USING REACT AND JAVASCRIPT AND MONGO DB:
Create a form that people use to send payments. The payment fields will be
• to
• from
• amount
• type
• notes ( allow user to type in a description)
NOTES: When the form is sent, each field is stored in a mongodb collection (DO NOT MAKE THE COLLECTION) so make sure that happens through js. Each variable name is the same as the payment field name. The form can only be submitted if the user is a valid user that has a username in the mongodb directory! Please ask any questions/

Answers

Answer 1

Create a payment form using React and JavaScript that stores submitted data in a MongoDB collection, with validation for user existence.


To create the payment form, you will need to use React and JavaScript. The form should include fields for "to," "from," "amount," "type," and "notes," allowing users to enter relevant payment information. Upon submission, the data should be stored in a MongoDB collection.

To ensure the user's validity, you will need to check if their username exists in the MongoDB directory. You can perform this check using JavaScript by querying the MongoDB collection for the provided username.

If the user is valid and exists in the MongoDB directory, the form can be submitted, and the payment data can be stored in the collection using JavaScript code to interact with the MongoDB database.

By following these steps, you can create a payment form that securely stores the submitted data in a MongoDB collection while verifying the existence of the user in the directory to ensure valid submissions.

Learn more about MongoDB click here :brainly.com/question/29835951

#SPJ11


Related Questions

What refers to the way that a user gets data from a computer, such as
reading a text message printing a report, or viewing photos on a monitor?

Answers

Answer:

Possibly IOT or internet of things. Not 100% sure if I am understanding question fully

Explanation:

Discuss the importance of using appropriate tools in conducting activity in farming?​

Answers

Answer:

Farm tools can be very helpful to a farmer - just like all tools they improve the efficacy of the work the farmer does, making them more productive. It all depends on the tool and the job it is matched to. There is a gap between the tools that are being sold by various and sundry purveyors and the actual need of the farmer. So far, I have found that bigger is not always better vis-a-vis big tractors and the like. We have more recently purchased lighter tractors on our farm as they work better on wet ground which is what we are dealing with in our most recent wet Springs.

difference between nintendo switch and switch lite

Answers

Answer:

thank you sa point labyu stay safe

Answer: The switch lite is the one you can't dock onto your tv and is mostly used for handheld purposes, also you can't take off the controllers.

Explanation:

________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.

Answers

Hybrid Drives

Explanation

This is the name for the two drives mixed together. I have one in my pc and it works pretty well.

The storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives are called as Hybrid drives.

What is drive?

Drive provides a storage space and speed for processing the data in the drive on the personal computers or laptops at low cost.

There are two types of drives- Solid state hard drives and Hard disks.

So, the combination of both the drives is named as Hybrid drives containing features of large space as well as higher processing speed.

Thus, Hybrid drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.

Learn more about drive.

https://brainly.com/question/10677358

#SPJ2

PSEUDOCODE PRACTICE!!! NEED HELP IMMEDIATELY!!! FIRST ANSWER GETS BRAINLYEST!!!

PSEUDOCODE PRACTICE!!! NEED HELP IMMEDIATELY!!! FIRST ANSWER GETS BRAINLYEST!!!

Answers

Answer:

a-nothing b-3 c-9 d-1

Explanation:

if the dispersion of returns on a particular security is very spread out from the security's mean return, the security . multiple choice question. is highly risky is risk-free has a low level of risk

Answers

Answer:

highly risky

Explanation:

If the dispersion of returns on a particular security is very spread out from the security's mean return, the security  is highly risk

What is meant by dispersion of returns ?

Dispersion in finance refers to a range of potential returns on an investment. It is a tool to assess how risky an investment is. It is a dangerous investment if the dispersion is large because there are several possible values for the return on that investment.

The range of distribution of information regarding an expected value is referred to as dispersion. It displays the relationship between the distribution and the reference point or centre value. When determining the quality, volatility, and yield of data for any statistical observation, it is a crucial consideration.

Dispersion is a statistical word that describes the magnitude of the expected value distribution for a given variable.

To learn more about dispersion refer to :

https://brainly.com/question/29560631

#SPJ4

which answer illustrates “compound interest”

Answers

Answer:

d- you earn interest on the money in your savings account. Then you, in addition earn interest on interest

Explanation:

The compound interest means the interest i.e. earned on the money that saved by you and the interest you earned.

