write an algorithm to print name and address of a person​

Answers

Answer 1
Pseudocode:

1 Prompt the user to enter name
2 Store name in a nameVariable
3 Prompt the user to enter address
4 Store address in an addressVariable
5 Print the variable nameVariable
6 Print the variable addressVariable

Related Questions

write a short essay based on any movie

Answers

OK! Give me 20 minutes.

Essay:

Essay about Frozen.

                                                                                         10/10/2022

Frozen is a film about two sisters, Anna and Elsa. Elsa was born with magical powers and Anna would always play with her. Until one day, Elsa accidentally hit her sister and they had to go to the magical trolls to help save Anna.

Elsa and Anna’s parents pass away while on a ship, after they pass, Elsa locks herself in her room and gives the cold shoulder to Anna. Finally, after many years, Elsa comes out of her room for her coronation. However, things go wrong with the two sisters, and it results in the kingdom being trapped in an icy winter because of Elsa’s anger, and magical powers.  

After Elsa runs out in embarrassment and fear, Anna chases after her sister hoping to talk to her and get her to calm down. Elsa denies and runs away into the mountains and with her icy powers, she makes it her new home.

 While Anna goes to look for her sister, she passes the kingdom onto her “lover” which was a huge mistake. On Anna’s journey to find her sister, she meets her old friend Olaf, a stubborn man who turns out to be her real lover, and the man’s reindeer. They all helped Anna get to Elsa, but Anna got hit again by Elsa and they were all shown out by Elsa's icy monster.

The people from the kingdom end up finding Elsa and start wrecking her tower to capture Elsa to bring her back to the kingdom. Meanwhile, Anna starts to freeze, and Kristoff brings her back to the kingdom where her "true love" can help her. Although, her "true love" leaves her in the room to die, and Kristoff realizes he loves her and goes back for her.

Anna turns frozen after a battle between Elsa and Anna's "lover" and then that is when the whole kingdom stops freezing and goes back to normal.

That definitely wasn't a short essay so just delete the parts you don't think are important and just add whatever you want.


What is the output of the sum of 1001011 and 100011 displayed in hexadecimal?

Answers

Answer:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(6E_{hex}\)

Explanation:

Required

\(1001011_2 + 100011_2 = []_{16}\)

First, carry out the addition in binary

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(1101110_2\)

The step is as follows (start adding from right to left):

\(1 + 1 = 10\) --- Write 0 carry 1

\(1 + 1 + 1(carry) = 11\) ---- Write 1 carry 1

\(0 + 0 + 1(carry) = 1\) ---- Write 1

\(1 + 0 = 1\) --- Write 1

\(0 + 0 = 0\) ---- Write 0

\(0 + 0 = 0\) ---- Write 0

\(1 + 1 = 10\) --- Write 0 carry 1

No other number to add ; So, write 1 (the last carry)

So, we have:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(1101110_2\)

Next, convert \(1101110_2\) to base 10 using product rule

\(1101110_2 = 1 * 2^6 +1 * 2^5 + 0 * 2^4 + 1 * 2^3 + 1 * 2^2 + 1 * 2^1 + 0 * 2^0\)

\(1101110_2 = 64 +32 + 0 + 8 + 4 + 2 + 0\)

\(1101110_2 = 110_{10}\)

Lastly, convert \(110_{10}\) to hexadecimal using division and remainder rule

\(110/16 \to 6\ R\ 14\)

\(6/16 \to 0\ R\ 6\)

Write the remainder from bottom to top;

\(110_{10} = 6(14)_{hex}\)

In hexadecimal

\(14 \to E\)

So, we have:

\(110_{10} = 6E_{hex}\)

Hence:

\(1001011_2\)    \(+\)   \(100011_2\)   \(=\)    \(6E_{hex}\)

we said that the pattern of 1s and 0s used to represent an instruction in a computer has no intrinsic meaning. why is this so and what is the implication of this statement?

Answers

Pattern of 1s and 0s that computers use to represent instructions has no real meaning states: Computer "knows" nothing but just fetches and executes machine instructions from memory. There is no concept of letters but is a string of binary digits (bits).

What is binary number in computer?Binary is one of four number systems. In computer applications where binary numbers are represented by only two symbols or digits: 0 (zero) and 1 (one). Binary numbers are represented in a base-2 number system. A binary number (bit) is the smallest unit of binary information stored in a computer system. Bits can have only two states, on or off, and are commonly represented by 1 and 0. The combination of 1's and 0's determines the information that enters the computer and is processed.

