Data types of constants '10', 100, 1.234 are respectively: A) char, int, float B) int*, char, float D) string, int, double C) int. char. double

Answers

Answer 1

The data types of the constants '10', 100, and 1.234 are respectively: B) int, int, and double.

In programming, data types define the kind of values that can be stored in variables or constants. Based on the given constants:

'10' is a numerical value enclosed in single quotes, which typically represents a character (char) data type.

100 is a whole number without any decimal point, which is an integer (int) data type.

1.234 is a number with a decimal point, which is a floating-point (double) data type.

Therefore, the data types of the constants '10', 100, and 1.234 are int, int, and double respectively. Option B) int, char, float in the provided choices is incorrect.

know more about data types here: brainly.com/question/30615321

#SPJ11


Related Questions

Imagine a mythical set of protocols with the following details. Maximum Link-Layer data frame: 1,008 bytes Network-Layer header size: 40 bytes Transport-Layer header size: 15 bytes What is the size, in bytes, of the MSS

Answers

Since there is 1,008 bytes Network-Layer header size: 40 bytes Transport-Layer header size: 15 bytes the size, in bytes is 953.

What is the Network-Layer  about?

Given that

Layer data frame:

1,008 bytes- Network-Layer header size: 40 bytes - Transport-Layer header size: 15 bytes  - Transport-Layer header size:

Therefore:

1,008  - 40 -  15 = 953

In the case above, one  just  need to subtract the header sizes from the data frame and thus have the answer.

Therefore, Since there is 1,008 bytes Network-Layer header size: 40 bytes Transport-Layer header size: 15 bytes the size, in bytes is 953.


Learn more about Network-Layer from

https://brainly.com/question/14657014

#SPJ1

PLEASE HELP!!!! You have been hired by the Umbrella Corporation (main office in Texas) to help them set up a facility here in Northern Virginia. The Umbrella Corporation is a government contractor, and they have a variety of contracts that include non-secret information to the most secure.

The parent company has decided to create a subsidiary company called "Triton" which will be housed in this new Northern Virginia facility. This facility will house the following departments:

• Accounting - 2 People - Upper Right Desk Area

• Human Resources - 1 Person- Upper Right Desk Area

• Marketing - 1 Person - Center Desk Area

• Sales - 3 People - Left Right Desk Area

• IT -2 People - Center Desk Area

• Receptionist - 1 Person - Upper Center

• (Note: Not all Space is used - this will leave room for additional employees. The upper left is a conference room.)




Design of the office:

• The inner office has not yet been constructed but the plan is as follows:

o Outer offices have walls that go all the way up to the ceiling.

o Center offices are cubicles.

o The office itself has 4 floors – this facility is on the 3rd floor.

 1 & 2nd floor houses another company.

 4th floor is being rented by this company as well in plans for expansion.

 The floors are concrete and the ceilings are a drop-ceilings.

Strategic Goals:

Management has also asked that your plan is aligned with the strategic goals of the company which are focused on efficiency, security, and growth. Therefore, your network solution will need to be:

• Efficient and capable of supporting streamlined communications

• Secure and require minimum maintenance

• Scalable for future growth

What the company has so far:

• Computers for Each Employee

• Two printers to be shared by all employees

• A single server that handles all the e-mail, files, programs, etc.

This company is planning on serving the Federal Government with a variety of IT - using it's small business status to make end-roads into the various agencies. Its first contract is a contract with the Department of Defense.

Deliverable:

It is with this in mind, that they have asked you to make recommendations to the board about the following:

• Name and describe what type of network (LAN, WAN, BNs, etc.) do you think they should have?

o Why?

• Give the management – two different types of architectures they might be able to use.

o Then give them your recommendation on which one you think they should use.

 Outline the pros and cons of the two alternatives.

 Explain why that one would suit them better in the long-run than the other.

o What media would you suggest the company install in its office and why?

o What kind of Telecommunications would you recommend?

o After reviewing the facility plan:

 How would you recommend potentially reduce errors?

 Speed is a high-priority for this network, what would you recommend the company look at in order to ensure speed efficiency?

The company is in its first steps of creating a design plan and would like you to prepare a power point to explain to the upper management what you believe they will need for this facility.