Therefore as per the given options, the last option is correct as it represents the interest earned in the saving account plus it earns interest on interest

Hence, all the other options are incorrect


Isabela wants to add an image to her presentation. Which tab should she use?

Answers

The “add image” tab ??

Answer:Insert

Explanation:

Edg. 2021

discuss why ergonomics is important?​

Answers

Answer: Ergonomics are important because when you're doing a job and your body is stressed by an awkward posture, extreme temperature, or repeated movement your musculoskeletal system is affected.

By default a word 2k13 document has one _______​

Answers

Answer:

HUHHHHHHHHHHHH??????????

Explanation:

The Normal. dotm template opens whenever you start Microsoft Word, and it includes default styles and customizations that determine the basic look of a document. Note: Any changes that you make to Normal.

Answer:

im sorry wha? Imaoo

Explanation:

Password Checking Write a program that prompts the user to enter a password and store it in an array of character. The program will then check if the password contains only the alphabet. If yes, prompt the user to re-enter a new password containing characters other than just the alphabet.

Answers

The program assumes that the password should contain at least one non-alphabet character.

Here's a program in Python that prompts the user to enter a password, checks if it contains only alphabets, and prompts the user to re-enter a new password if necessary.

```python

def check_password(password):

   if password.isalpha():

       return True

   else:

       return False

def main():

   while True:

       password = input("Enter a password: ")

       if check_password(password):

           print("Password should contain characters other than just the alphabet. Please try again.")

       else:

           print("Password accepted.")

           break

if __name__ == "__main__":

   main()

```

1. The function `check_password` takes a password as an argument and checks if it contains only alphabets. It uses the `isalpha()` method to determine if all characters in the password are alphabets. If it is true, it returns `True`; otherwise, it returns `False`.

2. The `main` function contains a while loop that keeps asking the user to enter a password until a valid password is provided.

3. Inside the loop, the user is prompted to enter a password using the `input` function.

4. The `check_password` function is called to check if the entered password contains only alphabets. If it does, a message is printed asking the user to enter a password containing characters other than just the alphabet. If it doesn't, a message is printed stating that the password is accepted, and the loop is terminated.

5. The `main` function is called at the end to start the program execution.

Note: This program assumes that the password should contain at least one non-alphabet character. If you have any specific requirements for the password validation, you can modify the `check_password` function accordingly.

To know more about program visit

https://brainly.com/question/30783869

#SPJ11

Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.

Answers

Answer:

C.Boot the computer from the Windows installation disc and run Reset this PC

Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.

What Windows installation disc and run Reset this PC?

From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.

In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.

Therefore, Boot the computer from the Windows installation disc and run Reset this PC.

Learn more about Windows installation here:

https://brainly.com/question/24282472

#SPJ5

SCENARIO:
The butter Chicken company’s CEO would like to know which methodology to adopt as part of the future direction of the IT department’s growth and continuous improvement. The CEO would like to know ITIL’s strengths. The benefits that could be relegalized by adopting ITIL. And a recommended implementation strategy. You have been asked document a proposal for review by the CEO and IT manager.
REMINDER: You work for The butter Chicken Co.
You are providing a proposal to the CEO and IT manager outlining the benefits of ITIL and why it should be implemented.
Description of the problem –Description of ITIL that can be understood by management making particular reference to the company’s current problems –
Benefits of ITIL to the company –
Suggested adoption plan –
Company changes needed to adopt ITIL based ITSM –

Answers

Description of the Problem:
The Butter Chicken Company's IT department currently faces several challenges that hinder its efficiency and effectiveness. These challenges include:

- Lack of Standardization: There is a lack of standardized processes, procedures, and documentation across IT service delivery. This inconsistency leads to inefficiencies, delays, and potential errors in providing IT services to the company.

- Reactive Approach: The IT department often operates in a reactive mode, addressing issues as they arise rather than proactively identifying and preventing them. This reactive approach leads to increased downtime, customer dissatisfaction, and higher support costs.

- Limited Visibility and Reporting: There is a lack of comprehensive visibility into IT service performance, metrics, and reporting. Without accurate and timely data, it becomes challenging to measure and improve the quality of IT services.

Benefits of ITIL to the Company:
By adopting ITIL, The Butter Chicken Company can realize the following benefits:

- Improved Service Quality: ITIL provides a framework of best practices that enables the IT department to deliver high-quality services consistently. By implementing ITIL processes, such as Incident Management, Problem Management, and Change Management, the company can enhance service reliability, reduce downtime, and minimize the impact of incidents and problems on business operations.