To learn more about Binary system visit:

https://brainly.com/question/30168159

#SPJ4

Edhesive test 3 does anyone know the answer

Edhesive test 3 does anyone know the answer

Answers

Answer:

I think it is B. To make a follow-up True/False decision

Explanation:

The keyword, elif can be used like this.

>>> x = "Hello World"

>>> if x == "Hello World": # Returns False since x is equal to Hello world

>>> print("x is True")

>>> elif x is False: # Returns False since x is not False

>>> print("x is False")

>>> else: # Returns False since x is equal to "Hello World"

>>> print("x is True and has uknown value")

Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please ​

Answers

A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.

What is sub and end sub in VBA?

A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.

Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.

Thus, A sub does something but doesn't give something back.

For more information about sub and end sub in VBA, click here:

https://brainly.com/question/26960891

#SPJ1

If your routing prefix is 16 bits, how long is your subnet ID? 1. 16 bits 2. 32 bits 3.48 bits 4.not possible to calculate

Answers

If your routing prefix is 16 bits, then your subnet ID would be 16 bits as well.

So, the correct answer is option 1.

This means that you would have 16 bits available for addressing your subnets within your network. The remaining 16 bits would be used for addressing hosts within each subnet. It's important to properly allocate and manage your subnet IDs in order to effectively route traffic and prevent network conflicts.

So, to summarize, a 16-bit routing prefix would allow for a 16-bit subnet ID and a total of 65,536 subnets within your network.

Hence, the answer of the question is Option 1.

Learn more about Subnet at https://brainly.com/question/30266412

#SPJ11

Different algorithms can be made to complete the same task in different ways.
options:
True
False

Answers

Answer:

True hope this helps you and everyone!

Answer:

as long as it's the same problem

While Angela is making modifications to Katie’s Word document, she would like to inform Katie of the reasoning for the change.

Which feature should Angela use?

Track Changes
email
Comments
Save File

Answers

Answer:

i think it's comments

Not too sure

While Angela is making modifications to Katie’s Word document, the feature that Katie should use is comments. The correct option is c.

What is a Word document?

Microsoft Office is thought of as including Microsoft Word. Word, PowerPoint, Excel, Outlook, and a number of other programs are included in the Office suite of Microsoft tools.

These may be used on Windows or macOS and are suitable for both personal and professional use. They are not the same thing; Microsoft Word is merely one of such app.

A comment is a section or tool that can be used by the editor of the Word document. Comments can be added to correct the document and to give information that can be specified, and comments can be removed.

Therefore, the correct option is c. Comments.

To learn more about Word documents, refer to the below link:

https://brainly.com/question/26695071

#SPJ5

___________ is the rate for a riskless security that is exposed to changes in inflation.

Answers

The real risk-free rate of return is the rate of return on a riskless security that adjusts for changes in the rate of inflation.

The real risk-free rate of return is an important concept in finance that measures the rate of return on a riskless security that adjusts for changes in the rate of inflation. This rate is often used as the discount rate in capital budgeting decisions, and it is typically higher than the nominal risk-free rate of return because of the impact of inflation. In many cases, the real risk-free rate of return is the Treasury Inflation-Protected Securities (TIPS) rate, which is a Treasury security designed to protect investors from inflation. The real risk-free rate of return is also used as a benchmark for comparing the expected return of other investments and is often used to calculate the cost of capital for a business. In general, the higher the real risk-free rate of return, the more expensive it is to borrow money and the more difficult it is to make a profit.

Learn more about security here:

https://brainly.com/question/29793058

#SPJ4

identify the oracle database objects used by attackers for enumeration . mysql.user, mysql.db, mysql.tables_priv sysobjects, syscolumns, sysdatabases MsysObjects, MsysQueries, MsysRelationships SYS.USER_OBJECTS, SYS.USER_VIEWS, SYS.ALL_TABLES Question 21 10 5 noint Which of the following types of honeypot emulates the real production network of a target organization and causes attackers to devote their time and resources toward attacking the critical production system of the company? Malware honeypots Honeynet Pure honeypots Spider honeypots

Answers

The type of honeypot that emulates the real production network of a target organization and causes attackers to devote their time and resources toward attacking the critical production system of the company is called a Honeynet.

