A certain processor has a physical address of 36 bits (a byte addressable memory) and a single word consists of 4 bytes=32 bits. The cache unit is of size 256 Kbytes with line (block) size of 4 words (16 bytes). This cache has a 2-way set associative organization. The processor makes on the average, one instruction fetch and 0.45 data read/write from memory per instruction. For a block size of 4 words the measured miss rate is 1.5%. We want to investigate the possible benefits of increasing the block size to 8 words (32 Bytes). The estimated miss rate (based on simulation) for this larger block size is 1%. The cache miss penalty is equal to (6 cycles + # of words per block). Assuming that the cost of a reference that hits the cache is 1 cycle, what is the average memory access time for the two block sizes and which block size is the better choice based on the AMAT: 4 or 8 (words)? Round your answers to two decimal places. Assume that the given miss rate is same for both instruction and data. Select one: O a. 1.15 1.148 O b. 1.14 1.154 Oc 1.20 1.25 8 Od 1.20 1.254 Question 6 Not yet answ Points out o Rag ques

Answers

Answer 1

The main answer to the question is: The average memory access time (AMAT) for a block size of 4 words is 1.15 cycles, while for a block size of 8 words, it is 1.20 cycles.

To calculate the average memory access time (AMAT) for each block size, we need to consider the cache miss rate and the cache miss penalty.

For the block size of 4 words (16 bytes), the cache miss rate is given as 1.5%. This means that 1.5% of the instructions and data accesses result in cache misses. The cache miss penalty for this block size is calculated as 6 cycles + number of words per block, which is 6 + 4 = 10 cycles.

To calculate the AMAT, we multiply the cache miss rate by the cache miss penalty and add the cache hit time (1 cycle) to the result. So for a block size of 4 words, the AMAT is:

(1.5% * 10 cycles) + 1 cycle = 0.015 * 10 + 1 = 0.15 + 1 = 1.15 cycles.

For the block size of 8 words (32 bytes), the estimated miss rate is 1%. Applying the same calculation, the cache miss penalty for this block size is 6 + 8 = 14 cycles. Therefore, the AMAT for a block size of 8 words is:

(1% * 14 cycles) + 1 cycle = 0.01 * 14 + 1 = 0.14 + 1 = 1.20 cycles.

In conclusion, the average memory access time (AMAT) for a block size of 4 words is 1.15 cycles, while for a block size of 8 words, it is 1.20 cycles. Based on these results, the block size of 4 words would be the better choice since it has a slightly lower AMAT.

Learn more about: average memory access time

brainly.com/question/32355699

#SPJ11


Related Questions

Jack knows how to use word processors, spreadsheets, and presentation software. He also has a basic knowledge of hardware, software, and the Internet. Given this information, it can be concluded that Jack has _____ literacy.

Answers

Answer: computer literacy

Given the above information, it can be concluded that Jack has computer literacy.

What is Computer literacy?

This is known to be  defined as given knowledge and ability that a person has in the area of the use of computers and its related technology in an efficient manner.

Note that  Given the above information, it can be concluded that Jack has computer literacy.

Learn more about computer literacy from

https://brainly.com/question/20892559

#SPJ6

A record is a specific piece of information state true or false​

Answers

Explanation:

I think it is False

hope it's help

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted the wifi network....

Any Suggestions on what to do here? I already restarted my PC twice, cleared my browsing data, and rebooted

Answers

Answer:

if u r at school, then it might be blocked.

if not, get a vpn proxy.

-
Which of the following is an example of academic integrity?
A. You work on each assignment mostly by yourself
B. You don't copy work or allow others to copy your work
c. You look up answers on the internet without citing the source
D. You work with close friends on assignments without instructor approval

Answers

Answer:

B. You don't copy work or allow others to copy your work

Explanation:

The example of academic integrity is that you don't copy work or allow others to copy your work. The correct option is B.

What is academic integrity?