- Enhanced Customer Satisfaction: ITIL focuses on aligning IT services with the needs of the business and its customers. By implementing ITIL's Service Level Management and Service Catalog Management processes, the IT department can set clear service expectations, establish service level agreements (SLAs), and improve overall customer satisfaction.

- Increased Efficiency and Cost Savings: ITIL emphasizes the optimization of IT processes and resources. Through the adoption of ITIL's Service Asset and Configuration Management, Release and Deployment Management, and Continual Service Improvement processes, The Butter Chicken Company can streamline operations, reduce redundancies, and achieve cost savings by eliminating unnecessary expenditures.

- Better Decision Making: ITIL promotes the collection and analysis of relevant data to make informed decisions. By implementing ITIL's Service Reporting and Demand Management processes, the company can gather valuable insights, identify trends, and make data-driven decisions to improve IT services and support business objectives.

Implementing ITIL offers significant benefits such as improved service quality, streamlined processes, and enhanced customer satisfaction for The Butter Chicken Co., with a recommended adoption plan for successful implementation.

What are the advantages of implementing ITIL in The Butter Chicken Company's IT department?

ITIL offers several benefits to the company. Firstly, it establishes clear and standardized processes, ensuring consistent delivery of IT services. This reduces errors, enhances customer satisfaction, and minimizes downtime. Secondly, ITIL promotes a proactive approach to problem-solving and incident management, enabling quicker resolution and minimizing the impact on business operations. Thirdly, ITIL emphasizes the importance of monitoring and measuring IT services, enabling data-driven decision-making and continuous improvement. Lastly, ITIL encourages better communication and collaboration between IT teams and other business units, fostering a culture of collaboration and shared responsibility.

To implement ITIL, The Butter Chicken Company should follow a well-defined adoption plan. This involves conducting an initial assessment of the current ITSM practices, identifying gaps and areas for improvement. Next, the company should define a roadmap for implementation, including training and awareness programs for employees. It is crucial to involve key stakeholders from different departments to ensure successful adoption. The company should also consider establishing a dedicated ITIL implementation team to drive the process and monitor progress. Regular reviews and audits should be conducted to assess the effectiveness of the implemented ITIL practices and make necessary adjustments.

To fully embrace ITIL-based IT service management, The Butter Chicken Company needs to undergo certain changes. This includes updating or developing IT policies and procedures in line with ITIL best practices. The company should invest in suitable ITSM tools to support the implementation and ensure efficient service delivery. Training and development programs should be provided to enhance the skills and knowledge of IT staff. Additionally, a culture shift is required to foster a customer-centric mindset and encourage collaboration across departments.

Learn more about ITIL

brainly.com/question/30770754

#SPJ11

What are scientists going to explore next on Kepler-186f? A) evidence of the existence of life B) types of plant life that exist C) evidence of volcanic activity D) evidence of volcanic activity

Answers

Answer:

the answer is  a)

Explanation:

Answer:

the answer is a

Explanation:

Your transactions data set contains more than 10,000 rows. Some rows contain the same transaction. How would you remove the rows containing the identical transactions?.

Answers

To remove the rows containing the identical transactions, first click on the data tab that is displayed at the top of the screen. Then you select the range by highlighting it.

Later on check the top of the screen and then click on the data tab. The various commands will be displayed to you, and you should then click the 'remove duplicates'.

What does duplicate transactions implies?

Duplicate transactions is known to take place when a customer is said to refreshes their checkout page or when they had clicked on the buy button in a lot of times.

Note that identical transaction implies that there is a transaction about an items with some identical attributes or technical characteristics.

Learn more about identical transactions from

https://brainly.com/question/7176767

Describe how to Download GNS3 IOS Images from Cisco Dynamips routers that you can use to perform and other hands-on lab exercises.

Answers

To download GNS3 IOS images for Cisco Dynamips routers, follow the below given steps to perform hands-on lab exercises.

