what is computer give definition ​

Answers

Answer 1

Answer:

computer is

an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Answer 2
an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.

Related Questions

2.1. prove (using a direct proof method) the following proposition: proposition: if a is an even integer number, then 7(a 3) is odd.

Answers

The method used is direct proof. The conclusion of the proof is that if a is an even integer number, then 7(a 3) is an odd number.

What is the method used to prove the proposition "if a is an even integer number, then 7(a 3) is odd"?

To prove this proposition using a direct proof method, we will assume that a is an even integer number. By definition, an even integer is a number that is divisible by 2 without leaving a remainder. Therefore, we can write a as 2k, where k is an integer.

Now, we need to find the value of 7(a 3) and determine if it is odd or even. Substituting a = 2k, we get:

7(a 3) = 7(2k 3) = 14k 21

To determine if 14k 21 is odd or even, we need to look at the last digit of the number. An odd number always ends in an odd digit (1, 3, 5, 7, or 9), while an even number always ends in an even digit (0, 2, 4, 6, or 8).

The last digit of 14k is always even, because it is multiplied by an even number (14 = 2 x 7). The last digit of 21 is odd. Therefore, the last digit of 14k 21 is odd, making it an odd number.

Since 7(a 3) is an odd number, we have proven that if a is an even integer number, then 7(a 3) is odd.

Learn more about method

brainly.com/question/14560322

#SPJ11

Computational artifacts can include various forms of bias that result in the _____
of certain groups of people.

Answers

Answer:

Exclusion

Explanation:

Right on Egenuity

Answer:Below

Explanation:

Computational artifacts can include various forms of bias that result in the _____of certain groups of

Question 5 int sum =0; for(i=0; i< 10; i++); sum += 1; What is the value of sum after the above code 63 11 Question 7 int i = 10; int sum = 0; do { sum = 25; } until (i>10): What happens when this code executes? infinite loop sum becomes 25, the loop executes once sum remains zero, the loop never execute Question 8 int i; int sum; Sum = 0; for (i = 10; i > 10; i++) { sum = 25; What happens when this code executes? sum remains zero, the loop doesn't execute sum is 25. the program runs for a very long time. sum is 25. the loop executes once Question 9 What is the result of the following code? float n, d; n= 10.0; d = 0.0; if ((d != 0) && ((d/n) >= 0)) System.out.println ("The result is positive"); else System.out.println ("The result doesn't exist or is negative"); e The result doesn't exist or is negative The profram aborts due to a divide by zero violation on the if statement The result is positive

Answers

Question 5:
The value of sum after the code executes is 10.

Here's the step-by-step explanation:
1. Initialize sum to 0
2. Iterate i from 0 to 9 (10 times)
3. For each iteration, add 1 to sum
4. After 10 iterations, sum becomes 10

Question 7:
The sum remains zero, and the loop never executes. Here's the explanation:
1. Initialize i to 10 and sum to 0
2. Check if i > 10 (which is false)
3. Since the condition is false, the loop does not execute and the sum remains 0

Question 8:
The sum remains zero, and the loop doesn't execute. Here's the explanation:
1. Initialize sum to 0
2. Set i to 10
3. Check if i > 10 (which is false)
4. Since the condition is false, the loop does not execute, and the sum remains 0

Question 9:
The output of the code is "The result doesn't exist or is negative". Here's the explanation:
1. Initialize n to 10.0 and d to 0.0
2. Check if d != 0 (which is false)
3. Since the first condition is false, the entire condition within the if statement is false, and the program executes the else statement
4. The else statement prints "The result doesn't exist or is negative"

To know more about program:

https://brainly.com/question/14368396

#SPJ11

Acredit given to an author for his or her work is called a(n)
citation.
copyright.
evaluation.
permission.
The answers is catation. I think it is right sorry if it is not

Acredit given to an author for his or her work is called a(n)citation.copyright.evaluation.permission.