Answers

Shsvevdhxhxhsbbsvxushsvshxbd dbjdkxiddbdbsj

Software licensed as proprietary

is usually free of cost often has lower quality than other types.

does not permit source code changes.

is rare in today's marketplace.

can be redistributed by the user at will.​

Answers

Answer:

Does not permit source code changes.

Explanation:

Answer:

does not permit source code changes.

Explanation:

Dumas, who has excellent mechanical aptitude, owns a computer with two hard drives. One
drive is used for the operating system and the other drive is used for his personal files. He
decides to install a third disk in a RAID 1 configuration to protect the disk with his files
against data loss. He is not too concerned about data loss on the disk with the operating
system because he could easily reinstall the OS, so that disk is not included in the RAID
configuration. When he is done, he powers up his computer, no error messages are displayed,
yet he is distraught because all his data is lost. Why would this happen?
O The new drive was smaller than the original drive so the data from the original did not
fit.
O He didn't back up his data. When RAID is configured all data on participating drives is
lost.
O The RAID expansion card is not seated properly so the RAID drives are not being
detected.
Since the new drive had no data, and RAID 1 mirrors data, it erased the data on the
original.

Answers

Answer:

He didn't back up his data. When RAID is configured all data on participating drives is lost.

Explanation:

because i'm asian

He didn't back up his data. When RAID is configured all data on participating drives is lost would this happen. Hence, option B is correct.


What is operating system?

The operating system is the most important piece of software that operates on a computer. It manages the computer's memory, processes, software, and hardware. Using this technique, you can communicate with the computer even if you don't comprehend its language.

Examples of operating systems include Apple macOS, Microsoft Windows, g's Android OS, Linux, and Apple iOS.

All of the hardware and software are under the direction of the computer's operating system. It performs core tasks such handling input and output, controlling files, memory, and processes, and controlling peripheral devices like disk drives and printers.

Thus, option B is correct.

For more information about operating system, click here:

https://brainly.com/question/6689423

#SPJ2

Choose the answer.

Home networks use a _________ to connect the LAN to the Internet,
just like buisnesses do.

VPN
router
connecter
none of the above

Answers

A home network aswell business networking would use a Router to connect the lam and internet all together
Router is the answer


Which of the following statements does not explain the difference between safety stock
Inventory and the cross docking method?

Answers

The statements does not explain the difference is that Cross-docking reduces inventory and storage space requirements, but handling costs and lead times tend to increase.

What is the difference between safety stock inventory and the cross-docking method?

safety stock inventory is known to be a kind of traditional warehousing systems that needs  a distributor to have stocks of product already at hand to ship to their customers.

But  a cross-docking system is one that is based on using the new and best input such as technology and business systems to produce a JIT (just-in-time) shipping method.

Learn more about safety stock Inventory from

https://brainly.com/question/18914985

The conditional function is defined as Ch(e, f, g) = If e then f else g. Evaluate the conditional function for the following: e = 01101011, f = 10010010, g = 01010100 Ch(e, f, g) =

Answers

The conditional function allows us to choose between two values (f and g) based on the condition (e). If the condition is true, the function returns the first value (f), and if the condition is false, it returns the second value (g).

To evaluate the conditional function Ch(e, f, g), we need to substitute the values of e, f, and g into the function and apply the logical operation.

Given:

e = 01101011

f = 10010010

g = 01010100

The conditional function Ch(e, f, g) = If e then f else g.

To evaluate Ch(e, f, g), we need to check the value of e. If e is true (non-zero), then the function will return the value of f. Otherwise, if e is false (zero), the function will return the value of g.

Let's break down the evaluation step by step:

Check the value of e: e = 01101011.

Since e is non-zero, it is considered true.

Return the value of f: f = 10010010.

Therefore, Ch(e, f, g) = 10010010.

In this case, since the value of e is true (non-zero), the conditional function returns the value of f (10010010).

To learn more about conditional, visit:

https://brainly.com/question/9362514

#SPJ11

Click this link to view O*NET’s Work Context section for Glass Blowers, Molders, Benders, and Finishers. Note that common contexts are listed toward the top, and less common contexts are listed toward the bottom. According to O*NET, what are common work contexts for Glass Blowers, Molders, Benders, and Finishers? Check all that apply.



face-to-face discussions

importance of being exact or accurate

wear common protective or safety equipment

in an open vehicle or equipment

spend time keeping or regaining balance

very hot or cold temperatures

Click this link to view O*NETs Work Context section for Glass Blowers, Molders, Benders, and Finishers.

