Elliott plays football for OCR FC. He wants to create a program to store the results of each football match they play and the names of the goal scorers. Elliott wants individual players from the team to be able to submit this information.

Answers

Answer 1

Elliott, who plays football for OCR FC, wants to create a program to store the results of each football match they play and the names of the goal scorers. His objective is to enable individual players from the team to submit this information.

A program that stores the information of each match and each goal scorer would be beneficial to OCR FC.The program will store the details of each match played and the scorers, which will be useful for the team to evaluate their performance throughout the season. To ensure individual players can submit information, it is essential to have a secure platform where only authorized users can access the data.

Therefore, the program must have a login system, where every player from the team will be provided with their own unique login details that will enable them to enter the details of the match they have played.The information collected will be displayed on a user-friendly dashboard.

To know more about football visit:

https://brainly.com/question/31190909

#SPJ11


Related Questions

IT WORKSHEET FOR GRADE 7 STUDENT'S PART L WRITE TRUE IF THE STATEMENT IS CORRECT AND FALSE IF IT IS L 1. It is not mandatory to unplug power cable from the main powe cleaning a computer I need help

Answers

False. It is mandatory to unplug the power cable from the main power before cleaning a computer to prevent electrical shock or damage to the components.

What is the explanation for the above response?

The statement "It is not mandatory to unplug the power cable from the main power when cleaning a computer" is false. It is important to unplug the power cable from the main power before cleaning a computer because it can prevent electrical shock or damage to the computer's components.

If the power is still connected, there is a risk of electric shock from accidental contact with live components. Also, cleaning the computer while it's powered on may also lead to damage or data loss due to electrostatic discharge or accidental spills.

Learn more about computers at:

https://brainly.com/question/21047147

#SPJ1

Page orientation is determined in Microsoft Word from the __________ tab

Answers

Answer:

Page orientation is determined in Microsoft Word from the Page Layout tab.

Explanation:

The Page Layout Tab holds all the options that allow you to arrange your document pages just the way you want them. You can set margins, apply themes, control of page orientation and size, add sections and line breaks, display line numbers, and set paragraph indentation and lines.

. what does data redundancy mean? how is it different from duplication? can you give an example of each?

Answers

When an attribute has two or more identical values, there is duplicate redundancy data. If you can erase a data value without losing any information, it is redundant. Redundancy is hence pointless duplication.

Describe data redundancy and provide an example.

Redundancy in DBMS refers to having many copies of the same data in the database. As an illustration, every student record would have multiple copies of the department's full details, including department id, department name, and department head. Redundancy can lead to data inconsistency if it is not properly updated.

Are data duplication and redundancy the same thing?

Redundant data is defined as identical data, and it is also claimed that the same data exists in the database in several places.

To know more about redundancy data visit:-

https://brainly.com/question/13438926

#SPJ4

Digital forensics involves the _____, identification, extraction, documentation, and interpretation of digital media.

Answers

The correct answer to the missing blank portion of the question about digital forensics is; Preservation

What is digital forensic?

Digital Forensics is defined as the process of preservation, identification, extraction, and documentation of computer evidence that can be used by the court of law.

Now, digital forensics is also the  science of finding evidence from digital media like a computer, mobile phone, server, or network. Thus, It is used to provide a forensic team with the best techniques and tools required to solve complicated digital-related issues.

Read more about Forensics at; https://brainly.com/question/19238665

Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company

Answers

Answer:

Losing jobs. Fire. Destruction of property.

Explanation:

Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.

What are company values?

Answers

Answer:

the beliefs, philosophies, and principles that drive your business.

Answer:

the beliefs, philosophies, and principles that drive your business.

Explanation:

Thinking carefully about a speaker's reasoning and purpose can help you _____ that speaker's message. In other words, you consider the message and decide whether it is believable.

Answers

Thinking carefully about a speaker's reasoning and purpose can help you comprehend (understand) that speaker's message. In other words, you consider the message and decide whether it is believable.

What do you think is the purpose of the speakers in their speech?

Making sense of the world around us is referred to as reasoning. A communication must be evaluated during critical listening in order to be accepted or rejected.  Critical listening can be practiced while listening to a sales pitch.

Speakers must provide proof to back up their claims in order to be convincing. Listeners who pay close attention are wary of assertions and generalizations. When the speaker is not regarded as an authority on the subject of the speech, strong evidence is especially crucial.

Therefore, When communicating, speakers aim to achieve both broad and detailed goals. There are two main goals for speaking in college and beyond: to inform or to persuade. There is no clear distinction between the two; many talks will combine elements of both.