Answers

Answer:

The answer is Citation because it's the credit given to any author

The algorithm below is used to find the largest element in a list of numbers.
By modifying one of the lines in the program it is possible to make the algorithm find the SMALLEST element. Which line would need to be modified and how?

The algorithm below is used to find the largest element in a list of numbers.By modifying one of the

Answers

The line that can be modified in the algorithm to return the smallest of the list is line 04

From the question, we understand that:

The algorithm returns the largest of all elements in a list

The above action is executed on line 04

To change the function of the algorithm to return the smallest, line 04 must be modified as follows:

IF (num < target)

Hence, the line that can be modified in the algorithm to return the smallest of the list is line 04

Read more about algorithms at:

https://brainly.com/question/24793921


What happens when you change just ONE character in your input string?

Answers

You must create a new string with the character replaced

all steps in this challenge activity require calling a document method to search the dom. write the javascript to assign listnodes with all elements with a class name of 'prog-lang'.

Answers


To assign the listnodes variable with all elements that have a class name of 'prog-lang', we need to use a document method to search the DOM. One such method is the getElementsByClassName() method. This method searches for all elements with a specified class name and returns a NodeList object.

So, to assign the listnodes variable with all elements that have a class name of 'prog-lang', we can write the following JavaScript code:

```
var listnodes = document.getElementsByClassName('prog-lang');
```

This code will search the entire document for all elements with a class name of 'prog-lang' and assign them to the listnodes variable. The variable will hold a NodeList object, which is similar to an array and can be used to access and manipulate the elements with the 'prog-lang' class.

It's important to note that this code assumes that there are one or more elements with a class name of 'prog-lang' in the DOM. If there are no such elements, the listnodes variable will be assigned an empty NodeList object.

Learn more about Javascript here:

https://brainly.com/question/16698901

#SPJ11

draw the arrow diagram for the relation. the domain for the relation a is the set f2; 5; 7; 8; 11g. for x, y in the domain, xay if jx − yj is less than 2.

Answers

The arrow diagram for the given relation on the domain {2, 5, 7, 8, 11} is a visual representation of the pairs (x, y) where |x - y| is less than 2.

To construct the arrow diagram, we consider each element in the domain and check its relation to the other elements based on the given condition. The condition states that x is related to y if the absolute difference between x and y, |x - y|, is less than 2.

Starting with the element 2, we examine its relation to other elements. Since 2 is the smallest element in the domain, it does not have any other elements that satisfy the condition. Therefore, there are no arrows originating from 2.

Moving on to the element 5, we find that it is related to both 2 and 7 since |5 - 2| = 3 and |5 - 7| = 2, both of which are less than 2. Thus, we draw arrows from 5 to 2 and 7.

Continuing in a similar manner, we find that 7 is related to 5 and 8, and 8 is related to 7 and 11. Therefore, arrows are drawn accordingly.

Finally, the element 11 does not have any other elements in the domain that satisfy the condition, so there are no arrows originating from 11.

Overall, the arrow diagram for the given relation on the domain {2, 5, 7, 8, 11} includes arrows from 5 to 2 and 7, from 7 to 5 and 8, and from 8 to 7 and 11.

learn more about arrow diagram here:

https://brainly.com/question/8223738

#SPJ11

where does a dot leader display in a document? group of answer choices between the columns of a list before and after an inserted object only before an inserted object on the word 2019 ruler

Answers

Dot leader display in a document occurs between the columns of a list.

What is Dot Leader in Word 2019?

Dot leader refers to a row of dots that separates and links text or figures. It is often used to produce visually attractive and readable content in Word documents. They are especially useful for formatting contents of a table of contents and index, helping to connect the chapter names and page numbers.

In Word 2019, dot leaders display between columns of a list. When you make a table of contents, a list of figures or tables, or an index, dot leaders may be used to connect the entries to their respective page numbers or descriptions. Additionally, they might appear before and after a particular object that you've inserted into a document, such as a picture or a chart.