Honeynets are designed to emulate a real network with various operating systems, services, and applications to attract attackers and study their behavior. They can be used to detect new or unknown attacks, gather intelligence on attackers, and study the techniques and tools used by attackers.

Unlike other types of honeypots, Honeynets require significant resources and expertise to set up and maintain, and should only be used in controlled environments by experienced security professionals.

Learn more about honeypot  here:

https://brainly.com/question/24182844

#SPJ11

The type of honeypot that emulates the real production network of a target organization and causes attackers to devote their time and resources toward attacking the critical production system of the company is called a honeynet.

A honeynet is a high-interaction honeypot that is designed to simulate a full network with multiple hosts and services. It allows researchers to monitor attackers' behavior on a larger scale and gain a better understanding of their motives, tactics, and tools. Unlike other types of honeypots, which are designed to attract and trap attackers, honeynets are designed to gather intelligence and enable researchers to analyze attacker behavior in a safe and controlled environment.

For such more question on honeypot

https://brainly.com/question/17004996

#SPJ11

The ________ marker is the character that marks the end of a file and is automatically written when the file is closed.

Answers

The EOF marker is the character that marks the end of a file and is automatically written when the file is closed.

Someone help me!!

select the correct answer

what are the functions of system software?

system software enables a computer's hardware to perform tasks, and functions as a platform for database. quapplication. q

presentation software. it also acts an interface between the computer's hardware and o processor devices

o software

Answers

The first (1st) one. I

Explanation:

It's the definition

Tracking your spending can help you

Answers

It can help you become more aware of what you are spending and where you are spending it. That can help you identify the areas where you need to make changes.

Why do you think Beyonce's performance of the Negro National Anthem was so impactful at
Coachella?

Answers

Answer:

it showed a movement of black rights and brought awareness to it

What are the different types of monitors?

Answers

Answer:

led monitors Lang alam ko

Designer roles and responsibilities, programmer roles and responsibilities, and artist roles and responsibilities. Cite specific details from the game that lead you to believe these game attributes required a particular type of specialist.

Answers

According to the roles and the responsibility are the based on the  type of specialist game are the emulator, level editor, scripting tool.

What is game?

The term game refers to based on the enjoyment and the learning purposes. The game are the based on the graphic sand the mind strategies based.

A game tool is a collection of specialized software tools used by game designers (programmers) to create and develop games. The game designer create the strategies of the performing the game.

As a result, the game artist is the work on the game design.

Learn moire about on game, here:

https://brainly.com/question/3863314

#SPJ1

for every row of objects in an array there are 2 columns. the total number of objects in the array is 18. how many rows and columns does the array have?

Answers

Inferred from proportions, we find that the array has 2 columns and 9 rows.

Define an array.

An object called an array is a storage space for a predetermined number of values of a single kind. An array's length is decided when it is first built. Multiple values can be stored in a variable called an array. As an illustration, you could make an array to hold 100 numbers. 100; int data;

An array type is a user-defined data type made up of a sorted collection of elements with the same data type. The ordinal position is used as the array index in an ordinary array type, which has a set upper limit on the number of elements it can contain.

Solution Explained:

Inferred from proportions are the following:

Two columns comprise the array.9 rows make up the array.

There are 2 columns for every row, hence there are 2 columns in the array.

There are a total of 18 objects, two in each column. The number of rows after applying the proportion is:

\(rows = \frac{18}{2} = 9\)

Thus, there are 2 columns and 9 rows in the array.

To learn more about an array, use the link given
https://brainly.com/question/21723680
#SPJ4

Assume the arrays numberArray1 and numberArray2 each have 100 elements.
Design an algorithm that copies the values in numberArray1 to numberArray2.

In bash or pseudocode, please.

Answers

In Bash, you could use a loop to iterate through each element of numberArray1 and copy its value to the corresponding element of numberArray2 using array indexing.

The Program

#!/bin/bash

# initialize numberArray1

numberArray1=(1 2 3 ... 99 100)

# initialize numberArray2

numberArray2=()

# copy values from numberArray1 to numberArray2

for ((i=0; i<100; i++))

do

 numberArray2[i]=${numberArray1[i]}

done

In pseudocode, the algorithm would look like this:

for i = 0 to 99

 numberArray2[i] = numberArray1[i]

end for

This code iterates through each element of numberArray1, copying its value to the corresponding element of numberArray2 using array indexing. By the end of the loop, numberArray2 will have the same values as numberArray1.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

true or false: to avoid memory leaks, all pointers to objects on the heap must be set to nullptr before they go out of scope.

