Write a VBA Function subroutine called Tax that takes a single argument gross Income of type Currency. It should calculate the tax on any income using the following tax schedule: (1) if income is less than or equal to $15,000, there is no tax (2) if income is greater than $15,000 and less than or equal to $75,000, the tax is 15% of all income greater than $15,000 (3) if income is greater than $75,000, the tax is 15% of all income between $15,000 and $75,000 plus 20% of all income greater than $75,000 Then write a Calc Tax subroutine that asks the user for his income, gets the function subroutine to calculate the tax on this income, and reports the tax in a message box

Answers

Answer 1

An  example of formulated VBA code comprises a function called "Tax" that takes the gross income as an input and employs the given tax schedule to know the tax amount is given below.

What is the VBA Function?

A function in VBA is one that is  like that of a sub procedure, except that the former has the ability to provide an output value while the latter does not have this capability. A code fragment that can be invoked within the VBA Editor, saving one from having to repeat the same lines of code.

In order to make use of the code given, access the VBA editor within Microsoft Excel or other Office programs, generate a fresh module, and insert the code. Next, execute the "CalcTax" subroutine either by pressing F5 or by choosing Run from the menu bar.

Learn more about   VBA Function from

https://brainly.com/question/29442609

#SPJ4

Write A VBA Function Subroutine Called Tax That Takes A Single Argument Gross Income Of Type Currency.

Related Questions

the ________ method returns a copy of the string with all the alphabetic letters converted to lower case..
fill in the blank

Answers

The method that returns a copy of the string with all the alphabetic letters converted to lowercase is `lower()`.The `lower()` method returns the lowercase string from the given string by converting all the alphabetic characters to lowercase.

The method takes no parameters. It returns a copy of the string in which all alphabetic characters have been converted to lowercase.Suppose, you have a string called myString = "This Is An Example". If you want to convert all alphabetic letters to lowercase, you can use the `lower()` method to achieve that result.

You can use the following code to do this:myString = "This Is An Example"print(myString.lower()) # output: this is an exampleThe `lower()` method is a Python built-in string method. It is a useful method for data cleaning and for making sure that all strings are in the same case. When you want to compare two strings, for instance, you may want to convert both strings to lowercase or uppercase to avoid errors.

To know more about copy visit:

https://brainly.com/question/1443651

#SPJ11

Why PS5 10.2 teraflops is better than 12 teraflops on the Xbox series x?

give me the reason why?

Answers

I really don't know why, but this is a website for homework related problems, not comparing the two new consoles.

PS: I really don't know why.

What are some details about the Elk cloner computer virus??

Answers

It will get on all your disks, it will eventually infiltrate your chips as well and yes it’s a closer it’ll stick to you like glue and it will modify Ram To send it to the cloner

for locations to display in location extensions, they must be within how many miles of user?

Answers

For locations to display in location extensions, they must be within a certain distance of the user typically within a few miles.

What is the proximity requirement for displaying location extensions?

Location extensions in online advertising platforms such as Go/o/gle Ads typically require the displayed locations to be within a certain proximity of the user. While the exact distance may vary, it is generally within a few miles.

This proximity requirement ensures that the displayed locations are relevant and convenient for users who are searching for nearby businesses or services. By limiting the distance, advertisers can target users who are most likely to visit their physical locations, enhancing the effectiveness of their advertising campaigns.

Read more about location extensions

brainly.com/question/13102217

#SPJ4

A series of drawn pictures (like a comic) of key visual shots of planned production for video is a/an
A encoding
B.call sheet
C.shot list
D. storyboard o IN​

Answers

Answer:

The correct answer is D) Storyboard

Explanation:

A storyboard is used during the initial planning stage of filmmaking. You draw pictures to demonstrate the general idea of what shots you want to get before actually going out and filming on a set/studio.

Which step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs? maintain access gain access reconnaissance enumeration

Answers

The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

What is maintaining access in penetration testing?

Maintaining Access” is a stage of the  penetration testing life cycle and it is said to have a real purpose.

It is one that tends to allow the pentester to stay in the set systems until he get the information he need that is  valuable and then manages to take it successfully from the system.

Hence, The step in the penetration testing life cycle is accomplished using rootkits or trojan horse programs is option a: maintain access.