Learn more about dot leaders: https://brainly.com/question/3889439

#SPJ11

In Pseudo code:

A text file holding financial information contains lines with the following structure:

o ID (5 characters)

o Rate (2 digits)

o Taxes (2 digits)

o Each item is separated by a colon":"

Let the user enter an ID to search for and output the rate of the ID, if not found output a message​

Answers

Answer:

Explanation:

import java.io.BufferedReader;

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class FinancialInfoSearch {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter ID to search: ");

       String searchID = scanner.nextLine();

       scanner.close();

       try (BufferedReader br = new BufferedReader(new FileReader("financial_info.txt"))) {

           String line;

           while ((line = br.readLine()) != null) {

               String[] data = line.split(":");

               if (data[0].equals(searchID)) {

                   System.out.println("Rate for " + searchID + ": " + data[1]);

                   return;

               }

           }

           System.out.println("ID not found.");

       } catch (IOException e) {

           System.err.println("Error reading file: " + e.getMessage());

       }

   }

}

In this code, the user is prompted to enter the ID to search for. The BufferedReader class is used to read the lines of the file. For each line, the split method is used to split the line into an array of strings using the colon character as a delimiter. The first element of the array is compared to the search ID, and if they match, the rate is outputted. If the end of the file is reached and no match is found, a message is outputted saying that the ID was not found.  

thank you

Abstracting the implementation details means we can modify it without dramatic effects on the system. Which of the following concepts represent this idea?
- none of the above
- polymorphism
- encapsulation
- information hiding
- inheritance

Answers

The concept that represents the idea of modifying a system without dramatic effects by abstracting the implementation details is "encapsulation."

Encapsulation is a fundamental principle of object-oriented programming that involves bundling data and methods into a single unit called an object. It allows for the hiding of internal details of an object and exposing only the necessary information and functionality through well-defined interfaces.

By encapsulating the implementation details within an object, the internal workings can be modified or improved without impacting the external code that interacts with the object. This provides a level of abstraction, allowing for changes to be made internally while maintaining compatibility and stability for the code using the object.

Polymorphism, inheritance, and information hiding are related concepts in object-oriented programming but do not directly represent the idea of modifying the implementation details without dramatic effects.

Learn more about "encapsulation here:

https://brainly.com/question/13147634

#SPJ11

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and errors of computer when you detached the following Keyboard-PS/2 Mouse-PS/2 Hard disk- IDE cable Floppy disk drive-IDE cable Room disk-IDE CABLE

OPERATION SHEET 6.2.2 Given the Neccesary tools materials and equipment identify the common faults and

Answers

Answer: NO MORE TYPING! NO MORE CLICKING! NO MORE MEMORY! NO MORE OPERATING!

You have been asked to join a team that is responsible for creating a handbook that outlines appropriate employee correspondence. Give two examples of topics that you would include in the manual along with why you think it would be important to include them.

Answers

Two examples of topics that would be included in the manual are the service provided by the company and the papers provided by the employee.

What is employee correspondence?

During a job search, a series of written communications is typically required. Both parties anticipate this crucial discussion between the applicant and the employer.

A thorough series of letters and other paperwork are typically prompted by an employer's positive response. There is very little room for a surprise with proper documentation.

Therefore, the service offered by the business and the documents supplied by the employee are two examples of topics that would be covered in the manual.

To learn more about employee correspondence, refer to the below link:

https://brainly.com/question/28162514

#SPJ1

What do ISO 27007 entail?

Answers

ISO 27007 is a standard that outlines guidelines for the implementation and management of an Information Security Management System (ISMS) audit program.

The standard provides guidance on conducting audits of an ISMS, as well as guidance on how to plan, manage, and execute the audit program.
ISO 27007 covers the audit process from start to finish, including planning, scoping, conducting, reporting, and follow-up.