Answers

To avoid memory leaks, all pointers to objects on the heap must be set to  nullptr before they go out of scope It is false.

What is nullptr ?

The literal pointer is indicated by the keyword nullptr. A prvalue of type std::nullptr t, it is. Any pointer type and any member type can be converted implicitly from nullptr to a null pointer value. Any null pointer constant, including the macro NULL and values of type std::nullptr t, can be converted in a similar manner.

The null pointer value is represented by the nullptr keyword. If an object handle, interior pointer, or native pointer type does not point to an object, you should specify this with a null pointer value. Use nullptr in native or managed code.

To know more about nullptr , visit

https://brainly.com/question/13045159

#SPJ4

blocking icmp packets may help prevent denial of service attacks. true or false

Answers

True or false: Blocking ICMP packets may help prevent denial of service attacks.

Does blocking ICMP packets aid in preventing denial of service attacks?

True. Blocking ICMP (Internet Control Message Protocol) packets can help prevent certain types of Denial of Service (DoS) attacks. ICMP is a network protocol used for diagnostic and control purposes.

However, some DoS attacks exploit vulnerabilities in ICMP to flood a network with excessive ICMP packets, overwhelming its resources and causing a denial of service. By blocking or limiting ICMP packets, network administrators can mitigate the risk of such attacks and improve the network's resilience to DoS incidents.

Learn more about prevent denial

brainly.com/question/30866798

#SPJ11

there are methods that help measure application blank information by the degree to which the information differentiates between high- and low-performing individuals. this scoring methodology is called a(n

Answers

Answer: Weighted application blank

Explanation:

why do cloud computing service arrangements often pose challenges for organizations that are transitioning to the cloud?

Answers

Organizations transitioning to cloud computing often face challenges due to various aspects of cloud service arrangements.

Cloud computing service arrangements can present several challenges for organizations during the transition phase. One of the key challenges is related to the complexity of migrating existing infrastructure and applications to the cloud. Organizations may have complex and interdependent systems that require significant planning, coordination, and potentially redesigning or refactoring to fit into the cloud environment. This process can be time-consuming and resource-intensive, requiring expertise and careful execution to ensure a smooth transition. Another challenge arises from the need to adapt to new operational and management practices. Cloud computing introduces a different set of tools, processes, and methodologies for managing infrastructure, data, and applications. Organizations may need to retrain their IT staff and develop new skills to effectively operate and optimize cloud resources. Additionally, organizations must carefully consider factors such as security, compliance, and data governance when transitioning to the cloud. Ensuring the confidentiality, integrity, and availability of data requires a thorough understanding of the cloud provider's security measures and a robust strategy for data protection and privacy.

Furthermore, organizations may encounter challenges in terms of cost management and budgeting. While cloud computing offers scalability and flexibility, it also introduces a pay-as-you-go model where organizations pay for the resources they consume. Without proper planning and monitoring, cloud costs can quickly escalate, leading to unexpected expenses. Organizations must establish cost optimization strategies, implement usage monitoring and control mechanisms, and continuously optimize their resource allocation to avoid unnecessary expenditures. In conclusion, transitioning to cloud computing brings several challenges for organizations. These challenges include migrating complex infrastructure and applications, adapting to new operational practices, addressing security and compliance concerns, and effectively managing costs. Overcoming these challenges requires careful planning, expertise, and a strategic approach to ensure a successful and efficient transition to the cloud.

Learn more about Cloud computing here-

https://brainly.com/question/31501671

#SPJ11

What is the command to list the top 10 files that use the most disk space in linux?

Answers

Type du -a /dir/ | sort -n -r | head -n 20. du will calculate the file space used. The sort will sort out the output of a du command.

Why is Linux used? Linux is an open source operating system (OS). An operating system, which is a piece of software, is directly in charge of managing the hardware and resources of a system, including the CPU, memory, and storage. By sitting between applications and hardware, the operating system (OS) creates connections between all of your software and the operational physical resources. Many of the gadgets you likely own, such as Android smartphones, tablets, and Chromebooks, as well as digital storage, cameras, wearable technology, personal video recorders, and more, all support Linux.  Your automobile has Linux running on the inside. Linux is an open-source alternative to Windows OS, which is a for-profit operating system.