Answers

Therefore, the correct options to check are:

   Importance of Being Exact or Accurate    Wear Common Protective or Safety Equipment    Face-to-Face Discussions

What is the  O*NET’s Work Context?

O*NET is a database that provides information on different occupations, including their work context. Work context refers to the physical, social, and environmental conditions under which a job is performed.

According to the Work Context section for Glass Blowers, Molders, Benders, and Finishers on O*NET, the most common work contexts for this occupation are Importance of Being Exact or Accurate, Wear Common Protective or Safety Equipment, and Face-to-Face Discussions.

Based on O*NET's Work Context section for Glass Blowers, Molders, Benders, and Finishers, the common work contexts for this occupation are:

   Importance of Being Exact or Accurate    Wear Common Protective or Safety Equipment    Face-to-Face Discussions

Read more about  O*NET’s Work Context  here:

https://brainly.com/question/30736336

#SPJ1

Answer: A,B,C,F

Explanation: on edge

How does information sharing work in a closed group like your computer lab

Answers

Information sharing within a closed group like a computer lab typically happens in a few ways:

1. Direct sharing - Members directly sharing files, documents, links, etc. with each other via email, messaging, file sharing services, USB drives, etc. This allows for direct and targeted sharing of relevant information.

2. Common file storage - Having a central file storage location that everyone in the group has access to. This could be a shared network drive, cloud storage service, or other file server. People can upload and access relevant files here.

3. Collaboration tools - Using tools like Slack, Teams, SharePoint, etc. These provide channels, messaging, file sharing and other features tailored for group collaboration. Members can post updates, files, links and discuss relevant topics here.

4. Regular meetings - Holding in-person or virtual meetings on a regular basis. This allows for face-to-face sharing of information, discussions, updates and coordination on projects, issues, events, etc.

5. Team communication - Encouraging an open culture where members feel comfortable asking questions, bringing up issues, posting updates and other information that would be relevant for the rest of the group to know. This informal communication helps build awareness.

6. Email lists/newsletters - Some groups use email lists, newsletters or announcements to share periodic updates, important information, events, deadlines and other things that all members should be aware of.

7. Collaboration tools for projects - Using tools like Slack, Asana, Trello or SharePoint to manage projects, tasks, files and communications specifically related to projects the group is working on together.

Those are some of the common ways information tends to get shared within a closed, collaborative group. The specific tools and approaches used often depend on the nature, size, needs and culture of the particular group. But open communication and providing multiple channels for sharing information are key.

7.5 code practice help I do not understand how to get the 81666.6666667 as the answer for Your average award money per gold medal was. The program works except for that.

7.5 code practice help I do not understand how to get the 81666.6666667 as the answer for Your average

Answers

The most probable reason why the output of your program was 81666.6666667 is because you made use of "float" or "double" instead of "int"

What is a Floating Point output?

This happens when the program performs some arithmetic or mathematical operations that involve division or decimal numbers, which results in the floating-point output.

For example, if the program calculates the average of three numbers, where the numbers are 80000, 82000, and 81000, the result would be 81666.6666667.

You should make use of "int" which gives input only in whole numbers without decimals or floating point numbers.

Read more about programming here:

https://brainly.com/question/26134656

#SPJ1

What are the advantages and disadvantages of E learning.​

Answers

Answer:

E LEARNING.This is the effective teaching and learning by using electronic media.

Advantages.Reduce travveling costs and time to and from school.Learner can study whenever they access computer and internet.Self paced learning models.Class works can be schedule around personal and professional work,resulting in flexibility learning.

Disadvantages.Student may feel isolated or miss social interractions.Un motivated learners or those with poor study habits may fall behind .Instruxtions may not be available on demand.

hope it helps.

Advantages.It preserve time to and from school.Learner can study whenever they access computer and internet.Self paced learning models.Class works can be schedule around personal and professional work,resulting in flexibility learning.

Disadvantages.Student can feel bored to learn alone.Un motivated learners or those with poor study habits may fall behind .Instruxtions may not be available on demand.Cost to ruin the service since it needs subscribtions for every periodof time to access more quality services.

how computer network is useful​

Answers

Answer:

Access to remote information.

Person-to-person communication.

Interactive entertainment.

Electronic commerce.