It provides guidance on how to evaluate the effectiveness of an organization's ISMS and how to identify areas for improvement.
One of the key benefits of ISO 27007 is that it helps organizations to ensure that their ISMS is effective and in line with their business objectives. It also helps organizations to identify potential risks and vulnerabilities in their information security systems, and to take appropriate measures to mitigate those risks.
For more questions on audit program

https://brainly.com/question/24317218

#SPJ11

The ____ is the device or substance that actually holds data. A. Processor B. Memory C. Hard drive D. MotherboardE. Storage Medium

Answers

E. Storage Medium. The storage medium is the device or substance that actually holds data. It can be a physical device, such as a hard drive, solid-state drive, or USB flash drive,

or a non-physical medium, such as magnetic tape or optical discs.

The processor, memory, motherboard, and other components of a computer are important for processing and accessing data, but they do not actually hold the data in a persistent form. Instead, they work together to read, write, and manipulate data that is stored on a storage medium.

The choice of storage medium can affect the speed, reliability, and cost of data storage. Different types of storage media have different characteristics and are used for different purposes, depending on factors such as capacity, access speed, durability, and cost.

learn more about   data   here:

https://brainly.com/question/10980404

#SPJ11

Which type of cable can transfer data up to 480 megabits per second?
ana

Answers

Answer:

Most suppliers offer three types of cables. USB 1.1 cables support data transfer rates up to 12 megabits per second (Mbps). USB 2.0 cables support data transfer rates up to 480 Mbps. USB 3.0 cables support data transfer rates of up to 5.0 Gbit/s.

Explanation:

Answer:

USB 2.0 cables

Explanation:

This could have been searched by you  

write a program to find final velocity (v²=u²+2as) qbasic​

Answers

Answer:

SCREEN 12 ' Sets the screen mode to graphics mode

CLS ' Clears the screen

INPUT "Enter the initial velocity (u): ", u

INPUT "Enter the acceleration (a): ", a

INPUT "Enter the displacement (s): ", s

v = SQR((u * u) + (2 * a * s))

PRINT "Final Velocity (v): "; v

END

Explanation:

In this program, you are prompted to enter the values for initial velocity.

(u), acceleration

(a), and displacement

(s). The final velocity

(v) is then calculated using the formula v² = u² + 2as. Finally, the program displays the calculated final velocity.

Correct me if I'm incorrect.

A student is doing research for a class. The website has several links that do not work and is generally disorganized.
The website has a problem with its
.
Coverage
Authority
Apperance

Answers

Answer:

Coverage i guess

Explanation:

Which statements are true? Select 4 options.

A class variable can be a different type of class.

A class variable can be a list of instances of a different class.

An instance of a class cannot be changed after it is created.

Functions defined in a class are called methods.

Variables defined in the constructor of a class can be accessed by the main program that uses instances of the class.

Answers

Answer: All of the answers are correct EXCEPT "An instance of a class cannot be changed after it is created.

Explanation: I've done the problem. Also, if you have an instance of a class, you can no longer change it. It is frozen in time as that one instance. If had a class defining pets and you made an instance dogA where the pet was a brown medium sized dog, dogA would always be a brown medium sized dog. I think, at least.

Answer: A class variable can be a different type of class.

A class variable can be a list of instances of a different class.

Functions defined in a class are called methods.

Variables defined in the constructor of a class can be accessed by the main program that uses instances of the class.

Explanation:

got it right on edgen

When you ____ a file, the file is transferred to the new location and no longer exists in its original location

Answers

When you "move" a file, the file is transferred to the new location and no longer exists in its original location.  Moving a file is a file management operation that involves physically relocating the file from one folder, directory, or location to another.


1. Select the file you want to move.
2. Cut or drag the file from its current location.
3. Navigate to the new location where you want the file to be.
4. Paste or drop the file in the new location.
After completing these steps, the file will no longer exist in its original location and will be successfully transferred to the new location. This action updates the file's metadata and file path information to reflect the new location, and the file is no longer accessible in its original location. Moving a file is different from copying a file, where a duplicate of the file is created at the destination while the original file remains in its original location. Moving a file is a common operation used to organize files, rearrange file hierarchy, or transfer files to different storage locations, and it results in the file being permanently relocated to the new destination.