The moral code or ethical policy of academics is known as academic integrity. The R.C., regarded as the "grandfather of academic integrity," popularised the phrase.

Being honest, fair, polite, and responsible in your studies and academic work is referred to as having academic integrity.

It entails acting in accordance with these ideals both when producing your own work and engaging with that of others.

Academic integrity is the practise of doing learning, teaching, and research with the principles of honesty, trust, fairness, respect, and responsibility.

Students, teachers, researchers, and all other staff members should act honestly, take responsibility for their choices, and be fair in all aspects of their job.

Thus, the correct option is B.

For more details regarding academic integrity, visit:

https://brainly.com/question/9540934

#SPJ2

What is the first step to understand the potential impact to the business about a Security threat?

Answers

Answer:

Identify assets and their values

Explanation:

As a security analyst, the first step to determine the potential security threat is to understand

what kind of assets needs to be protected?what is the value of such assets?

How did the introduction of illustrations and photos into design impact the newspaper?
A. It caused a national craze in purchasing cameras.
B. It detracted from the overall look of the paper, making it less interesting to customers.
C. It was quickly removed from the layout due to the negative reaction of the public.
D. It appealed to a new base of customer, making the newspaper more successful.

Answers

The  introduction of illustrations appealed to a new base of customer, making the newspaper more successful.

What is the importance of graphics in newspaper?

Graphics through the use of illustrations is one that helps to communicates a kind of messages even to those who do not know how to read.

Note that  the  introduction of illustrations appealed to a new base of customer, making the newspaper more successful as it also draws in the attention of readers.

Learn more about illustrations from

https://brainly.com/question/1504175

#SPJ1

A local park is interested in building a bridge over a short ravine. They have stressed that keeping costs low is very important to them. What type of bridge would you recommend they build?

Answers

Based on the requirement of low cost, I would recommend the park to build a simple beam bridge or a suspension bridge.

Why to build beam bridge or suspension bridge?

These types of bridges are relatively easy and inexpensive to construct compared to other types of bridges, such as arch bridges or cable-stayed bridges. However, the specific type of bridge would depend on the specific conditions and requirements of the location, such as the width and depth of the ravine, the load capacity required, and local building codes and regulations.

I recommend a beam or suspension bridge for cost-effectiveness. These are simple to build and suitable for short ravines. The specific type depends on site conditions and requirements.

To learn more about suspension bridge, visit: https://brainly.com/question/17582396

#SPJ1

Which statement about programming languages is true?

1) Lisp was designed for artificial intelligence research.
2) BASIC was the first high-level programming language.
3) FORTRAN was an early programming language designed for business use.
4) Pascal was the first programming language for personal computers.

Answers

Answer:

2

Explanation:

plz make me brainliest

Option A: Lisp was designed for artificial intelligence research.

The acronym Lisp stands for List Programming is a computer programming language developed about 1960 by John McCarthy.Lisp is the second-oldest high-level programming language which has a widespread use today.LISP has a very simple syntax in which a parenthesized list is used to give operations and their operands.This Language was designed for manipulating data strings with convenience.Lisp includes all the working as the function of any object.Lisp uses symbolic functions which are easy to use with AI applications.Originally Lisp was created as a practical mathematical notation used in computer programs.Lisp pioneered many revolutions in the field of computer science such as tree data structures, automatic storage management etc.

what is a cpu and what does it do

Answers

The CPU is the brain of a computer, containing all the circuitry needed to process input, store data, and output results. The CPU is constantly following instructions of computer programs that tell it which data to process and how to process it.

The central processing unit (CPU) is known as the brain of the computer it also takes the raw data and turns it into information.

fttp uses fiber-optic cable to provide extremely high-speed internet access to a user's physical permanent location. a. true b. false

Answers

False, FTTP stands for "Fiber to the Premises," which refers to a type of broadband network architecture in which fiber-optic cable is used to provide high-speed internet access directly to a user's premises

What is FTTP?