The steps are-
1. Sign up for a free Cisco account: Before downloading the IOS images, you'll need to create a free account on the Cisco website. Visit www.cisco.com and click "Register" to create your account.
2. Navigate to the Software Download Center: After logging into your Cisco account, go to the Software Download Center by clicking "Support & Training" > "Software Download."
3. Search for IOS images: In the search bar, type the specific Cisco router model you're looking for, such as "7200" or "3745." The search results will display relevant IOS images for the specified router model.
4. Choose the desired IOS image: Click on the router model you're interested in and browse the available IOS images. Look for the IOS image with the appropriate feature set required for your lab exercises.
5. Download the IOS image: Click the "Download" button next to the IOS image of your choice. Accept the End User License Agreement and follow the prompts to download the image to your computer.
6. Import the IOS image into GNS3: Open GNS3, click "Edit" > "Preferences," and then select "Dynamips" > "IOS Routers." Click "New" to add a new IOS image and browse to the downloaded IOS image file. Follow the setup wizard to configure the router model and image settings.
7. Verify the imported IOS image: After completing the setup wizard, the newly added IOS image will be listed in the "IOS Routers" section. Click "OK" to save the changes and exit the Preferences window.

Now, you can use the downloaded GNS3 IOS images to perform hands-on lab exercises with Cisco Dynamips routers.

Learn more about routers here: https://brainly.com/question/27960821

#SPJ11

A malware attack has corrupted 30TB of company data across all file servers. A systems administrator Identifies the malware and contains the issue, but the data is unrecoverable. The administrator is not concerned about the data loss because the company has a system in place that will allow users to access the data that was backed up last night. Which of the following resiliency techniques did the administrator MOST likely use to prevent impacts to business operations after an attack?
A. Tape backups.
B. Replication.
C. RAID.
D. Cloud storage.

Answers

Correct option is A. Tape backups.The administrator most likely used tape backups as a resiliency technique to prevent impacts to business operations after the malware attack.

Tape backups involve regularly creating backups of data onto tape storage media. These backups provide an additional layer of protection against data loss in the event of a malware attack or other disasters. By regularly backing up data to tapes, the administrator ensures that a recent copy of the data exists separately from the file servers.

In this scenario, although the malware attack corrupted 30TB of company data across all file servers, the administrator is not concerned about the data loss because the company has a system in place to access the data that was backed up the previous night.

This suggests that the administrator had implemented a tape backup solution, allowing the company to restore the lost data from the most recent backup.

Tape backups offer offline and durable storage, providing protection against data corruption or loss due to cyber attacks. They are a cost-effective and reliable option for long-term data retention and disaster recovery.

Learn more about Tape backups

brainly.com/question/32149728

#SPJ11

When you slam on the brakes in a car, it stops - but many things are actually
happening under the hood that the driver doesn't need to care about. What
other examples can you describe where abstraction is used to reduce
complexity? *

Answers

Answer:

the pistons of the car slow down

Explanation:

Some examples of how abstraction is used to simplify complex systems:

Programming LanguagesOperating Systems

What are other abstraction  examples

Abstraction is an important  idea in computer science and software engineering. It tries to make things less complicated and easier to handle.

Programming languages like Python, Java, and C++ make it easier for developers to code without worrying about the inner workings of a computer. Programmers can write code using simpler instructions without needing to think about how the computer works inside.

Operating systems are like a middleman between the stuff inside your computer and the programs you use. They make it easier for everything to work together. They control things like memory and processors, and help apps work with hardware without needing to know the specific details of the hardware.

Read more about abstraction  here:

https://brainly.com/question/7994244

#SPJ3

only some, not all, of the predefined functions in excel have an underlying algorithm that is programmed into the software. t or f

Answers

False. All predefined functions in Excel have an underlying algorithm that is programmed into the software.

What is predefined function?

Predefined functions are pre-written pieces of code that are designed to perform specific tasks. They are typically included in programming languages and libraries and are used to make code easier to write and read. Predefined functions can save time and energy by allowing developers to use existing code rather than writing everything from scratch. They are often used to perform basic operations such as calculating math equations, sorting data, and manipulating strings. Predefined functions are also known as built-in functions and are commonly used in web development, software engineering, and scientific programming.

To learn more about predefined function
https://brainly.com/question/15104479
#SPJ4

Who plays Rblx?? What do yall play?

Answers

Answer:

i play rblx

Explanation:

queenloveadriana (main acc)

AdiosLoca (alt)

Azazel_Iblis (the acc I'll use for my YT channel)

I also play Fn, CofD, Destiny, 2k, Mortal Combat, but my PS4 broke and I'm waiting to get my PS5 that I ordered        

Answer:

i do

Explanation:

PLEASE ANSWER ASAP!!!

Name the error that can happen as a result of adding binary numbers.