Learn more about reasoning from

https://brainly.com/question/25175983
#SPJ1

Which sentence describes a contract comprehensively?
A contract needs to have an offer and a legal purpose. A contract includes an offer and acceptance without any consideration. A contract
includes an offer, acceptance, and consideration without a legal purpose. A contract includes an offer, acceptance, consideration, and a legal
purpose.

Answers

Answer:The sentence that describes a contract comprehensively is the last option - a contract includes an offer, acceptance, consideration, and a legal purpose.

These four terms are all very important parts of a contract, without which an agreement couldn't even exist. A contract has to have all four parts in order to be legally valid, so this is the reason why the other options cannot be correct as all of them lack one or more terms.

Explanation:

Answer:

A contract includes an offer, acceptance, and consideration without a legal purpose.

Explanation:

which plunger is easy to push between plunger A filled with water and plunger A filled with air​

Answers

Plunger A filled with air is easier to push than plunger A filled with water. Air is less dense than water and has less resistance when pushed.

What is a Plunger?

A plunger is a tool used to clear blockages in drains, toilets, and other plumbing fixtures. It consists of a rubber or plastic cup with a handle, which is attached to a shaft, and a flange at the end of the shaft.

The cup is forced against the blockage, creating a seal, and the plunger is then moved up and down to force water through the blockage. Plungers are also used to loosen stubborn jars and lids.

Learn more about Plunger here:

https://brainly.com/question/28425080

#SPJ1

What color model should Joe use if he will be using an offset printing press?

A. RGB

B. hexadecimal

C. CMYK

D. index

Answers

Answer:

CMYK

Explanation:

Monitors typically use RGB color (additive model — adding to make white), but offset printing uses CMYK pigments (subtractive color — subtracting from the existing white). Printed images have less visual range, saturation, and contrast than digital images, so in print, colors will usually appear darker and less vibrant.

Answer:

The correct answer is letter C. CMYK

Explanation:

What is the relationship between optical drives and WORMs?

Optical drives are advanced versions of WORMs.
WORMs do not affect optical drives.
Optical drives are susceptible to WORMs.
WORMs are types of optical drives.

Answers

Answer:

When data is written to a WORM drive, physical marks are made on the media surface by a low-powered laser and since these marks are permanent, they cannot be erased. Rewritable, or erasable, optical disk drives followed, providing the same high capacities as those provided by WORM or CD-ROM devices.

Explanation:

Good luck

The lifetime of a new 6S hard-drive follows a Uniform
distribution over the range of [1.5, 3.0 years]. A 6S hard-drive
has been used for 2 years and is still working. What is the
probability that it i

Answers

The given hard-drive has been used for 2 years and is still working. We are to find the probability that it is still working after 2 years. Let A denote the event that the hard-drive lasts beyond 2 years. Then we can write the probability of A as follows:P(A) = P(the lifetime of the hard-drive exceeds 2 years).By definition of Uniform distribution, the probability density function of the lifetime of the hard-drive is given by:

f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.where a = 1.5 years and b = 3.0 years are the minimum and maximum possible lifetimes of the hard-drive, respectively. Since the probability density function is uniform, the probability of the hard-lifetime of a new 6S hard-drive follows a Uniform distribution over the range of [1.5, 3.0 years]. We are to find the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years.Let X denote the lifetime of the hard-drive in years.

Then X follows the Uniform distribution with a = 1.5 and b = 3.0. Thus, the probability density function of X is given by:f(x) = 1/(b - a) if a ≤ x ≤ b; 0 otherwise.Substituting the given values, we get:f(x) = 1/(3.0 - 1.5) = 1/1.5 if 1.5 ≤ x ≤ 3.0; 0 the integral is taken over the interval [2, 3] (since we want to find the probability that the hard-drive lasts beyond 2 years). Hence,P(A) = ∫f(x) dx = ∫1/1.5 dx = x/1.5 between the limits x = 2 and x = 3= [3/1.5] - [2/1.5] = 2/3Thus, the probability that a 6S hard-drive, which has been used for 2 years and is still working, will continue to work beyond 2 years is 2/3.

To know more about Uniform distribution visit:

brainly.com/question/13941002

#SPJ11

textspeak consists of?

Answers

Textspeak is a type of shorthand language used in texting, instant messaging, and social media. It is a form of written communication that uses abbreviations, acronyms, and symbols to represent words, phrases, or ideas.

Examples include: LOL (laugh out loud), BRB (be right back), and :) (smiley face).