To learn more about duplicate; https://brainly.com/question/30440189

#SPJ11

what is a combination of vegetablis fruits and other ingrediens accompanied with a dressing?

Answers

A salad is a combination of vegetables, fruits, and other ingredients that is often accompanied by a dressing. Salads come in a variety of types, including green salads, pasta salads, potato salads, and fruit salads.

Green salads are composed of leafy greens such as lettuce, spinach, and arugula, as well as other vegetables like tomatoes, cucumbers, and peppers. Pasta salads are made with cooked pasta and a variety of vegetables, meats, and cheeses. Potato salad is a type of salad that is made with boiled potatoes, vegetables like celery and onions, and a dressing made of mayonnaise or a vinaigrette.

Fruit salads are typically made with a variety of fresh fruits, such as strawberries, kiwi, and pineapple, as well as other ingredients like yogurt or honey. A dressing is a liquid mixture of ingredients that is used to flavor salads. Dressings are typically made with oil, vinegar, and other seasonings such as salt, pepper, and herbs. Some popular dressings include vinaigrette, ranch, Caesar, and blue cheese.

To know more about  vegetables visit :

brainly.com/question/1981135

#SPJ11

Kareem wants to include line drawings of abstract shapes on his personal website. What should he use to acquire the graphics

Answers

To acquire the graphics, Kareem should use: A drawing Software.

What is a Drawing Software?

Drawing software is simply a computer program that allows users to sketch diagrams online. Graphic designers can use this software to create artworks that can be attached to websites or any other online platform.

So, for Kareem to include the line drawings on his personal website, he should use drawing software.

Learn more about the drawing software here:

https://brainly.com/question/25236672

What is the process of locating a IP address for a personal device or a domain?

Answers

Answer:

you go to device settings and theres a thing that says what my ip adress or find a ip adress tracker put in your pc info and find out be carefull tho

Explanation:

How do I do this in Access? Please list all steps in detail.
Create a new relationship between the EmployeeID field in the Professor table and the Advisor field in the Student table. Ensure that values in the Advisor field have a corresponding value in the EmployeeID field.

Answers

Steps in detail to do in Access here:

Open Micr0soft Access and open the database that contains the Professor and Student tables.In the Navigation Pane, right-click on the Student table and select "Design View" from the context menu.In the Design View, click on the Advisor field to select it.Go to the "Database Tools" tab in the Ribbon and click on the "Relationships" button.In the Relationships window, click on the "New" button.In the "Table/Query" field, select the Professor table. In the "Related Field" field, select the EmployeeID field.In the "Table/Query" field, select the Student table. In the "Related Field" field, select the Advisor field.Click on the "Enforce Referential Integrity" checkbox. This will ensure that any values in the Advisor field must have a corresponding value in the EmployeeID field.Click on the "Create" button to create the relationship.Click on the "Close" button to close the Relationships window.Save the changes to the Student table by clicking on the "Save" button in the Design View.Close the Design View of the Student table.

You have now successfully created a new relationship between the EmployeeID field in the Professor table and the Advisor field in the Student table and ensured that values in the Advisor field have a corresponding value in the EmployeeID field.

ACCESS FOR VALUE RELATIONSHIP

In Access, you can set up connections between tables in one of three ways.

This is a one-to-many connection. An order tracking database might include two tables: one for Customers and another for Orders.A connection between multiple parties. The Products table's connection to the Orders table is up next.Individual interaction.

Learn more about Access Relationship here:

https://brainly.com/question/20038736

#SPJ4

What happens if a sequence is out of order?

Answers

Answer:

If you are trying to put the events in order and they are out of order you will probaly get the question wrong so make sure the events are in order.

Explanation:

Answer: a, The program may not work correctly.

Explanation: Because I do coding, and learned this already.

Digital Subscriber Line (DSL) is the only Internet connection option available for a small office in the middle of nowhere. Which type will provide speeds above 1.544 megabits per second?