Answers

Answer:

Sometimes, when adding two binary numbers we can end up with an extra digit that doesn't fit. This is called an overflow error. This sum is fine as the original numbers have two digits, and the result of the sum also has two digits.

Explanation:

You were conducting a forensic analysis of an iPad backup and discovered that only some of the information is within the backup file. Which of the following best explains why some of the data is missing

Answers

The backup being examined in this case is probably a differential backup that contains the data that has changed since the last complete backup.

How does forensic analysis work?

A thorough study to determine the cause, origin, perpetrators, and outcomes of a security event or a breach of company policy or federal law is known as forensic analysis. Particularly in criminal cases, forensic analysis is frequently associated with evidence presented to the court.

What is the work of a forensic analyst?

Forensic science technicians often perform the following tasks in labs: Analyze the forensic evidence you have collected from crime scenes using chemical, biological, and microscopic methods. Investigate potential connections between suspects and criminal conduct using DNA or other scientific analysis findings.

To know more about forensic analysis visit:

https://brainly.com/question/4327079

#SPJ4

a school principal trying to find out if parents will help buy new playground equipment shows digital leadership by.

A. asking the school board to ask parents

B. Creating a email survey for parents

C. Ordering the equipment and asking parents to contribute

D. Setting up a web conference for a small group of parents

Answers

Answer:

D. is the correct answer!

Answer:

B. Creating a email survey for parents

Explanation:

I did this on edg

Make Your Own Flowchart

Answers

Answer:

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS5V59B3u23rfG-bXj8jNoV7rXfV62cyPnkcg&usqp=CAU

an example of a flow chart

Explanation:

An enum switch case label must be the unqualified name of an enumeration constant.
a. True
b. False

Answers

According to the question of enumeration constant, the answer of the question is true.

What is enumeration constant?

Enumeration constant is a named constant whose value is represented by a fixed number or a string. It is used in programming languages to represent a set of values. An enumeration constant can be used to represent a set of values such as days of the week, months of the year, or a set of states like open, closed, pending, etc. Enumeration constant makes code more readable and provides a way to assign a name to a set of values. It also eliminates the need to remember actual values. For example, if a program has to process values based on the days of the week, it can assign a number to each day, and then use the enumeration constant to refer to them instead of the actual values. Enumeration constants are also used in switch statements to identify cases that are part of a set of related values.

To learn more about enumeration constant

https://brainly.com/question/13264699

#SPJ1

HELP MY CODE ISN'T WORKING I WILL GIVE 20 POINTS AND BRAINLIEST!

HELP MY CODE ISN'T WORKING I WILL GIVE 20 POINTS AND BRAINLIEST!
HELP MY CODE ISN'T WORKING I WILL GIVE 20 POINTS AND BRAINLIEST!

Answers

Answer:

the given code is correct only try refreshing the page

Explanation:

mark as brainiest

Answer:

Mark the other guy Brainliest

Explanation:

You're welcome

2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

Answers

Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

What is company's website?

The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.

Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.

Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

Learn more about website here:

https://brainly.com/question/19459381

#SPJ2

Can you see who tries to access a password-protected file, but does not put in the password?

Answers

I belive you can not see who did however I may be wrong

Yes/no

Explanation:

Depending on the person.

Yes, if your cousins,parents,etc have opened it.

No, if people like hackers have done it.

What are the margins for Navy correspondence manual?

Answers

The Navy Correspondence Manual, which is the accepted manual for structuring and drafting Naval mail, specifies the margins for Navy correspondence.

The gap or separation between a page's edge and any text or images that are printed on it is referred to as a margin. They do a variety of tasks, such as assuring readability, allowing space for notes, and framing the information. Moreover, margins can be used in layout and design to add visual appeal and balance. To guarantee consistency and adhere to formatting standards, margins are often controlled and regulated in academic and professional writing. Moreover, the term "margins" can be used metaphorically to denote the outside limits or borders of anything, such as the profit margins of a business or the boundaries of an individual.

Learn more about margins here:

https://brainly.com/question/30156555

#SPJ4

Which statement is true about input and output devices? A. An input device receives information from the computer and an output device sends information to the computer. B. An output device receives information from the computer and an input device sends information to the computer. C. Neither statement is true. D. Both statements are true

Answers

Answer:

B. An output device receives information from the computer and an input device sends information to the computer.

Explanation:

Output device: The term "output device" is described as a device that is responsible for providing data in multitude forms, a few of them includes hard copy, visual, and audio media. The output devices are generally used for projection, physical reproduction, and display etc.