FTTP stands for "Fiber to the Premises," which is a type of broadband network architecture in which fiber-optic cable is used to provide high-speed internet access directly to a user's premises, such as their home or business.

In an FTTP network, a fiber-optic cable is run from a central network hub to a user's location, providing them with a direct connection to the internet. This allows for much faster and more reliable internet access than is possible with other types of broadband technologies, such as coaxial cable or DSL.

To Know More About Coaxial cables, Check Out

https://brainly.com/question/13013836

#SPJ1

NEW VID >> function product = vecvec (n, u, v); function product = vecvecin, u, v); Error: Function definition not supported in this context. Create functions in code file.

Answers

Define the function in a code file.

How to fix the function definition error in MATLAB?

The error message you received indicates that you cannot define a function in this context. The context in this case may refer to a script file or the MATLAB command window.

To create a function in MATLAB, you need to create a new M-file or add the function to an existing one. You can do this by clicking on the "New Script" button on the Home tab in the MATLAB desktop, or by selecting "File" > "New" > "Function" from the menu bar. Once you have created the M-file, you can define your function in it.

Here's an example of how to create a function in MATLAB:

1. Click on "New Script" on the MATLAB desktop.

2. Type the following code into the editor:

function [outputArg1,outputArg2] = functionName(inputArg1,inputArg2)

%FUNCTIONNAME Summary of this function goes here

% Detailed explanation goes here

outputArg1 = inputArg1;

outputArg2 = inputArg2;

end

3. Replace "functionName" with the name you want to give your function.

4. Define the input and output arguments as needed.

5. Write the code for your function between the "function" and "end" statements.

After defining your function, you can call it from the MATLAB command window or from another script or function.

Learn more about function

brainly.com/question/28303908

#SPJ11

alexa it is olewi.............................................

Answers

Answer:

jvksvksdvkbvkjsdkcn

Explanation:

Huh.........whattttt

NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for lightning protec-tion systems [250.4(A)(1)].

Answers

Answer:

a and b. 250.4(A)(1) Note

Explanation:

passwords installed by default are secure and do not need to be changed.

Answers

The answer to your question is that passwords installed by default are not always secure and it is recommended to  command change them for increased security.

default passwords are often widely known or easily guessed by hackers, making them to cyber attacks. Additionally, default passwords may not meet the minimum requirements for complexity or length, leaving them more susceptible to being .

it is important to understand that changing default passwords is just one aspect of a comprehensive approach to cybersecurity. It is also important to use unique and complex passwords for each account, enable two-factor authentication, and stay up-to-date on software updates and security patches.

To know more about command visit:

https://brainly.com/question/29627815

#SPJ11

Which actions help to protect a computer and keep it running properly? Check all that apply.
performing regular scans
deleting any unwanted files
backing up files and other data
saving Internet browsing history
saving and storing all junk files

Answers

Answer:

backing up files and other data

(25 POINTS)Which statement best reflects the importance of following safety guidelines?

Workplace injuries can result in losses to an organization’s profits.

OSHA responds to complaints of unsafe work environments, and can fine or take negligent employers to court.

Every year, thousands of people die as a result of workplace injuries.

Using equipment safely is faster and makes work more efficient.

Answers

Answer:

I think, Every year, thousands of people die as a result of workplace injuries.

Answer:

B

Explanation:

You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
A. Your developers will have ready access to the source code.
B. The open-source solution is in the public domain.
C. The code for the open-source solution can be viewed by a community of open-source developers.
D. Maintenance of an open-source solution relies on developers who volunteer to work on the code.