When using the routing information protocol (rip) to transfer data from one network to another, the path ____ is chosen.

Answers

Answer:

When using the routing information protocol (rip) to transfer data from one network to another, the path with the smallest number of hops is chosen.

when data is collected and turned into information, it is called​

Answers

Answer:

its called data processing

Explanation:

...

Explanation:

When data is collected and turned into information, it is called program .

Question 1 (1 point)

Document orientation is the direction that a page is displayed for viewing and printing. Which terms relate to page orientation?


Question 1 options:


Portrait and Landscape


Top and Bottom Margins



Inside and Outside Margins



Header and Footer


Question 2 (1 point)

Which option will add the same text at the top and/or bottom of every page in your document?


Question 2 options:


Aline and Underling



Header and Footer



Page Count and Bookmark



Bold and Italic


Question 3 (1 point)

Changing the layout of a document page or the design of text is called:


Question 3 options:


Printing.



Reviewing.



Editing.



Formatting.


Question 4 (1 point)

What is the keyboard shortcut for inserting a page break?


Question 4 options:


CTRL+ENTER



CTRL+V



CTRL+C



CTRL+A


Question 5 (1 point)

Which term refers to the blank areas surrounding a document page?


Question 5 options:


Margins



Sidebars



Footers



Headers

ILL GIVE BRAINLIEST TO WHOM EVER GETS ALL 5 RIGHTT!

Answers

Answer:

The answers are in the Explination :3

Explanation:

Question 1 - Portrait and Landscape.

Question 2 - Header and Footer

Question 3 - Formatting

Question 4 - Ctrl + Enter

Question 5 - Margins

Two students were climbing stairs at school. Student 1 has a weight of 700 n. Student 2 has a weight of 560 n. If student 1 climbs the stairs in 5. 0 s and student 2 climbs the stairs in 4. 0 s, who is more powerful?.

Answers

The two students have equal or same power.

How to calculate power?

F1 = force student 1 = 700N (weight represent force)

F2 = force student 2 = 560N

t1 = time student 1 = 5s

t2 = time student 2 = 4s'

Power is the amount of transferred or converted energy per time unit. The standard power units is watt. Energy can be change to force multiply by distance. So power formula is,

P = (F×d)/t

Assuming the distance is same so we can eliminate distance in formula. So,

P = F/t

P1 = F1/t1

= 700/5

= 140 watt

P2 = F2/t2

= 560/4

= 140 watt

Thus, two student have equal power which is 140 watt.

Learn more about power here:

brainly.com/question/25610333

#SPJ4

mr. keely stole pin number of ms jones credit card and has been using for buying expensive items. the credit card company calls mr. keely to confirm a $15000 purchase. mr. keely denied ever making that purchase. which of the following most likely technique credit card company a. neural network b. fuzzy logic c. expert system d. a dss

Answers

The technique used by credit card companies based on the above case, where the company calls Mr. Keely who uses stolen pin numbers to buy many things is called an expert system (C).

What is an expert system?

An expert system replicates human capability in making decisions. It automatically detects any activity, controls it and performs action based on previously programmed steps. An expert system is part of artificial intelligence which emulates human experts in decision making. This system is designed to solve more complex problems than the conventional system does. Expert system is considered the first successful form of artificial intelligence which was created first in the 1970s.

Learn more about artificial intelligence https://brainly.com/question/25523571

#SPJ4

who is the father of computer ​

Answers

Answer:

Charles Babbage

Explanation:

An exceptionally gifted scientist, mathematician, economist, and engineer, Charles Babbage also invented the computer. It is difficult to envision living in the twenty-first century without computers. They are all around us, simplify our lives, and are found everywhere. Banks, government agencies, commercial businesses, and institutions engaged in space exploration all use computers.

What should I watch on Netflix (shows for a 14 year old) ?

Answers

Answer:

The flash

Explanation:

Answer:

Im not a big horse fan but loved this show its called free rein

Explanation:

loved itttttt!

What is the worst-case complexity of adding an element to a linked-list-based, unlimited-capacity stack, and why? All stack operations are always 0(1). Odlog N), to find the correct location to add the element O(N), to find the correct location to add the element. O(N), to copy all elements to a larger list when the stack is full.

Answers

The worst-case complexity of adding an element to a linked-list-based, unlimited-capacity stack is O(1). Here is why:Stacks use LIFO (last-in, first-out) to manage data structures.