Answers

What's up!!! :D A Tech-Savvy here:

Answer:

Symmetric Digital Subscriber Line (SDSL)

Cheers,

Feel free to ask me anything regarding ICT/Tech.

A type of digital subscriber line (DSL) that will provide speeds above 1.544 megabits per second (Mbps) is: High Bit-rate Digital Subscriber Line (HDSL).

A digital subscriber line (DSL) can be defined as a technology which is typically used for the transmission of high-bandwidth digital data over a telephone line that is connected to a modem directly.

In Computer networking, a digital subscriber line (DSL) is mainly used for the following:

Sharing of digital filesVideoconferencingThe transmission of multimedia data and graphics.

Furthermore, there are different types of digital subscriber line (DSL) technologies and these include:

Digital Subscriber Line Access Multiplexer (DSLAM).Asymmetric Digital Subscriber Line (ADSL).Symmetric Digital Subscriber Line (SDSL).High Bit-rate Digital Subscriber Line (HDSL).

A high bit-rate digital subscriber line (HDSL) is typically used for providing a symmetric connection with equal upstream speeds and downstream speeds, that ranges from 1.544 megabits per second (Mbps) to 2.048 megabits per second (Mbps).

In conclusion, a high bit-rate digital subscriber line (HDSL) is a type of digital subscriber line (DSL) that will provide speeds above 1.544 megabits per second (Mbps).

Read more on DSL here: https://brainly.com/question/6056885

Effective nonverbal communication can cause tension.

True or False

Answers

Explanation:

When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.

Answer:

False

Explanation:

Shira’s Shoes sold 875,000 pairs of sandals in June, which was 70% of the total number of shoes sold. How many shoes did the company sell in June? Analyze Emily’s calculations. What error did she make?

Answers

Explanation:

Emily solved for a part when she should have solved for the whole. 875,000 should be the numerator of the equivalent ratio. 70 x 12,500 is 875,000. So the answer is 100 x 12,500 which is 1,250,000.

Answer:

Emily solved for a part when she should have solved for the whole. 875,000 should be the numerator of the equivalent ratio. 70 x 12,500 is 875,000. So the answer is 100 x 12,500 which is 1,250,000.

define types of hacker ? with three to four line of each types?​

Answers

1.) benevolent hackers are hackers that use their skills to assist people in getting back stolen information, and usually put bad people in their place
2.) malevolent hackers use their skills to cause harm to others by either stealing information or leaking it, hacking into social media accounts or by infiltrating computers and implanting malware of some kind, but this isn’t normally done by hacking, you can do it just by sending an email with a sneaky link or virus in it.
Those are the two main types but there are also hackers who work for the government as cyber security protection or even to hack into targets of the government.

Three of the following values could be stored as strings. When would you NOT use a
string command?
O To store a word.
O To store a list of colors.
O To store values NOT used for calculations.
O To store decimal values.

Answers

Answer:

To store decimal values

Explanation:

If values are not to be used for calculation, that is, they are not numerical data, therefore, some of them could be stored as strings. A string may contain any sequence of characters. The characters in a string may be repeated.

From the foregoing, decimals can not be stored as strings because in computer programming, a string is normally a sequence of characters, hence the answer above.

Using variable concepts, it is found that you would not use a string command to store decimal values.

---------------------------

Strings are used in programming to work with variables that are composed by text, which can include words, colors, and any variable that is not used for calculator.For decimal values, float and double variables are used, not strings, and thus, this is the option for which a string command would not be used.