Answers

Answer:

honestly I think the other one is correct

Explanation:

Create a database named “InventoryManagementSystem.odb” in Open Office Base and then create the above tables and perform the following operations:

i) For ITEM_DETAILS table, set ITEM_ID as the primary key and VENDOR_ID as the foreign key (referencing to VENDOR table).

ii) Set VENDOR_ID as the primary key of VENDOR table.

iii) Set a composite primary key (ITEM_ID, CUSTOMER_ID, SOLD_DATE) for SELLING_DETAILS table; ITEM_ID and CUSTOMER_ID as the foreign keys.

iv) Set CUSTOMER_ID as the primary key of CUSTOMER table.

v) Write a query to display the ITEM details where the Item name starts with the letter ‘S’.

vi) Write a query to find the maximum item quantity supplied by vendor “Yash”.

vii) Create forms and reports for all the tables in the database.



Please send screenshots of doing it in computer

Answers

Create a database called "InventoryManagementSystem.odb" in Open... I Make ITEM ID the main key for the ITEM DETAILS table and VENDOR ID the secondary key.

What is inventory management system?

Whether the stocked items are company assets, raw materials and supplies, or finished goods that are ready to be sent to vendors or end users, an inventory management system is the combination of technology (hardware and software), processes, and procedures that oversees the monitoring and maintenance of stocked items. What are the top three inventory control models? Economic Order Quantity (EOQ), Inventory Production Quantity, and ABC Analysis are three of the most well-liked inventory control approaches.

Know more about secondary visit:

https://brainly.com/question/336747

#SPJ1

HELP!!
A delivery of information from one person—or a small team of people—to an audience is called a ____________.
Question 8 options:

Presentation

Template

Speaker Notes

Slide Show Toolbar

Answers

Answer:

Presentation

Explanation:

Information is being presented to an audience (this makes sense).

A template can be used to organize the information that is to be given to the audience.

Speaker notes only help the speaker give the information to the audience.

Slide how toolbar is only for creating the slideshow that can be used to help the audience understand what the speaker is saying.

Write a program that takes a decimal number from the user and then prints the integer part and the decimal part separately. For example, if the user enters 2.718, the program prints: Integer part = 2 and decimal part = .718 in python

Answers

Answer:

Explanation:

The following was coded in Python as requested. It is a function that takes in a number as a parameter. It then uses the Python built-in math class as well as the modf() method to split the whole number and the decimal, these are saved in two variables called frac and whole. These variables are printed at the end of the program. The program has been tested and the output can be seen below.

import math

def seperateInt(number):

   frac, whole = math.modf(number)

   print("Whole number: " + str(math.floor(whole)))

   print("Decimals number: " + str(frac))

Write a program that takes a decimal number from the user and then prints the integer part and the decimal

Robert has heard about the latest cell phone from LG Electronics that features Wi-Fi hotspot technology. Wi-Fi hotspot is a technology that allows users to share mobile internet with other Wi-Fi enabled devices. Robert visits the company's Web site to read more about the phone. Robert is in the ________ stage of consumer-adoption process.

Answers

Robert is in the information search stage of the consumer-adoption process.

In the information search stage, consumers actively seek out information about a product or service to gather more knowledge and make informed decisions. In this case, Robert has heard about the latest cell phone from LG Electronics with Wi-Fi hotspot technology, and he visits the company's website to read more about the phone. By visiting the website, Robert is engaging in information search to learn about the features, specifications, and benefits of the phone. He wants to understand how the Wi-Fi hotspot technology works and how it can benefit him in sharing mobile internet with other Wi-Fi enabled devices.

During the information search stage, consumers may also seek information from other sources such as online reviews, social media, or recommendations from friends and family.

They gather information to compare different products, assess their options, and make a more informed decision before proceeding to the next stage of the consumer-adoption process.

Learn more about information search

brainly.com/question/32163765

#SPJ11

How would you explain these three security risks (phishing, keylogging, malware) to a family member? What would you say to help them understand the dangers?

Answers

Answer:

1. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

2. Keyloggers are built for the act of keystroke logging — creating records of everything you type on a computer or mobile keyboard. These are used to quietly monitor your computer activity while you use your devices as normal.