A linked-list-based, unlimited-capacity stack, in particular, is implemented by linking nodes or data elements in a sequence in which every node or element points to the next one, thereby enabling unlimited data storage.The reason why the worst-case complexity of adding an element to a linked-list-based, unlimited-capacity stack is O(1) is because all stack operations are always 0(1).

This is the best scenario for the implementation of the linked-list-based, unlimited-capacity stack. Even though the average case complexity of adding an element to a linked-list-based, unlimited-capacity stack may be higher than the worst-case complexity, the worst-case complexity remains O(1).In addition, the other options provided such as O(log N) and O(N) are not applicable for linked-list-based, unlimited-capacity stacks. The operation of adding an element to a linked-list-based, unlimited-capacity stack is not dependent on any logarithmic or linear time complexities.

To know more about complexity visit:

https://brainly.com/question/31836111

#SPJ11

What words are familiar to people involved with computers? printer network, mouse and monitor screen software

Answers

The words that are familiar to people involved with computers are network, mouse and monitor screen.

What is a computer?

A computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information), which could be used by an end user to perform a specific task through the use of the following:

KeyboardNetworkMonitor screenMouse

In Computer technology, we can logically infer that network, mouse and monitor screen are the words that are familiar to people involved with computers.

Read more on computer here: brainly.com/question/959479

#SPJ4

Answer:

B

Explanation:

network, mouse and monitor

Different Betweens in SRAM and DRAM !






Thank!
\( \: \: \: \)

Answers

Answer:

Explanation:

Application Differences:

SRAM

SRAM stands for Static Random Access Memory  DRAM stands for Dynamic Random Access Memory

Faster access is due to the usage of transistors to store single bit of data  

SRAMs are used for cache memories due to faster access time  

DRAM

DRAM stands for Dynamic Random Access Memory

DRAMs are used for main memories due to comparatively slower access time.

DRAMs use capacitor to store bits where each capacitor holds a single bit

Parameter differences  

Speed: SRAMs are faster due to presence of transistors. DRAMs are slower due to presence of capacitors

Size: Due to complexity involved in the internal circuits, SRAMs are smaller in capacity for same size of the chip. DRAMs are larger as compared to SRAMs since their capacity for a given physical size is more.

Cost: SRAMs are costlier and the per bit storage cost is more than that of the DRAMs. DRAMs are cheaper and the per bit storage cost is less than that of the SRAMs

SRAM :

SRAM has lower access time, so it is faster compared to DRAM.SRAM is costlier then DRAM.SRAM requires constant power supply, which means this type of memory consumes more power.Due to complex internal circuitry, less storage capacity is available compare to the same physical size of DRAM memory chip. SRAM has low packaging density.

DRAM :

DRAM has higher access time, so it is lower than SRAM. DRAM costs less compair to the SRAM.DRAM offers reduced power consumption, due to the fact that the information is stored in capacitor.Due to the small internal circuitry in the one-bit memory cell of DRAM, the large storage capacity is available.DRAM has high packaging density.

Hope Helps!!

Write a function solution that, given an integer N, returns the maximum possible value obtainable by deleting one '5 digit from the decimal representation of N. It is guaranteed that N will contain at least one '5' digit. java

Answers

Here's a possible solution in Java:

arduino

Copy code

public static int solution(int N) {

   String str = String.valueOf(N);

   int maxVal = Integer.MIN_VALUE;

   for (int i = 0; i < str.length(); i++) {

       if (str.charAt(i) == '5') {

           String numStr = str.substring(0, i) + str.substring(i+1);

           int num = Integer.parseInt(numStr);

           maxVal = Math.max(maxVal, num);

       }

   }

   return maxVal;

}

The function takes an integer N as input and returns the maximum possible value obtainable by deleting one '5' digit from the decimal representation of N. The function first converts N to a string, and then iterates through each character of the string. If the character is '5', the function removes it from the string and converts the resulting string back to an integer. The function keeps track of the maximum integer value found in this way, and returns it after all the '5' digits have been processed.

For example, if N is 15957, the function first converts it to the string "15957". The function then iterates through each character of the string, and finds that the second character is a '5'. The function removes the '5' from the string to obtain the string "1957", and converts it back to the integer value 1957. The function continues to iterate through the string, and finds that the fourth character is also a '5'. The function removes the '5' from the string to obtain the string "1597", and converts it back to the integer value 1597. Finally, the function returns the maximum value found, which is 1957.