Learn more about penetration testing  from

https://brainly.com/question/26555003

#SPJ1

What does the following code result in
bold


A.bold
B.bold
C.Bold ( in bold )
D. BOLD

Answers

Answer:

c

Explanation:

software engineering is a field that encompasses designing, writing, testing, debugging, documenting, modifying, and maintaining computer programs. group of answer choices true false

Answers

The given statement "Software engineering is a field that encompasses designing, writing, testing, debugging, documenting, modifying, and maintaining computer programs." is True because Software engineering is the field that involves designing, developing, and maintaining software applications using a systematic and disciplined approach.

It entails the usage of principles, techniques, and methods to create, design, test, and maintain software programs, as well as their documentation, while keeping them within the constraints of time and cost. It is a scientific approach to software development that enables the building of complex systems in a faster and more efficient manner. Software engineering, which abides by a set of engineering principles and best practices, is the process of creating, testing, and deploying computer programs to address real-world issues.

Learn more about Software engineering: https://brainly.com/question/28488509

#SPJ11

multiclass damage detection in concrete structures using a transfer learning‐based generative adversarial networks

Answers

Multiclass damage detection in concrete structures can be achieved through transfer learning‐based generative adversarial networks (GANs). This method uses pre-trained models on large datasets to improve the detection accuracy of concrete damages.

Transfer learning‐based generative adversarial networks have shown promise in multiclass damage detection in concrete structures. GANs can be trained on large datasets of images to identify and classify various types of damage in concrete structures such as cracks, spalls, and delamination. This method can improve the accuracy of damage detection and reduce the need for manual inspection, leading to more efficient and cost-effective maintenance and repair of concrete structures. Furthermore, this technique can be applied to other fields such as medical imaging and natural disaster response.

Know more about generative adversarial networks here:

https://brainly.com/question/32465700

#SPJ11

Which type of vlan is used to designate which traffic is untagged when crossing a trunk port?.

Answers

The type of VLAN called "native" is used to specify which traffic is untagged when it passes through a trunk port.

The VLAN that does not get a VLAN tag in the IEEE 802.1Q frame header is referred to as a native VLAN. When possible, it is advised by Cisco best practices to use an unoccupied VLAN as the native VLAN.

A logical overlay network called a virtual LAN (VLAN) is used to separate the traffic for each group of devices that share a physical LAN. A LAN is a collection of computers or other devices that are connected to the same physical network and are located in the same location, such as the same campus or building.

Learn more about VLAN https://brainly.com/question/14530025
#SPJ4

Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner?
The corrective action(s) that you need to perform on a computer in case it functions in an unexpected manner is called______?

Answers

Answer:

Reconected to your computor

Explanation:

explain about cyber terrorism​

Answers

Explanation:

cyber terrorism is type of hacking group with give the country that are to illegal group

write a java program that will compute the number of page faults produced by a reference string using the opt, fifo, lru and clock replacement algorithms. the first command line argument will be the name of the file with the reference string and the second command line argument will be the number of page frames. your program should output to the console a chart showing each replacement strategy along with the number of page faults produced by the reference string. note: the first value in the input file will be the length of the reference string. design note: you need to have at least one class that encapsulates your page frames

Answers

Java program that computes the number of page faults using the OPT, FIFO, LRU and Clock replacement algorithms based on the provided reference string and the number of page frames.

import java.io.BufferedReader;

import java.io.FileReader;

import java.io.IOException;

import java.util.*;

class PageFrames {

   private int[] frames;

   private int currentIndex;

   public PageFrames(int numFrames) {

       frames = new int[numFrames];

       Arrays.fill(frames, -1);

       currentIndex = 0;

   }

   public boolean contains(int page) {

       for (int frame : frames) {

           if (frame == page) {

               return true;

           }

       }

       return false;

   }

   public void replace(int page) {

       frames[currentIndex] = page;

       currentIndex = (currentIndex + 1) % frames.length;

   }

   public void displayFrames() {

       for (int frame : frames) {

           System.out.print(frame + " ");

       }

       System.out.println();

   }

}

public class PageFaultCounter {

   public static void main(String[] args) {

       if (args.length < 2) {

           System.out.println("Usage: java PageFaultCounter <filename> <numFrames>");

           return;