Textspeak is a type of shorthand language commonly used in digital communication. It is used to quickly convey a message in a limited number of characters and often replaces full words and phrases with abbreviations, acronyms, and symbols.

Textspeak is a valuable tool for quickly communicating thoughts and messages in digital spaces, and its use is becoming increasingly popular.

Learn more about emoticons: https://brainly.com/question/22886600

#SPJ4

users complain that they receive an untrusted website warning in their web browsers when connecting to a https-enabled intranet web server, but not when they connect over http. what is the most likely reason this is happening?

Answers

HTTP does not require a PKI certificate to be installed on the server, but HTTPS does.

What is HTTP?The HTTP protocol, which is based on IP, is used to transfer data from server to client or vice versa. Client makes a request, which the server responds to. The server and client only interact during the current request and response cycle.HTTP offers a standard for communication between a web browser and a web server. It is a collection of guidelines for exchanging data between computers. On the World Wide Web, information like text, photos, and other multimedia files are shared. HTTP is indirectly used every time a web user launches their browser. For distributed, collaborative, hypermedia information systems, it is an application protocol.

To learn more about  HTTP refer to:

https://brainly.com/question/7462872

#SPJ4

Traceroute is the utility used in networks using_____
-based operating systems.

Answers

Answer:

Explanation:

Traceroute is a command that runs network diagnostic functionality on computer operating systems. operating system is used as an interface between computer hardware and user. In all computer system we need a operating system to run all the programs . The examples of operating system is Window2000 , Unix ,Linux , Mac.

How did avery and garth most likely create their diagrams

How did avery and garth most likely create their diagrams

Answers

Avery used four shapes, whereas Garth used SmartArt and added a shape. The correct option is A.

What is SmartArt?

The variety of visuals available in Word that you may use to make diagrams, including flow charts, process charts, organizational charts, and similar graphics, is referred to as "SmartArt."

Choose a SmartArt graphic from the collection, then edit it as necessary.

If you wish to perform any of the following, use a SmartArt graphic: Make a chart of the organization. Display hierarchy using a decision tree, for example. Show the various stages or steps of a workflow.

Garth used SmartArt and added a shape, whereas Avery used four shapes.

Thus, the correct option is A.

For more details regarding SmartArt, visit:

https://brainly.com/question/5832897

#SPJ1

To obtain your first driver's license, you must successfully complete several activities. First, you must produce the appropriate identification. Then, you must pass a written exam. Finally, you must pass the road exam. At each of these steps, 10 percent, 15 percent and 40 percent of driver's license hopefuls fail to fulfil the step's requirements. You are only allowed to take the written exam if your identification is approved, and you are only allowed to take toe road test if you have passed the written exam. Each step takes 5, 3 and 20 minutes respectively (staff members administering written exams need only to set up the applicant at a computer). Currently the DMV staffs 4 people to process the license applications, 2 to administer the written exams and 5 to judge the road exam. DMV staff are rostered to work 8 hours per day. (i) Draw a flow diagram for this process (ii) Where is the bottleneck, according to the current staffing plan? (iii) What is the maximum capacity of the process (expressed in applicants presenting for assessment and newly-licensed drivers each day)? Show your workings. (iv) How many staff should the DMV roster at each step if it has a target to produce 100 newly-licensed drivers per day while maintaining an average staff utilisation factor of 85%? Show your workings.

Answers

The flow diagram for the given process is shown below.  The bottleneck is the part of the process that limits the maximum capacity for driver license.

In the given process, the bottleneck is the road exam, where 40% of the driver's license applicants fail to fulfill the step's requirements.(iii) Maximum Capacity of the Process:  The maximum capacity of the process can be calculated by finding the minimum of the capacities of each step.  Capacity of the identification process = (1 - 0.10) × 480/5

= 86.4 applicants/dayCapacity of the written exam process

= (1 - 0.15) × 480/3

= 102.4

applicants/dayCapacity of the road exam process = (1 - 0.40) × 480/20

= 28.8 applicants/day

Therefore, the maximum capacity of the process is 28.8 applicants/day.Staff Required for 100 Newly-Licensed Drivers per Day:  Let the staff required at the identification, written exam, and road exam steps be x, y, and z respectively.  From the above calculations, we have the following capacities:86.4x + 102.4y + 28.8z = 100/0.85

To know more about driver visit:

https://brainly.com/question/30485503

#SPJ11

John recently worked on a project about various programming languages. He learned that though procedural language programs are useful, they have disadvantages too. What is a disadvantage of programs written in procedural languages? A. Programs do not represent data complexity. B. Programs take more time to execute. C. Programs are prone to security threats. D. Programs do not interface with multiple platforms.