A similar problem is given at https://brainly.com/question/15583814

Other Questions
Which of the following developed at the junctions of railroad lines? the standard hydrogen peroxide volume used with permanent haircolor is The value of E for a system that performs 120 kJ of work on its surroundings and gains 50kJ of heat is ___? The osmotic pressure of a solution of 175 g of CaCl2 in 975 g of water at 27 0C is -------------------------- atm. Given that the density of the solution is 1.10 g/mL The side of a square is 5x + 2. What is the perimeter? (P=4 side) *O (10x + 4) unit(20x - 8) unit(20x + 8) unitO (10x + 8) unitSimplify: (2xy)(3xy) *6xy6xy3xy2xy Powerful Tools Inc. Income Statement For the Year Ended December 31, 2017 2017 714,286 500,000 214,286 32,143 182,143 98,810 83,333 33,333 50,000 Sales Cost of Goods Sold Gross Profit Operating Expenses Earnings Before Interest and Taxes Interest Expense Earnings Before Taxes Taxes Net Income Notes: Tax Rate 40% Ratio 5.00x Inventory Turnover Net Profit Margin Total debt ratio 7% 60.00% Gross Profit Margin 30.00% Operating Profit Margin 15.00 % Return on Total Assets 5.00% Long-Term Debt Ratio 50.00% Z-Score Model: Z-1.2X+1.4X+3.3X+0.6X+Xs Assumptions: RE-$200,000, MV of equity-$600,000 XI X2 X3 X4 X5 Altman's Z-score Economic Profit Calculations Assumptions: After-tax Cost of Capital -10% Tax Rate NOPAT Total Operating Capital After-tax Cost of Capital Dollar Cost of Capital Economic Profit Value Powerful Tools Inc. Balance Sheet As of December 31, 2017 Assets Cash Accounts Receivable Inventories Total Current Assets Gross Fixed Assets Accumulated Depreciation Net Fixed Assets Total Assets Liabilities and Owner's Equity Accounts Payable Short-term Bank Notes Total Current Liabilities Long-term Debt Total Liabilities Common Equity Total Liabilities and Owner's Equity 2017 70,000 50,000 100,000 220,000 1,000,000 220,000 780,000 1,000,000 20,000 80,000 100,000 500,000 600,000 400,000 1,000,000 In "The Raven and the First Men: The Beginnings of the Haida, which evidence best helps the reader infer that the Haida might find it acceptable behavior to play tricks on one another? Determine whether each of these proposed definitions is a valid recursive definition of a function f from the set of nonnegative integers to the set of integers. If f is well defined, find a formula for f (n) when n is a nonnegative integer and prove that your formula is valid.a) f (0) = 1, f (n) = f (n 1) for n 1b) f (0) = 1, f (1) = 0, f (2) = 2, f (n) = 2f (n 3) The times for running a 5K for a local charity event are Normally distributed, with a mean time of 28 minutes andstandard deviation of 5.4 minutes. Which time represents the fastest 4% of runners?Find the z-table here.18.55 minutes19.12 minutes0 34.92 minutes0 37.45 minutes -7 + p = 3 for p help before my dad comes home A loan that starts at a fixed rate for several years, but whose balance is collected in one lump sum when it becomes due is a:. Round to the nearest tenth What kind of error involves not doing something that should have been done? when preparing an income statement, which of the following is the proper order for income statement components?O Comprehensive income, Other comprehensive income items. O Net income Comoresive income. Other comprehensive income items O Net income other comprehensive income items. comprehensive income.O Other comprehensive income, Net income, comprehensive income. An inequality in one-variable is shown below.2x + 4 = 14Which problem situation could represent the inequality? the findings from a number of cross-cultural studies have suggested that the _____ and _____ stages of kohlbergs theory of morality may be universal. group of answer choices 3. Consider the following Python function: def dummy (n): if (n == 0): print ("Dummy") return for i in range (3): print("Dummy") dummy (n - 1) dummy (n 1) HINT: If you are having problems with this question, it is suggested that you use a global variable to track the print statements. A. (5 marks) Write a recurrence relation for the above function that indicates the number of times "Dummy" gets printed. Please include the base case as d, and the recursive case as dk. Air is expanded from 2000kPa and 500C to 100kPa and 50C. Assuming constant specific heats determine the change in the specific entropy of air. What questions do you answer when you manage a project brainly? Three tubes of CSF containing evenly distributed visible bloodare drawn from a 75-year-old disoriented patient and delivered tothe laboratory. Initial test results are as follows:WBC COUNT: 250 _L