To learn more about Linux, refer to:

https://brainly.com/question/25480553

#SPJ4

5 evaluation criteria

Answers

Answer:

relevance, efficiency, effectiveness, impact and sustainability. 

Gwendolyn is a digital forensics expert. She has to search for evidence by checking drivers and their installation dates. Which forensic tool would be most useful to her?

Answers

Gwendolyn, as a digital forensics expert, would find the forensic tool called "EnCase" most useful for her task. EnCase allows her to efficiently search for evidence by examining drivers and their installation dates, among other features.

EnCase is a powerful digital forensics tool that can be used to collect, preserve, and analyze digital evidence. As a digital forensics expert, Gwendolyn can use EnCase to conduct in-depth investigations and analysis of digital devices and media. EnCase can search for and extract a wide range of data including files, images, email, and internet history. It allows Gwendolyn to examine drivers and their installation dates, as well as other metadata, which can be crucial in identifying when and how files were created or modified. EnCase is a widely used and trusted tool in the digital forensics industry and can help Gwendolyn to efficiently and effectively identify and collect evidence for her investigations.

Learn more about digital forensics here;

https://brainly.com/question/29349145

#SPJ11

Drag the tiles to the correct boxes to complete the pairs.
Match the testing tools to their use.
Selenium
JMeter
load testing tool
functional testing tool
test management tool
defect-tracking tool
QTP
web browser automation tool
Quality Center
Bugzilla

Answers

Answer:

JMeter is a functional testing tool

A company is moving all of its web applications to an SSO configuration using SAML. Some employees report that when signing in to an application, they get an error message on the login screen after entering their username and password, and are denied access.


When they access another system that has been converted to the new SSO authentication model, they are able to authenticate successfully without being prompted for login.


Which of the following is MOST likely the issue?


a. The employees are using an old link that does not use the new SAML authentication.

b. The XACML for the problematic application is not in the proper format or may be using an older schema.

c. The web services methods and properties are missing the required WSDL to complete the request after displaying the login page.

d. A threat actor is implementing an MITM attack to harvest credentials.

Answers

The most likely issue in this scenario is option a. The employees are using an old link that does not use the new SAML authentication.

When employees encounter an error message on the login screen after entering their username and password, it suggests that the authentication process is failing. However, since they are able to successfully authenticate on another system using the new SSO authentication, it indicates that the SAML configuration is functioning correctly.

Therefore, the issue is likely with the specific application or link they are trying to access. They may be using an outdated link that does not support the new SAML authentication, leading to the error message and denial of access.

To learn more about SAML click here:

brainly.com/question/30463072

#SPJ11

cookies that remain on your device indefinitely are called . a. resistant b. insistent c. constant

Answers

Cookies that remain on your device indefinitely are called: D. persistent.

What is a web browser?

A web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

What are cookies?

In Computer technology, cookies can be defined as small files, which often include unique identifiers that are sent by web servers to a web browser.

In conclusion, cookies that remain on your device or web browser indefinitely are called persistent.

Read more on cookies here: https://brainly.com/question/26081942

#SPJ1

Complete Question:

Cookies that remain on your device indefinitely are called ______.

A. resistant

B. insistent

C. constant

D. persistent


PLEASE NO PLAGIARISM I CHECK FOR PLAGIARISM ON CHEGG.
1. Do you think that DNA-driven computers are truly a promise of
the future?
2. What might be some advantages and disadvantages of such
computers?

Answers

Question:
1. Do you think that DNA-driven computers are truly a promise of the future
2. What might be some advantages and disadvantages of such computer:
DNA-driven computers are a promise of the future that has the potential to revolutionize computing. These computers use DNA molecules to perform calculations, which has several advantages. But like any new technology, there are also potential disadvantages to be considered. Let's have a look at the main answer and explanation to these questions.

1. DNA-driven computers are truly a promise of the future. DNA-driven computers are currently in the early stages of development, and they show great promise for the future of computing. These computers are incredibly powerful, able to perform millions of calculations simultaneously. They can also store vast amounts of data in a very small space.

One of the most significant advantages of DNA-driven computers is their speed. Because they operate on a molecular level, they can perform calculations much faster than traditional computers. They are also incredibly energy-efficient, which makes them ideal for use in situations where power is limited.