3. Malware is intrusive software that is designed to damage and destroy computers and computer systems.

Explanation:

All of these can be used to steal data & passwords

Phishing, keylogging and malware are different ways of illegally getting hold of user data to be used for fraudulent activities.

Phishing is performed by impersonation, where users or customers of a particular organization or platform are contacted by emails, text or call requesting them to provide sensitive on behalf of the institution.

Keylogging occurs when keystrokes of a user is being monitored without consent. The logged or captured keys can be used to log into the individual's information and retrieve sensitive data.

Malware involves the use of infected files delivered over a network to carry out cyber attacks capable of capturing tons of data illegally.

It is important to withhold sensitive information and contact service providers if any suspicious communication is received.

Similarly, visiting unauthorized websites should be avoided and the use of firewalls on computer system should be adopted.

Therefore, phishing, keylogging and malware are ways of perpetrating cyber crime.

Learn more: https://brainly.com/question/19588151?referrer=searchResults

Write code that creates a list containing the contents of the list stored in the variable my_list in reverse order. Store the resulting list in the variable backwards. Do not use the reverse method of a list in your solution. Assume that my_list has been initialized.

Answers

You can make use of either to overcome the initial obstacle. a loop that switches objects based on index, or reverse(). Use reversed() or a slicing procedure for the second.

Sometimes it's necessary to process Python lists in the opposite sequence, going from the final object to the first. Working with lists backwards typically presents two fundamental difficulties:

Turning a list around in position. Reversing copies of a list that already exists. You can make use of either to overcome the initial obstacle.

a loop that switches objects based on index, or reverse. Use reversed() or a slicing procedure for the second. You'll learn about many approaches to achieving both in your code in the next sections.

Reversing the list using reversed creates a list reverse iterator object, which can then be type converted into a list using list. To reverse a list in-place, we may also use the list.reverse function.

To know more about reverse click here:

https://brainly.com/question/15284219

#SPJ4

Question # 4
Multiple Select
Which of the following statements are true regarding abstraction? Select 3 options.

Abstraction provides a way to see a complex situation more clearly.

Creating a model must occur before abstraction.

Abstraction is a process where details are added to further define the problem.

Refinement is the opposite of abstraction.

The level of abstraction needed depends on the situation and your goals.

Answers

Answer:

B: the level of abstraction needed depends on the situation and your goals

C: refinement is the oppostie of abstraction

E: abstraction provides a way to see a complex situtation more clearly

Explanation:

I just completed the assignemnet and was checking it while I made this answer.

Answer:

the level of abstraction needed depends on the situation and your goals

refinement is the oppostie of abstraction

abstraction provides a way to see a complex situtation more clearly

Explanation:

define lan and define optical fiber cable​

define lan and define optical fiber cable

Answers

Answer:

LAN, stands for Local area network

and its a local computer network that interconnects computers within a limited area | A fiber-optic cable, also known as an optical-fiber cable, is an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light

Explanation:

A LAN comprises cables, access points, switches, routers, and other components that enable devices to connect to internal servers, web servers, and other LANs via wide area networks.

The rise of virtualization has also fueled the development of virtual LANs, which enable network administrators to logically group network nodes and partition their networks without a need for major infrastructure changes.

For example, in an office with multiple departments, such as accounting, IT support, and administration, each department's computers could be logically connected to the same switch but segmented to behave as if they are separate.

-

¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?

Answers

Answer:

Espacio a la izquierda = 858,8439008 Gb

Explanation:

Dados los siguientes datos;

Tamaño del disco duro = 1 Tb

Vídeos = 126 Gb

Archivos de Office = 1376 * 117 Kb = 160992 Kb

Mp3 = 3000 * 3.8 mb = 11400 Mb

Sistema operativo (OS) = 4 Gb

Conversión:

En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.

