calculating segments in the size of 16 k-bytes:

[tex]\text{Window size} = \frac{10^9 \times 0.06}{16,000 \times 8}[/tex]

                    [tex]= \frac{10^9 \times 0.06}{16,000 \times 8}\\\\ = \frac{10^9 \times 6}{16,000 \times 8 \times 100}\\\\ = \frac{10^4 \times 3}{16 \times 4}\\\\ = \frac{30000}{64 }\\\\=468.75[/tex]

The size of 16 k-bytes segments is 468.75 which is equal to 468.

what is
computer.write its example

Answers

The definition of a computer is a person or electronic device that makes and stores quick calculations or processes information. An example of a famous human computer is Ada Lovelace. An example of a computer is the MacBook.

Implement the generator function scale(s, k), which yields elements of the given iterable s, scaled by k. As an extra challenge, try writing this function using a yield from statement!


def scale(s, k):


"""Yield elements of the iterable s scaled by a number k.


>>> s = scale([1, 5, 2], 5)


>>> type(s)



>>> list(s)


[5, 25, 10]


>>> m = scale(naturals(), 2)


>>> [next(m) for _ in range(5)]


[2, 4, 6, 8, 10]


"""

Answers

Answer:

The generator function using yield from:

def scale(s, k):

   yield from map(lambda x: x * k, s)

Another way to implement generator function that works same as above using only yield:

def scale(s, k):

  for i in s:

       yield i * k

Explanation:

The complete program is:

def scale(s, k):

   """Yield elements of the iterable s scaled by a number k.  

   >>> s = scale([1, 5, 2], 5)

   >>> type(s)

   <class 'generator'>

   >>> list(s)

   [5, 25, 10]  

   >>> m = scale(naturals(), 2)

   >>> [next(m) for _ in range(5)]

   [2, 4, 6, 8, 10]

   """

   yield from map(lambda x: x * k, s)

If you want to see the working of the above generator function scale() as per mentioned in the above comments, use the following statements :

s = scale([1, 5, 2], 5)  

print(type(s))  

#The above print statement outputs:

#<class 'generator'>

print(list(s))

#The above print statement outputs a list s with following items:

#[5, 25, 10]                                                                                                                    

The function def scale(s, k): is

def scale(s, k):

   yield from map(lambda x: x * k, s)    

This function takes two parameters i.e. s and k and this function yields elements of the given iterable s, scaled by k.

In this statement:    yield from map(lambda x: x * k, s)    

yield from is used which allows to refactor a generator in a simple way by splitting up generator into multiple generators.

The yield from is used inside the body of a generator function.

The lambda function is a function that has any number of arguments but can only have one expression. This expression is evaluated to an iterable from which an iterator will be extracted. This iterator yields and receives values to or from the caller of the generator. Here the expression is x: x * k and iterable is s. This expression multiplies each item to k.

map() method applies the defined function for each time in an iterable.

The generator function can also be defined as:

def scale(s, k):

  for i in s:

       yield i * k

For the above example

s = scale([1, 5, 2], 5)  

def scale(s,k): works as follows:

s = [1, 5, 2]

k = 5

for loop iterates for each item i in iterable s and yields i*k

i*k multiplies each element i.e 1,5 and 2 to k=5 and returns a list

At first iteration, for example, i*k = 1 * 5 = 5, next iteration i*k = 5*5 = 25 and last iteration i*k = 2*5 = 10. So the output. So

s = scale([1, 5, 2], 5)  In this statement now s contains 5, 25 and 10

print(list(s))  prints the values of s in a list as: [5, 25, 10] So output is:

[5, 25, 10]

When a user runs a program in a text-based environment, such as the command line, what determines the order in which things happen?

Answers

Explanation:

In general, when a program runs in text-based environment like command line interface, the program is used for determining the order in which things happen.

As the program runs, the user will not have any choice and he or she can enter the required data.

If the user enters the data in required format then, he/she can get the result or output in desired format.

What is the output of this Python program, if the user types 3 as input?

Answers

0 1 2 will be the output of the function

Select the scenario that describes a top-down approach to data warehouse design.


Cathy’s Cards and Gifts, which has three stores, creates data marts for its sales, marketing, and delivery departments to study the possibility of establishing a new store.


Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.


Cynthia’s Florals, which is dealing with debt, creates new data marts for the service, delivery, and sales departments to develop a strategy to stay in business.


Connor’s Meat Market, which just opened, creates data marts to track the sale of each of the following meats: beef, pork, lamb, and fish.

Answers

Answer:

Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.

The scenario defines a top-down approach to data warehouse design as "Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed".

What is a top-down approach to data warehouse design?

In the "Top-Down" method system, a data warehouse exists defined as a subject-oriented, time-variant, non-volatile, and integrated data storage for the entire business data from various sources exist validated, reformatted, and saved in a normalized (up to 3NF) database as the data warehouse.

Therefore, the correct answer is option b) Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.

To learn more about warehouse design

https://brainly.com/question/25885061

#SPJ2

Select the true statement about the motherboard.


It executes the commands sent to it by the application software.


It acts as a storage point for read-only memory (ROM).


It acts as the working memory of the computer by transferring data from the hard disk for processing.


It provides much of the electrical connection between different computer parts.

Answers

Answer:

it executes the commands sent to it by the applica software .

The motherboard provides much of the electrical connection between different computer parts.