DNA-driven computers also have the potential to solve some of the most complex problems in science and medicine. They can be used to model complex biological systems, simulate chemical reactions, and even design new drugs.

2. Advantages and disadvantages of DNA-driven computers.
:
Advantages:
- DNA-driven computers are very fast and energy-efficient
- They can store vast amounts of data in a very small space
- They have the potential to solve some of the most complex problems in science and medicine

Disadvantages:
- DNA-driven computers are currently very expensive to produce
- They require specialized equipment and expertise to operate
- They are still in the early stages of development, so their full potential is not yet known.

In conclusion, DNA-driven computers are a very promising technology that has the potential to revolutionize computing. While there are some potential disadvantages to be considered, the benefits of these computers are many. With further development, they may become a powerful tool for solving some of the most complex problems in science and medicine.

To know more about computers visit:

https://brainly.com/question/32297640

#SPJ11

hello i am here to say you are perfect just the way you are i don't fit in at all everyone is always rude to me sometimes i cant stay happy my dog that died was the best dog sometimes i just cant ignore all the mean things people say to me but i always try to be happy that's all i have to say and black lives matter

Answers

hello the answer is thank you
Other Questions
x/4 2/3 = 1/5solve for x 1-hookup refers to :sexual infidelity.prostitution.sexual interaction between people who are not friends.sexual interactions between friends.2- Recent studies have shown that increased Internet use has:decreased the number of friends emerging adults typically have.increased social isolation among emerging adults.helped emerging adults maintain more face-to-face friendships.interfered with face-to-face friendships. According to the United States Geological Service, what is the name of the longest river in the world? What effect does the diction used in the dialogue in paragraph 2 haveon the passage?OA. It sets the speaker up as an educated character.OB. It identifies the speaker as an authority figure.O C. It characterizes the speaker as being of a certain age andclass.D. It shows the relationship the speaker has with the maincharacter. What are the top 5 most important events in the book The Beast of Cretacea? 3. Graph the result of a transformation using the rule (x,y) (x-3,y-4)followed by a dilation of scale factor centered at D' in the coordinateplane below Can you opt out of a 401 K plan? If the perimeter of the parallelogram is 102 feet and the top of the parallelogram measures as 3m and the side measures as m, then what is m? (M does not stand for meters m is a variable.) Lumber is used to build a house so that what was personal property (lumber) is now real property (the house). the process is called? Frederick deposits $10,000 in a special bank account thatearns 6. 5% compounded quarterly. The amount of money. A, in the account can be determined by the formulaA = 10,000 (1 + 0. 065) 4where t is the number of years that the money is in thebank. How much money does Frederick have after 5 years Which answers are equivalent to 85 ? Choose two answer.8+8+8+8+88*58 *9*8*8*85+5+5+5+5+5+5+532768 allocated joint costs are useful for: multiple choice setting the selling price of a product. determining whether to continue producing an item. controlling user department costs. determining inventory cost for accounting purposes. discrimination against an ethnic group assumed to have a biological basis is called group of answer choices ethnicity. phenotype. race. racism. given the following information, calculate what your expected return on equity would be (before tax) if the expected unlevered (i.e., if property was purchased with all cash) return on the property was 8%. using a loan to value of 80% and a cost of debt of 4.5%, your expected return on equity would be?. ignore taxes for this question The birth rate of a population is b(t) = 2000e^.023t people peryear and the death rate is d(t) = 1450e^.017t people per year, findthe area between these two curves for 0 What did the2 bad emperors spend money on? what is the polymerase chain reaction (pcr)? view available hint(s)for part b what is the polymerase chain reaction (pcr)? a method to determine the sequence of bases in a gene. a method to amplify a fragment of dna. a method to propagate a gene in bacteria. a method to join two fragments of dna together. which expression is equivalent to 1/3(4x+9)+5x?A. 3 x + 3B. 6 1/3 + 3C. 9 x + 3D. 9 1/3 x + 9 1/3 Convert the heat of neutralization of acetic acid from -49,8 kj/mmol to calories permillimole and ROUND TO ONE DECIMAL PLACE (1 cal = 4.184 J)DO NOT INCLUDE UNITS A single sheet of copier paper is approximately 1\times 10^(-4) meters thick. An office worker stacks 10 reams of paper in a corner. Ten reams is 5\times 10^(3) pieces of paper. How tall is this stack of paper (in meters )?