1000 Kb = 1 Mb

160992 Kb = 160992/1000 = 160.992 Mb

Memoria total (Mb) = 11400 + 160,992

Memoria total (Mb) = 11560.992 Mb

A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;

1000 Mb = 1 Gb

11560.992 Mb = 11560.992/1000 = 11.560992 Gb

Por último, sumaríamos todos los tamaños de archivo en gigabytes;

Espacio total (memoria) utilizado = 126 + 11.560992 + 4

Espacio total (memoria) utilizado = 141,560992 Gb

Conversión:

1000 Gb = 1 Tb

Espacio restante = tamaño del disco duro - memoria total utilizada

Espacio a la izquierda = 1000 - 141.560992

Espacio a la izquierda = 858,8439008 Gb

Nota:

Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.

what are the disadvantages of using a workstation as a print server​

Answers

Answer:

Pros and cons of workstation

There are some pros and cons of workstation that are explained below:-

Advantages of workstation

High performance:

This type of computers can give more performance than a normal computer. It is best suited for rendering complex graphics, financial analysis, and digital content creation.

Single user:

A single user can use this type of computer at a time and hence the speed of the system can be improved and there is no other user that can interfere with the performance.

Smart investment:

Investing in such computers is good because it increases our productivity and can do more work than the normal user can do. For example, if you want to edit any animation and then render it then it can be done rapidly.

Used in the entertainment and media sector:

These computers can perform best in entertainment sector where a lot of audio and video processing is needed. Also, such computers work great in the media sector where live broadcasting is done.

Reliability:

You can easily diagnose any problem in the workstation. The IT staff can repair your system if you get a blue screen, or workstation can become unresponsive. IT staff can attach keyboard, mouse, and video and identify the problem in the workstation even the workstation is off.

Large memory:

A workstation has a larger memory than a desktop PC. It has about twice the memory as compared to laptops, tablets, smartphone or other devices. By using larger memory it can do more work in a shorter time. There are nearly no errors in memory while performing any task.

Multiple processors support:

A workstation has multiple processors attached to it. By using multiprocessors you can run multiple applications at a time without any issue. Your system will not slow down by opening multiple applications. A workstation is used by professionals like engineers, scientists, analysts and designers.

Large hard drives and SSD:

A workstation has hard drives which can store terabytes of data so any type of job of any size can be stored in the hard drives. Additionally, SSD (Solid State Drives) are also attached in the workstation to speed up the overall performance of the system.

Easy to use:

The workstation has a large keyboard than a laptop and it is easy to use if you stay in one room.

Disadvantages of workstation

Portability:

It is difficult to move workstation from one place to another. On the other hand, if you use a laptop then you can move it easily from one place to another. For moving workstation, you have to plug out every time you plan to move.

Expensive:

Workstation is expensive than low capacity computers. The higher cost is because of higher RAM, hard drives and multiprocessor support.

High power usage:

The workstation uses more electricity than other devices like tablets, smartphone, laptops and desktop computers.

Examples of workstation

Some examples of the workstation are:-

Apple Power Mac G5

Hp Z series

Dell Precision

Sun Microsystems SparcStation

Silicon Graphics IRIX Machines

Apple Mac Pro

Apple Macbook Pro

Explanation:

If I replace this screen with these black spots go away?

If I replace this screen with these black spots go away?

Answers

Yes I'm sure they would, these black spots are being caused due to a broken screen!

Hope this helps!!

Yes it will go away if you replace the screen with a new one

Shreya has combined all the cells in a single leftmost column in a table. Instead of identifying the category multiple times, she would like to combine these cells and then structure the word "Appliances” vertically in the cell.

Where will Shreya find these options?

1. Insert tab, Tables group
2. Design tab, Merge group
3. Table Tools Design tab, Merge group
4. Table Tools Design tab, Merge group, Alignment group

Answers

Answer:

B. Design tab, Merge group

Explanation:

what is the correct syntax to define a generic class with multiple bounded parameters? group of answer choices public class myclass {...} public class myclass extends {...} public class myclass extends , type2 > {...} public class myclass , type2 extends > {...}

Answers

The correct syntax to define a generic class with multiple bounded parameters is:

`public class MyClass {...}`

This means that the generic type `T` must be a subclass of `Type1` and implement the interface `Type2`.