Example: Printer and Monitor.

Input device: The term "input device" is determined as a device that an individual can connect with the computer in order to send some information inside the computer.

In the question above, the correct answer is option-B.

Other Questions
Solve for x: 4(x + 2) = 3(x - 2) if 84 j of heat is added to a pure gold coin with a mass of 11 g , what is the temperature change? the specific heat capacity of gold is 0.128 j/gc . 20 - 9w = 4 ( 15 - w ) CAN SOMEONE PLEASE REVISE THIS OR SHORTEN IT OR GRAMMATICALLY CORRECT THIS SENTENCE!!!I have no idea if I need a ; or , or something please any English Expert willing to help!!!!In one of the experiments conducted was the abandonment of babies; as they sat in their infant seats, their mothers sitting by them, until ten minutes later, a signal appears, indicating their cue to leave. Which country benefits the most from international trade? Why were James Monroe and Robert Livingston sent to Paris? BRAINLY TO WHOEVER CAN HELP- ALSO IF YOU GIVE VIA FILESHARE PLS JUST GIVE ME A VERY BREIF SUMMARY CAUSE I CANT OPEN IT What could Genesis do differently to ensure she has a valid experiment?place some test tubes outside to receive more sunlight only change one variable at a time in the experiment 1/47 Screens: take measurements more than once a day BACK limit the experiment to one week Demand for an item is constant at 1,800 units a year. The item can be made at a constant rate of 3,500 units a year. Unit cost is 50, batch set-up cost is 650, and holding cost is 30 per cent of value a year. What is the optimal batch size, production time, cycle length and total cost for the item? If production set-up time is 2 weeks,when should this be started? What is the mass of a baseball thrown at 25 m/s resulting in a momentumof 10 kg*m/s? 0.4 kg2.5 kg10 kg250 kg 1/9(-3/5) write in simplest form How did Catherine the Great influence Enlightenment thinkers? A farmer packs 26 apples into trays for market. Each tray holds 6 apples. How many apples are in the partly filled tray? 32 children are going camping. Three children can sleep in one tent. How many tents are needed for all the children? Alysha would like to borrow $47,000 to pay one year's tuition at a private U.S. university. She would like to make quarterly payments and finish repaying the loan in 5 years. If the bank is quoting her a rate of 5 percent compounded monthly, determine her quarterly payment. (Round effective interest rate to 4 decimal places, e.g. 25.1253\% and final answer to 2 decimal places, e.g. 125.12.) Quarterly payment A bank is currently offering a savings account paying an interest rate of 4.0 percent compounded quarterly. Interest is paid once per month at the end of each month. It would like to offer another account, with the same effective annual rate, but compounded monthly. What is the equivalent rate compounded monthly? (Round answer to 4 decimal places, e.g. 25.1254\%.) Abe has his eye on a new car that will cost $26,000. He has $21,000 in his savings account, earning interest at a rate of 0.4 percent per month. How long (to the nearest month) will it be before he can buy the car? (Round answer to 0 decimal places, e.g. 15. Do not round your intermediate calculations.) 6. Anchorage (southern coast of Alaska) is several hundred miles north of Helena, Montana, yet its January temperatures are similar to Helena's. Explain why. please helpThe amount of matter in an object is known as ____ and it is measured using an electronic balance. The SI unit used with this measurement is ___. The amount of space something takes up is ___ and a graduated cylinder is most commonly used for liquids. The basic SI unit used for graduated cylinders in the ___.please put answers in order What is the slope of the line described by the data in the table below? x 0 1 2 3 y 2 4 6 8 answer ALL for ( brain-list, thanks, 5 star review)dont have to answer all* at least 2 Which of the following themes does the shell the alchemist finds in the Sahara mainly represent?a) water is a symbol for the universal language and so permeates every material thingb) the need to read the universal language in your surrounding or to listen to the shellc) sometimes you just find random things in random placesd) there are no accidents, for every object in every place has its meaning and its purpose. 5. Use the Lagrange multiplier method to find the values of and y which maximise the function f(x,y)=x^1/2y^1/2 subject to the constraint 2x +y = 20. 6. A sequence of numbers xo, 01.12.... is such that so = 1 and, for each n > 1xn = 1/3xn-1 + 2Find an explicit expression for , in terms of n. Hence describe the behaviour of xn as n -> infinity.