       }

       String filename = args[0];

       int numFrames = Integer.parseInt(args[1]);

       int[] referenceString = readReferenceString(filename);

       System.out.println("Reference String: " + Arrays.toString(referenceString));

       System.out.println("Number of Frames: " + numFrames);

       System.out.println();

       PageFrames fifoFrames = new PageFrames(numFrames);

       PageFrames lruFrames = new PageFrames(numFrames);

       PageFrames clockFrames = new PageFrames(numFrames);

       int optPageFaults = countOptPageFaults(referenceString, numFrames);

       int fifoPageFaults = countFifoPageFaults(referenceString, fifoFrames);

       int lruPageFaults = countLruPageFaults(referenceString, lruFrames);

       int clockPageFaults = countClockPageFaults(referenceString, clockFrames);

       System.out.println("Replacement Strategy\tPage Faults");

       System.out.println("------------------------------------");

       System.out.println("OPT\t\t\t\t" + optPageFaults);

       System.out.println("FIFO\t\t\t" + fifoPageFaults);

       System.out.println("LRU\t\t\t\t" + lruPageFaults);

       System.out.println("Clock\t\t\t" + clockPageFaults);

   }

   private static int[] readReferenceString(String filename) {

       try (BufferedReader reader = new BufferedReader(new FileReader(filename))) {

           String line = reader.readLine();

           int length = Integer.parseInt(line);

           int[] referenceString = new int[length];

           line = reader.readLine();

           String[] tokens = line.split(" ");

           for (int i = 0; i < length; i++) {

               referenceString[i] = Integer.parseInt(tokens[i]);

           }

           return referenceString;

       } catch (IOException e) {

           System.out.println("Error reading reference string file: " + e.getMessage());

       }

       return new int[0];

   }

   private static int countOptPageFaults(int[] referenceString, int numFrames) {

       Set<Integer> frames = new HashSet<>();

       int pageFaults = 0;

       for (int i = 0; i < referenceString.length; i++) {

           int page = referenceString[i];

           if (!frames.contains(page)) {

               if (frames.size() < numFrames) {

                   frames.add(page);

               } else {

                   int farthestIndex = findFar

For similar questions on Java program

https://brainly.com/question/26789430

#SPJ11

employees have the ability to download certain applications onto their workstations to complete work functions. the cio enacted a policy to ensure that no modifications to the application have occurred. what method of validation did the cio implem

Answers

Code signing is the method of validation the CIO implement.

In order to verify the program author and ensure that the code hasn't been changed or damaged since it was signed, executables and scripts must be digitally signed. This procedure is known as code signing. The procedure uses a cryptographic hash to verify the validity and integrity of the data. Code signing can offer a number of beneficial advantages. Code signing is most frequently used to secure deployments; in some programming languages, it may also be used to lessen namespace conflicts. Almost all code signing implementations include some kind of digital signature method that may be used to confirm the author's or build system's identity as well as the object's integrity. It may also be used to hold additional meta data about an item or to offer versioning information about an object.

Learn more about the Web security with the help of the given link:

https://brainly.com/question/7098928

#SPJ4

List five parts of a system and describe them

Answers

Gregersen, Erik. "5 Components of Information Systems". Encyclopedia Britannica, Invalid Date, https://www.britannica.com/list/5-components-of-information-systems. Accessed 21 August 2022.

12 / 4 * 3 div 2 tin học

Answers

Answer:

9/2 is the answers for the question

Explanation:

please mark me as brainlest

1. The primary purpose of the human resource department in any company is to (1 point) A.) promote policies in the best interest of both employees and the organization. B.) teach line managers how to sell products. C.) coordinate strikes to ensure that employees get what they deserve. D.) manage the maintenance of company-owned facilities.

Answers

Answer:

A.) promote policies in the best interest of both employees and the organization

Explanation:

The primary purpose of Human Resource Department in any organization is to promote policies in the best interest of both employees and the organization. They are like the heart of the company because they also deals with the staffing, compensation, retention, training, and employment of law and policies side of the business. The human resource department apart from writing of policies and procedures for hiring staffs also have plans in place to ensure that the right people that fits the job description and experience needed for a role are hired and trained for the job.