Answers

Answer:

Option A  Programs do not represent data complexity.

Explanation:

In procedural languages like C, it doesn't support object oriented design that could encapsulate data in an object that entails a set of relevant attributes and methods which can represent an entity in real life better. This means the procedural language is limited by creating an object-like data structure that can represent data complexity. The procedural language only support the running a program by following a set of instructions in order.

what is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys?

Answers

The elliptic curve theory-based ECC cryptography is a key-based approach for encrypting data that employs a public key encryption mechanism.

Elliptic curve encryption (ECC) – what is it?

Elliptic curve cryptography (ECC), a method for public key encryption based on elliptic curve theory, can be used to generate cryptographic keys more quickly, more efficiently, and in smaller sizes.

Public key encryption: what is it?

Asymmetric key encryption is another name for public key encryption. Asymmetric keys, as the name implies, consist of two separate keys that are utilised in public-key encryption. An encryption key is used for encryption, and a decryption key is used for decryption. No other key will be utilised once the key for encryption and decryption has been chosen.

To learn more about cryptography visit:

brainly.com/question/88001

#SPJ4

To understand just how much different subsets can differ, create a 5 fold partitioning of the cars data included in R(mtcars) and visualize the distribution of the gears variable across the folds. Rather than use the fancy trainControl methods for making the folds, create them directly so you actually can keep track of which data points are in which fold. This is not covered in the tutorial, but it is quick. Here is code to create 5 folds and a variable in the data frame that contains the fold index of each point. Use that resulting data frame to create your visualization

Answers

The data set, mtcars, is one of the built-in datasets in R that can be used to create a 5-fold partition and visualize the distribution of the gears variable across the folds.

The first step is to partition the data into 5 sets, as described in the code below. The code also creates a variable, fold, that indicates which fold each observation belongs to.```
mtcars$fold <- factor(rep(1:5, length.out = nrow(mtcars)))


```Next, the ggplot2 package can be used to create a visualization of the distribution of the gears variable across the folds.```library(ggplot2)ggplot(mtcars, aes(x = gear, fill = fold)) + geom_bar(position = "dodge")```This code creates a bar plot where the x-axis is the gears variable and the bars are filled according to the fold variable. The position parameter is set to "dodge" to create a side-by-side bar plot for each fold. This visualization allows for a clear comparison of the distribution of the gears variable across the five folds.

To know more about variable visit:

https://brainly.com/question/15078630

#SPJ11

Can someone please answer this? It isn't Insert

Can someone please answer this? It isn't Insert

Answers

Answer:

The answer for this question is b Add to

One of the files is substr.awk. Your job is to edit this file so it will output all of the character sequences of a certain length found in a text input file. Another file is wordlist.txt, which is a text file containing about 60,000 English words, one word per line. Here are the first lines of wordlist.txt:

a

aardvark

aardwolf

ab

aba

abaca

abacist

Answers

The `substr.awk` file is responsible for outputting all the character sequences of a particular length, found in a text input file. Below is how to edit it to output all of the character sequences of a specific length:

```
#!/usr/bin/awk -fBEGIN {
   length = 3 # Change this value to the desired length of the character sequences
}
{
   for (i=1; i<=length; i++) {
       for (j=1; j<=length-i+1; j++) {
           print substr ($0, j, i);
       }
   }
}
```

For instance, if you need to output all the 4-letter character sequences, replace `length = 3` with `length = 4`. And here is a sample of how to use `wordlist.txt` to obtain all the 4-letter words:`awk 'length($0) == 4' wordlist.txt` This command will print all the words in `wordlist.txt` that have a length of 4 characters.

Learn more about character sequences: https://brainly.com/question/32352749

#SPJ11

what is the function of filters?
a. forwarding mails
b. compose mails
c. block mails
d. send mails

Answers

Forwarding mails is the function of filters.

Thus, Electronic mail, or simply "email," is a form of communication that employs electronic devices to send messages via computer networks. The term "email" can apply to both the method of delivery and the specific messages that are sent and received.

Since Ray Tomlinson, a programmer, invented a mechanism to send messages between computers on the Advanced Research Projects Agency Network (ARPANET) in the 1970s, email has existed in some form.

With the introduction of email client software (like Outlook) and web browsers, which allow users to send and receive messages via web-based email clients, modern versions of email have been widely accessible to the general public.

Thus, Forwarding mails is the function of filters.

Learn more about Emails, refer to the link:

https://brainly.com/question/16557676

#SPJ1

Do you like Breath of the Wild? If so, tell me your favorite weapon, Champion, armor set, town, and quote.
Here's mine: Weapon, Upgraded Master Sword. Champion, Urbosa. Armor Set, Barbarian Set. Town, Gerudo Town. Quote, "But courage need not be remembered, for it is never forgotten."

Answers

Answer:

Oh I just found out it was a game! I didn't know that, what is it about?

Explanation:

Can I have brainliest? It would help me out, if not thanks anyways! Hope this helped and have a nice day!

Answer:

Biggoron sword (bc i own oot link amiibo)

Revali ( yes he is annoying but interesting character development)

Ancient set ( bc guardians getting destroyed and looks cool)

Town Karkariko Village

Quote (Revali) Guess I was wrong about... how lucky he would be. I hope that luck holds out, Link... For everyone's sake."   bc I'm just thinking at that moment (no ravioli it's called skill issue)

Explanation:

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

HELP

AUDIO AND VIDEO

Which camera setting does this statement describe? The __________ of the camera determines the brightness or darkness of an image​

Answers

Answer:

Aperture

Explanation:

The Aperture of the camera determines the brightness or darkness of an image

Write a for loop to print the numbers from 20 to 30, inclusive (this means it should include both the 20 and 30). The output should all be written out on the same line. Expected Output 20 21 22 23 24 25 26 27 28 29 30

Answers

Answer:

for b in range(20,31):

   print(b, end=" ")

Explanation:

Hint: Variable does not matter. Meaning the b that I put in does not matter. You can put in any other letter you want. Hope it helps!

A loop to print the numbers from 20 to 30, inclusive for b in range(20,31)    : print(b, end=" ").

What is loop?

Loop is defined as a computer program or script that continuously executes the same commands or processing the same data until told to stop.  A loop is used in computer programming to perform a set of instructions or a block of code repeatedly without having to start from scratch each time. The code block is executed in accordance with a particular situation. Loops are the control structures in a program.

Variables are data values that can change depending on the user's response to a query, such as their age. During the running of a program, variables could change. A variable is a piece of memory. It has a name that's connected to that place. The memory location is where data is stored. Variable is irrelevant. In other words, it doesn't matter what b I enter. Any additional letter can be entered.

Thus, a loop to print the numbers from 20 to 30, inclusive for b in range(20,31)    : print(b, end=" ").

To learn more about loop, refer to the link below:

https://brainly.com/question/14390367

#SPJ3

Write a while loop that reads integers from input and calculates finalVal as follows:


If the input is divisible by 3, the program outputs "hit" and increases finalVal by 1.

If the input is not divisible by 3, the program outputs "miss" and doesn't update finalVal.

The loop iterates until a negative integer is read.


Ex: If the input is 6 9 4 -2, then the output is:


hit

hit

miss

Final value is 2


Note: x % 3 == 0 returns true if x is divisible by 3.


Code:


#include

using namespace std;


int main() {

int in;

int finalVal;


finalVal = 0;

cin >> in;


/* Your code goes here */


cout << "Final value is " << finalVal << endl;


return 0;

}

Answers

Using the knowledge of computational language in C++ it is possible to write a code that write a while loop that reads integers from input and calculates finalVal.

Writting the code:

#include <iostream>

using namespace std;

int main() {

   int numInput;

   int result;

   result=0;

   cin>>numInput;

   while(numInput>0){

       if(numInput%4==0)

           cout<<"miss\n";

       else{

           cout<<"hit\n";

           result+=1;

       }

       cin>>numInput;

   }

   cout<<"\nResult is "<<result<<endl;

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Write a while loop that reads integers from input and calculates finalVal as follows:If the input is

What is the port representing buy above symbol?