Java Generics was introduced to deal with type-safe objects. It makes the code stable.Java Generics methods and classes, enables programmer with a single method declaration, a set of related methods, a set of related types. Generics also provide compile-time type safety which allows programmers to catch invalid types at compile time. Generic means parameterized types. Using generics, the idea is to allow any data type to be it Integer, String, or any user-defined Datatype and it is possible to create classes that work with different data types.

A Generic class simply means that the items or functions in that class can be generalized with the parameter(example T) to specify that we can add any type as a parameter in place of T like Integer, Character, String, Double or any other user-defined type.

learn more about generic class here:

https://brainly.com/question/12995818

#SPJ11

Other Questions
Miller will deposit $3,000 in the bank for 17 years. The Bankpays 5.4% per year, but it compounds the money weekly. What is thevalue of the account after this period (to the nearest cent) ? Use52 w an overseas phone call is charged at one rate (a fixed amount) for the first minute, and charged at a different rate for each additional minute. if a 7 minute phone call costs $10, and a 4 minute phone call costs $6.40, what is the rate charge for the first minute, and what is the rate charged for each minute after the first? Do you think Zimbardo's list of situations that seduce people into doing evil things is complete? Do you think there are other scenarios that might cause a good person to momentarily change their ways? Explain. What happens to the density of a a gas when a fixed mass is compressed into a smaller volume? a) density stays the same. b) density increases. c) density decreases. what safety procedures must be observed when hand-propping a small aircraft engine? If the price of a good is below the equilibrium price, a. there is a shortage and the price will fall. b. there is a surplus and the price will rise. c. there is a surplus and the price will fall. Answer this please (earn brainliest) screenshot 1 is to help answer screenshot 2. What does 100 mean and 1/2 mean in this situation. If n people have read the book one month, how many people will have read the book the following month? True or false: A firm's cash must be available in the correct amount and on the correct date. True false question. True False You own shares of Sunland DVD Company and are interested in selling them. With so many people downloading music these days, sales, profits, and dividends at Sunland have been declining 8 percent per year. The firm just paid a dividend of $1.85 per share. The required rate of return for a stock this risky is 15 percent. If dividends are expected to decline at 8 percent per year, what is a share of the stock worth today g Return on equity (ROE) measures the return to stockholders from their investment in equity. divides net income by (common stock + additional paid-in capital). divides net income by average total assets. divides owners' equity by total liabilities. The line "Thinking about the fun times we shared always makes me smile" is meant to be In the following exercises, multiply the binomials. Use any method.244. (x 7)(x 2) If the measure of angle JKP is 3r + 12 and the measure of angle PKN is 4r - 2, what is the measure of angle JKN , When qualifying an opinion because of an insufficiency of audit evidence, an auditor should refer to the situation in theScope Paragraph Notes to theParagraph Financial statementsa. Yes Yesb. Yes Noc. No Yesd. No No What component of plaque works on sugars to create acids that cause cavities? (a) Viruses. (b) Bacteria. (c) Moles. (d) Boils. the model used to explain why communities may over-exploit shared environmental resources even when they know that it may be against their long-term interests is known as How were Angela and Sarah Grimk influenced by the Second Great Awakening?O. They refused to work alongside male reformers due to the teachings of their church and focused solely on issues related to women.They were among the most famous leading members of the contemporary temperance movement that had originated in churches.Their religious beliefs strengthened their commitment to address social problems through involvement in the abolition movement. A typical Transnet wagon has 8 wheels with a brake block. The brake block has a predicted failure frequency of 1000 hours. Wagons operate 16 hours a day on average. Spares are procured at 90-day intervals. How many spares should Transnet keep in the inventory for each wagon to ensure a 90% probability of success? where does aldosterone exerts its effects in nephron.