Learn more about Java here:

https://brainly.com/question/29897053

#SPJ11

A laptop can be kept on palm to work. [true/false) ​

Answers

Answer:

Explanation:

false

How can I log Into the instagram app if this pop up appears?

How can I log Into the instagram app if this pop up appears?

Answers

Answer:

tou sex die sojdifnfidjd7dhubdud

You could try changing your password

what is the purpose of a router

Answers

Answer:

below

Explanation:

A router receives and sends data on computer networks. Routers are sometimes confused with network hubs, modems, or network switches. However, routers can combine the functions of these components, and connect with these devices, to improve Internet access or help create business networks.

Answer:

to help connect a network to a device

Explanation:

for example a WiFi router is needed so that a specific device can be able to be connect with the WiFi network

Which of the follow efficiencies would be considered unreasonable?

Answers

Answer:

Exponential or factorial efficiencies algorithms

Explanation:

In a computer engineering system, the efficiencies that would be considered unreasonable is the "Exponential or factorial efficiencies algorithms"

This is unlike Algorithms with a polynomial efficiency that is considered to have Reasonable Time.


Treating others with respect, even when they're impolite, is considered
A. good netiquette
B. being a bystander
C. advocating
D. empathy

Answers

The answer for this question is A

Treating others with respect, even when they're impolite, is considered good netiquette. The correct option is A.

What is netiquette?

Netiquette refers to the standards of behavior for polite and appropriate online conversation. Etiquette for the internet is another name for netiquette. These are suggested politeness guidelines rather than laws.

A set of guidelines known as netiquette promotes polite and appropriate online conduct.

These guidelines are crucial because they encourage effective communication, guard against misunderstandings, and show you what is appropriate in social situations when working and cooperating online.

Online communication can be made more productive with the use of netiquette, which also helps people stay clear of confusion and potential confrontation. It is considered acceptable to treat people with respect, even when they are being rude.

Thus, the correct option is A.

For more details regarding good netiquette, visit:

https://brainly.com/question/29444693

#SPJ2

Albilad Bank decides to install 2 ATMs near to its one of the full services branches in Dammam. Each ATM costs 35000SAR to the bank. ATM Installation cost is 16000SAR for each machine. Each ATM has a projected life of 10 years. Both ATMs are expected to handle 50,000 cash transaction collectively and, on an average, bank can save 0.40SAR on each transection in teller expenses. If Albilad bank has a 12% cost of capital, should the bank go ahead with this Investment in 2 ATMs. [4 Marks] Note: If using Excel, Students must provide the table of calculations.
Previous question

Answers

the NPV is positive, Albilad bank should go ahead with the investment in 2 ATMs.

To determine if Albilad bank should go ahead with this investment in 2 ATMs, we will calculate the Net Present Value (NPV) of the investment. The formula for NPV is:NPV = Σ (Ct / (1+r)t) - CoWhere,Ct = net cash inflow during the period tCo = total initial investment costsr = discount rate (i.e., cost of capital)t = number of time periodsThe first step is to calculate the net cash inflows for each year. Here's a table showing the calculation:YearCash TransactionTeller ExpensesSaved CashTransactionRevenueCost of ATMNet Cash Inflow01250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR20000SAR2500000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR21800SAR3125000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR23600SAR4250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR25400SAR5250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR27200SAR6250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR28960SAR7250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR30720SAR8250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR32480SAR9250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR34240SAR10250000SAR100000SAR2100000SAR-100000SAR200000SAR20000SAR36000SARTotal income over the life of the ATMs (10 years) = 171,960SARNow we can calculate the NPV using the formula.NPV = Σ (Ct / (1+r)t) - CoNPV = (20000 / (1+0.12)^1) + (21800 / (1+0.12)^2) + (23600 / (1+0.12)^3) + (25400 / (1+0.12)^4) + (27200 / (1+0.12)^5) + (28960 / (1+0.12)^6) + (30720 / (1+0.12)^7) + (32480 / (1+0.12)^8) + (34240 / (1+0.12)^9) + (36000 / (1+0.12)^10) - 115000SARNPV = 1333.42

Learn more about NPV here :-

https://brainly.com/question/33284820

#SPJ11

The name of an image (or file) can be found on the image
in the document window.
tab
panel
options
menu