What Is An IDS In Cybersecurity

Answers

a network security originally built for detecting vulnerability exploits against a target application or computer

Give three examples of the following types of data?
Give three examples for each category in the software domain ?

CCDI :)??

Give three examples of the following types of data?Give three examples for each category in the software
Give three examples of the following types of data?Give three examples for each category in the software

Answers

An example of transactional data are:

Sales ordersPurchase ordersShipping documents

Its software domain are: Personal  meeting, a telephone call, and a Video call

An example of  financial data are: assets, liabilities, and equity. The software are: CORE Banking, Retail Banking, and Private banking

An example of intellectual property data are: books, music, inventions. The software domain are Patents, trademarks, and copyrights

What types of software are used in the financial industry?

Through sales and marketing tools, data-driven contact management, and workflow automation, customer relationship management (CRM) software assists financial services organizations in fostering new relationships and maximizing the value of existing customers.

You can see how your consumers are utilizing your website to complete a transaction by using transaction management software. It may demonstrate both how each website element functions on its own and as a part of the overall technological infrastructure.

Note that Information that is gathered from transactions is referred to as transactional data. It keeps track of the date and location of the transaction, the time it took place, the price ranges of the goods purchased, the mode of payment used, any discounts applied, and other quantities and characteristics related to the transaction.

Learn more about transactional data  from

https://brainly.com/question/28081430
#SPJ1

when asking a question how do u add a photo for others to also see​

Answers

Click on the bottom button

Answer:

click on the thing that looks like a paper clip and select a file (microsoft computers)

Explanation:

Not a graded question but how do I fix this error on Strongmind?


It keeps popping up on workbooks and checkpoints specifically, if anyone could help me with this that would be amazing, as I cannot continue my lessons until I fix it. I tried restarting my computer, clearing my cache, and switching to a different browser. I also e-mailed my teachers but it's pretty late and I'm not sure they'll respond.

Not a graded question but how do I fix this error on Strongmind?It keeps popping up on workbooks and

Answers

Explanation:

delet the browser and open again

Write a program that inserts 25 random integers from 0 to 100 in order into a LinkedList object.The program must:• sort the elements,• then calculate the sum of the elements, and• calculate the floating-point average of the elements.Utilizing Java htp 10 late objects approach

Answers

Answer:

Written in Java

import java.util.Collections;

import java.util.Random;

import java.util.LinkedList;

class Main {

 public static void main(String[] args) {

   LinkedList<Integer> myList = new LinkedList<Integer>();

   Random rand = new Random();

   int randnum;

   int sum = 0;

   for(int i = 0;i<25;i++)     {

       randnum = rand.nextInt(101);

       myList.add(new Integer(randnum));    

       sum+=randnum;

   }

   Collections.sort(myList);

   System.out.println(myList);

   System.out.println("Average: "+(float)sum/25);

 }

}

Explanation:

import java.util.Collections;

import java.util.Random;

import java.util.LinkedList;

class Main {

 public static void main(String[] args) {

This declares a linkedlist as integer

   LinkedList<Integer> myList = new LinkedList<Integer>();

This declares random variable rand

   Random rand = new Random();

This declares randnum as integer

   int randnum;

This declares and initializes sum to 0

   int sum = 0;

The following iteration generates random numbers, inserts them into the linkedlist and also calculates the sum of the generated numbers

   for(int i = 0;i<25;i++)    {

       randnum = rand.nextInt(101);

       myList.add(new Integer(randnum));    

       sum+=randnum;

   }

This sorts the list

   Collections.sort(myList);

This prints the list

   System.out.println(myList);

This calculates and prints a floating-point average

   System.out.println("Average: "+(float)sum/25);

 }

}

The program that inserts 25 random integers from 0 to 100 in order into a LinkedList and sort the elements, and then calculate the sum of the elements, and calculate the floating-point average of the elements is represented below:

import random

linkedList = []

for i in range(0, 25):

   random_number = random.randint(0, 100)

   linkedList.append(random_number)

sort = sorted(linkedList)

add = sum(sort)

average = add / len(sort)

print(sort)

print(add)

print(average)

The code is written in python.

An empty variable linkedList is declared and an empty list is stored in it.

we loop through a value from range 0 to 25.