What is a motherboard?

This is known to be a kind of  printed circuit board that is made up of some key parts or aspect of a computer or any kind of device.

Conclusively, it is one that is made up of It connectors that is a place where other circuit boards can be placed and as such act to provides much of the electrical connection between different computer parts.

Learn more about motherboard from

https://brainly.com/question/12795887

#SPJ2

You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.

Answers

Following are the steps of the polynomial-time algorithm:

Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from[tex]\bold{ low \ to\ mid+1}[/tex] using only these roads.There is a solution if every shop can be reached by road only up to [tex]\bold{mid+1}[/tex], but not up to mid.You can [tex]\bold{set \ low = mid+1}[/tex] if all businesses aren't accessible using both [tex]\bold{mid\ and\ mid+1}[/tex] roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because [tex]\bold{ low > high}[/tex]You can do this by [tex]\bold{set\ mid = \frac{(low + high)}{2}}[/tex]The new low, mid, and high numbers are used in step (a).

In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.

Learn more:

polynomial-time algorithm: brainly.com/question/20261998

The slope and intercept pair you found in Question 1.15 should be very similar to the values that you found in Question 1.7. Why were we able to minimize RMSE to find the same slope and intercept from the previous formulas? Write your answer here, replacing this text.

Answers

I don’t get the question

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

Wireless resources management is communication to address they faster response time.

Explanation:

Wireless communication that provide bandwidth, and transmission reliable, towards development.

This communication is discovered to the date and have consumed physical layer  of available wireless resources.

Wireless communication management all this critical topic  and the management techniques, and limited device battery power.

Communication as the address channel loss, and multi path .

Communication are the latest resources allocation and new or next generation and technologies.

Wireless communication theoretical concepts in a manner, and the necessary mathematical tools and fundamental tools.

Wireless communication device industries up to date of the topic,readers are benefit from a basic.

A professor copies one article from a periodical for distribution to the
class. Is that Fair Use? *

Yes or No?

Answers

Yess I think I’m not sure

Answer:

no because...

Explanation:

proffesers say you can't copy so why would they copy and also proffesers have degrees they can co.e up with their own questions to help you students to learn more

Other Questions
Victor fue al mercado para comprar manzanas, naranjas y platanos; las naranjas costaron el doble de lo 1ue pago por las manzanas y los platanos costaron 8 pesos menos que pas manzanas, en total gasto 100 pesos. Determina el precio de las manzanas, naranjas y platanos The blue dot is at what value on the number line? explanation please! thx! Please help!! Identify the sentence with useless words or phrases.A.She has to work to support her family, even though it meant she had to drop out of school.B.She dropped out of school on account of the reality that it was crucial for her to help sustain her family.C.Dropping out of school is all too common, especially for those who must support their families.D.None of the above are examples of sentences with useless words or phrases. What are the solutions of the equation x4 5x2 14 = 0? Use factoring to solve. The board of directors of DDC omitted dividends in 2016 on their $100 par 6% noncumulative preferred stock. In 2017, a $2 preferred dividend was paid. For DDC, 2018 has been a good year, and the board wishes to pay a common dividend. How much must be paid per share on the preferred for 2018 in order to pay a common dividend pls help, 30 points u-u Can someone help me please???????? In an experiment to measure the wavelength of light using a double slit, it is found that the fringes are too close together to easily count them. To spread out the fringe pattern, one could Find the first, fourth, and eighth terms of the sequence. A(n) = 5 2x 1 Harwell Company manufactures automobile tires. On July 15, 2018, the company sold 1,300 tires to the Nixon Car Company for $50 each. The terms of the sale were 3/10, n/30. Harwell uses the gross method of accounting for cash discounts. Required: 1. Prepare the journal entries to record the sale on July 15 (ignore cost of goods) and collection on July 23, 2018. 2. Prepare the journal entries to record the sale on July 15 (ignore cost of goods) and collection on August 15, 2018 Determine whether each sequence is a geometric sequence. If yes, then state the common ratio.1, -4, 16, -64, ... Vince and 11 of his friends went out for pizza on Saturday night to celebrate Vinces birthday. The cost of the pizza and soft drinks before sales tax and tip was $47.96. What is the amount of sales tax for the bill if the rate is 7%? Show your work. If (x+2) is a Factor x^3 + 2x^2 + 2x + k then find the value of K. What is the additive identity of -17? Question 17 of 25Why do plants produce more carbon dioxide than oxygen during the night?O A. Respiration produces oxygen during the day and carbon dioxide atnight.B. Respiration can happen without sunlight, but photosynthesiscannot.O C. Respiration can only occur when there is no available sunlight.O D. Photosynthesis only produces carbon dioxide during the night.SUBMIT 1) UN MOVIL A SE MUEVE DESDE UN PUNTO CON VELOCIDAD CONSTANTE DE 20m/s EN EL MISMO INSTANTE A UNA DISTANCIA DE 1200m, OTRO MOVIL B SALE Y PERSIGUE AL MOVIL A CON VELOCIDAD CONSTANTE DE 40m/s. EN QUE TIEMPO Y A QUE DISTANCIA B ALCANZA a Which number is equal to 10^-3?-1,000 -300.0010.003 Find the sum of all solutions to this equation : ((2x-4)/x+1)) * ((2x+8)/2) * ((2x-70)/(x+2)) =0 How do attributes affect function?