Answers

Answer:

tab

Explanation:

Other Questions
You are trying to automate the sales of a car sales and distribution company in theWestern Cape. The work was supposed to be completed by your predecessor, but hewas unable to perform this task as he had a short stint in this job. However, he haddivided this complex task into manageable tasks for you using arrays. Analyse theinput/output of the desktop application below and answer the questions that follow.a) Write Java statements to declare an array that will store the total car salesvalues (int) for each month of the year According to classical theory, national income depends on ______, while keynes proposed that ______ determined the level of national income. PLEASE HELP!!!! WILL MARK BRAINLIEST!!!! Which tool uses electromagnetic waves to determine the dyes within a fiber? FTIR UV-VIS MSP Light microscope Dissecting microscope Plzzzzz help meeeee plzzzz I really d answa All of the following are geographic sections of the North Central Plains except:a.Rolling Plainsb.Grand Prairiec.Piney Woodsd.Cross Timbers Which of these statements BEST describes a way to effectively manage stress?A. Make sure that all elements of your life are stress-free.B. Seek out pleasure all of the time since it is never stressful.C. Recognize stress in unavoidable, but there are good ways to deal with it.D. Add new activities to your schedule until you find those that reduce stress. Solve for x.z=(x-8)k A young child's family flees a village when it is attacked by local warlords and has little access to food for a month. The child's low weight and wasted appearance indicate: a. iodine deficiency b. vitamin B12 deficiency c. edema d. severe acute malnutrition e. drug abuse Elaine Romberg prepares her own income tax return each year. A tax preparer would charge her $100 for this service. Over a period of 10 years, how much does Elaine gain from preparing her own tax return? Assume she can earn 1 percent on her savings. (Exhibit 1-A, Exhibit 1-B, Exhibit 1-C, Exhibit 1-D) Gabriella ran several laps around a 1/4-mile track. Then she ran 2 1/2 miles on a trail. In all, she ran 4 miles. Write and solve an equation to find l, the number of laps Gabriella ran. What is the average speed of 190m in 8.5s. Charles Darwin's theory that men descended from apes was met with both favorable and unfavorable opinions. Although some readers liked Darwin's ideas, the religious leaders and scientists of his time did not approve of his research.This example shows that A. the church and its scientists did not approve of any type of science or research study. B. very little scientific research was done in Darwin's time. C. Darwin was not a good scientist, and his theories were wrong. D. many science innovators experience difficulties as they attempt to break through accepted ideas of their time. Excerpt from When I Have Fears by John KeatsWhen I have fears that I may cease to beBefore my pen has gleaned my teeming brain,Before high-piled books, in charactery,Hold like rich garners the full-ripened grain;When I behold, upon the nights starred face, 5Huge cloudy symbols of a high romance,And think that I may never live to traceTheir shadows, with the magic hand of chance;And when I feel, fair creature of an hour,That I shall never look upon thee more, 10Never have relish in the faery powerOf unreflecting love then on the shoreOf the wide world I stand alone, and thinkTill love and fame to nothingness do sink.Which sentence best expresses a central theme of Keats's sonnet?Group of answer choicesA) Death brings an end to affection and esteem.B) Unrequited love is a worse fate than unfulfilled ambition.C) Solitude is the best way to inspire the imagination.D) Romantic love is a distraction from the glory of fame. Attempt?Natural SubsequenceIn Timsort, we try to use the natural sorted subsequence already present inthe array which is to be sorted. The natural sorted sequences are thosearray.which are somehow already present in the sorted order in the providedYour task is to find the length of the longest natural sorted subsequencealready present in the given string.Input Specification:input1: A string containing all lower case letters.Revisit LaterOutput Specification:Return the length of the longest natural sorted subsequence.Example 1:input1: abzd The ________________ were never able to break through the German lines. January 1st is considered to be the new year in which calendar. 1 Diana was playing the integer game. She discarded four cards with the value of (-1,75). How did this affect her overall score? (Increase or decrease AND by how much). which form of aneuploidy causes primary down syndrome? a) nullisomy b) monosomy c) disomy d) trisomy e) tetrasomy A salesperson at a jewelry store earns 5% commission each week. Last week, Heidi sold $750 worth of jewelry. How much did she make in commission? How much did the jewelry store make from her sales?