Then get a random of 0 to 100.

The random 25 numbers are appended to the empty list linkedList.

The linkedList are then sorted and stored in a variable sort.

The sorted numbers are summed and stored in the variable add.

The floated  average of the number is calculated and stored in the variable average.

The sorted numbers, sum and floated average are printed out.

The bolded value of the code are python keywords.

read more: https://brainly.com/question/18684565?referrer=searchResults

Write a program that inserts 25 random integers from 0 to 100 in order into a LinkedList object.The program

When your grounded and the only thing you can get on is a computer........................oh wellllllllllllllllllllllllllllllllllllllll

Answers

Answer:

I feel your pain

i mean u could log into ur snap and ig but i mean sure why not???

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? a. She has a home network with smart home devices. b. She dialed into her home modem through the app and sent a command through the router. c. She has installed switches that interact with the installed app on her phone. d. She uses a hub at her home that she connects to through the app.

Answers

A. She has a home network with smart home devices

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. Friend is able to do this by  doing home network with smart home devices. The correct option is a.

What are smart devices?

The devices which are operated using the analog signals which carry information.

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone.

Friend is able to do this by doing home network with smart home devices.

Thus, the correct option is a.

Learn more about smart devices.

https://brainly.com/question/17509298

#SPJ2

If you could represent yourself with a single object, what would that object be and why?

Answers

Answer:

If I could represent myself with a single object, it would be my human hoodie. The reason I would do that is to show and tell everyone that I am human, no matter my sexuality, race, or ethnicity. I love who I want, I can be whoever I want and I don't want nor need anyone else's opinion or saying in what I do. I am my own person, I don't need anyone else's help with being myself. I can do a fine job of it by myself.

Explanation:

What does FLUX do when soldering an electrical joint?

Answers

Answer:

Flux is an acidic blend that makes a difference evacuate oxides from the range of the joint and so makes a difference the patch stream effectively over the joint and frame a great bond. The flux can be seen as a brown fluid as a patch is warmed, and it in some cases gives off a impactful smoke that can act as a aggravation.

Explanation:

flux prevents oxidation of the base and filler materials. while soldering the metals, flux is used as threefold purpose, as it removes the oxidised metal from this surface to be soldered.

samuel wanted to paste the value and the formula attached from cell B6 to cell F16

Answers

Answer:

See Explanation

Explanation:

Given

Source: B6

Location: F16

I'll list two methods which Samuel can use to achieve his goal

Take for instance, the formula in cell B6 is =SUM(B1:B5)

This style of referencing is called relative cell referencing

If Samuel copies and the pastes the formula like this =SUM(B1:B5), the cell name will be changed in the destination cell; meaning that he wont be able to retain the formula and value.

Method 1: Using Absolute Cell Reference

Sam will have to alter the formula in cell B6 to =SUM($B$1:$B$5)

With this, he has switched from relative reference to absolute reference;

Irrespective of the location Sam wants to paste the formula (as long as the formula is in the same work book), the formula and the value won't change.

So, the formula will still maintain its original text and value, when pasted in cell F16

Method 2: Move The Formula

Alternatively, Sam can move the formula from cell B6 to cell F16.

This can be achieved by

1. Select cell B6

2. Click on Cut on the home tab (or press Ctrl + X)

3. Select cell F16

4. Click on Paste on the home tab (or press Ctrl + V)

Answer:

B

C

E

Edgenuity

----------------------------
Please summarize into 1.5 pages only
----------------------------
Virtualization
Type 2 Hypervisors
"Hosted" Approach
A hypervisor is software that creates and runs VM ins

Answers

Virtualization: It is a strategy of creating several instances of operating systems or applications that execute on a single computer or server. Virtualization employs software to reproduce physical hardware and create virtual versions of computers, servers, storage, and network devices. As a result, these virtual resources can operate independently or concurrently.

Type 2 Hypervisors: Type 2 hypervisors are hosted hypervisors that are installed on top of a pre-existing host operating system. Because of their operation, Type 2 hypervisors are often referred to as "hosted" hypervisors. Type 2 hypervisors offer a simple method of getting started with virtualization. However, Type 2 hypervisors have some limitations, like the fact that they are entirely reliant on the host operating system's performance.

"Hosted" Approach: The hosted approach entails installing a hypervisor on top of a host operating system. This hypervisor uses hardware emulation to create a completely functional computer environment on which several operating systems and applications can run concurrently. In general, the hosted approach is used for client-side virtualization. This method is easy to use and is especially useful for the creation of virtual desktops or the ability to run many operating systems on a single computer.

A hypervisor is software that creates and runs VM instances: A hypervisor, also known as a virtual machine manager, is software that creates and manages virtual machines (VMs). The hypervisor allows several VMs to execute on a single physical computer, which means that the computer's hardware can be utilized more efficiently. The hypervisor's role is to manage VM access to physical resources such as CPU, memory, and I/O devices, as well as to provide VM isolation.

Know more about virtualization, here:

https://brainly.com/question/31257788

#SPJ11

WILL MARK A BRAINLIEST!!! PLS HELP!!!




Never gonna give you up
Never gonna let you down
Never gonna run around and desert you
Never gonna make you cry
Never gonna say goodbye
Never gonna tell a lie and hurt you

WILL MARK A BRAINLIEST!!! PLS HELP!!! Never gonna give you upNever gonna let you downNever gonna run

Answers

Answer:

We've known each other for so long

Your heart's been aching but you're too shy to say it

Inside we both know what's been going on

We know the game and we're gonna play it

And if you ask me how I'm feeling

Don't tell me you're too blind to see

Question 6 (2 points)
Which of the following is an example of technology?
O A DVD player
O A new medical treatment.
O The skills needed to purify water.
O All of the above.

Answers

Answer:

It is all of the above

Explanation:

Technology is seen everywhere like in DVD player , a new medical treatment and skills needed to purify water

Other Questions
Jose ran 3/4 of a mile every day for 8 days. How many miles did he run altogether? breast development in girls and facial hair growth in boys are both examples of which pubertal development? Which excerpt from Beowulf best supports the answer to Part A? Use the vectors in the figure at the right to graph the following Help ASAP thank you A calorimeter contains 500 g of water at 25C. You place a hand warmer containing 200 g of liquid sodium acetate inside the calorimeter. When the sodium acetate finishes crystallizing, the temperature of the water inside the calorimeter is 39.4C. The specific heat of water is 4.18 J/g-C. What is the enthalpy of fusion (Hf) of the sodium acetate? (Show your work.) Where necessary, use q = mHf. Make it frenchI like foodI am 28I love my familyI eat salad I need helpI am not perfect you bought 1,000 shares of oracle stock last year for $200, you recieved a $10 per share dividend during the year and current proce of the stock is $220. What is the capital gains yield on your investment? The table gives some values of x and their corresponding values of y for the graphs of lines and k in the xy -plane. The system of equations consisting of the equations for lines and k has solution (x,y) . What is the ordered pair that is the solution of this system? What nutrient is found in flour that helps with the structure of bread dough A) Calcium B) FatC) Protein What is the adequate intake for total water intake per day for adult women? what evidence most convincingly suggests that there is a supermassive black hole at the center of our own milky way? Why were the Inca conquered so easily by the Spanish? 11. Which pair of angles is always congruent?A two complementary anglesB two supplementary anglesC two vertical anglesD two acute angles you decide to halve the time you spend in the shower each day and to turn off the water while you're brushing your teeth and washing your face at the sink. Evaluate the effect that these actions might have on two different aspects of the water cycle if every person in your neighborhood also performed them Which of the following sets of quantum numbers represents the last electron added to an arsenic atom (As)? n=4, l=2,m=0n=3, l=2, m=0n=3, l=1, m=0n=4, l=1, m=2n=4, l=1, m=0 the kw for water at 0 c is 0.12 1014. calculate the ph of a neutral aqueous solution at 0 c. Phillip wants to estimate how many words are in a book he is reading for class. He counts the words on 21 pages, and he finds the mean word count is 311 words per page. There are 196 pages in the book. Which is the best estimate for the total number of words in the book? What phenomenon, seen in Italy in the fourteenth century, was attributed to a tarantula bite, causing people to jump around, dance wildly, tear at their clothes, and beat each other with whips Find X Y and Z for brainliest