 What is the port representing buy above symbol?

Answers

Answer:The port representing buy above symbol used in thousands used symbols by computer represent a today.

Explanation:The computer symbol is used to representing a today function,company, warning,specification.Symbol is used to the computer and electronics with each description.

Most symbols are shown below not may match your hardware device and software program.There are many types of symbol :

(1)Keyboard symbol (2)Display symbol (3)Power symbols (4)Sound symbols

(5)E-mail symbol (6)General symbol (7) Drive symbol (8) Network symbol

Symbol is the most commonly full circle and vertical at the top the power.

the electric plug is perhaps the commonest of electrical products. it has a number of components: the casing, the pins, the connectors, a cable clamp, fasteners, and, in come plugs, a fuse.

Answers

One of the most popular electric products is the electric plug. It has parts like a casing, connections, pins, a cable clam, a fuse, etc. A casing's ability to be a good electrical insulator is one of its functions. It is built for security. A plug's case is the plastic or rubber that surrounds the plug. It serves as a safeguard.

What is electric plug?
Electric equipment is connected to a alternating current (AC) main courses electricity power supply in structures and other locations via AC power plugs and sockets. Different voltage and current ratings, shapes, sizes, and connector types distinguish different electrical plugs or sockets from one another. Around the world, various standard systems for sockets and plugs are in use. In the 1880s, connection to light sockets and wall-mounted outlets were replaced with plugs and sockets for air conditioners. Numerous varieties have been produced for ease and safety from electrical harm. There are roughly 20 varieties currently in widespread usage worldwide, while numerous outdated socket types can still be found in older structures.

To learn more about electric plug
https://brainly.com/question/17168209
#SPJ4

Other Questions
Describe a circumstance that knowledge of medical terminology could potentially be an advantage in your personal life? Factor the expression 26x + 13 PLSSOLVE URGENTLY!\( y(n)=0.1 y(n-1)+0.72 y(n-2)+0.7 x(n)-0.252 x(n-2) \) an increase in a bank's checkable deposits due to a cash deposit will have what effect on the total money supply? Python: Later in the day you go grocery shopping, perform the following operations on the dictionary listed below:grocery_list = {'vegetables' : ['spinach', 'carrots', 'kale','cucumber', 'broccoli'],'meat' : ['bbq chicken','ground beef', 'salmon',]}a.Sort the vegetables list.b.Add a new key to our grocery_list called 'carbs'. Set the value of 'carbs' to bread and potatoes.c.Remove 'cucumber' and instead, replace it with 'zucchini'. what literary device is rose (titanic) sees a drawing of herself as a young woman and begins to recall, from the beginning, her journey on the titanic, as well as her love affair with jack An apprentice involves _____A. Hands-on experience in a skillB. Extensive internet researchC. Classes at a vocational-technical centerD. A four-year degree A vase has 4 yellow flowers, 4 red flowers, and 8 blue flowers. Donna took a flower smelled it and put it back ,then took another flower and smelled it. What is the probability that the first flower was red and the second flower was blue? Can anyone answer this Unit 8:Right Triangles&Trigonometry Homework 1 Pythagorean theorem and its converse sarah is a retired grandmother of two who is resistant to change. her grandchildren have managed to teach her how to email them at college, but she doesn't want to do more. to which technology segment does sarah belong? 2 1/8x+3/4x+1/6-7/12x+5 2/3 tell me answer two question A certain spinner has equally sized slices. The adds in favor of landing on a green slice are 7:2. What is the probability of landing on A green slice what would happen if the leopard attacked any one zebra or wildebeest. 1. With the aid of diagrams, explain the effect of taxes and subsidies equilibrium price and quantity. 3marks2. You are the manager of a firm that produces and markets a generic type of soft drink in a competitive market. In addition to the large number of generic products in your market, you also compete against major brands such as Coca-Cola and Pepsi. Suppose that, due to the successful lobbying efforts of sugar producers in the United States, Congress is going to levy a $0.50 per pound tariff on all imported raw sugar the primary input for your product. In addition, Coke and Pepsi plan to launch an aggressive advertising campaign designed to persuade consumers that their branded products are superior to generic soft drinks. How will these events impact the equilibrium price and quantity of generic soft drinks? 3marks3. Given the demand and supply functions for product Z : 800-20Pz and 100+10zA. Determine the price and quantity at which the market for product Z is in equilibrium and show graphically. 2marksB. Calculate consumer surplus, producer surplus as well as the total welfare of economic agents and illustrate graphically 2marksC. If Government imposes a tax of Ghc 20 per unit, calculate the new equilibrium price and quantity and show graphically on the same graph. 2marksD. Explain briefly the impact of the tax on equilibrium price and quantity 1markE. What portion of tax is borne by consumers and the producer?1markF. What is the total tax revenue to government? 1markG. Calculate the deadweight loss from the tax imposition 2marksH. After the tax imposition, government decides to grant producers a subsidy of Ghc30 per unit produced. Calculate the new equilibrium price and quantity. 2marksI. Explain briefly the impact of the subsidy on equilibrium price and quantity 1mark The graph of f(x)=(4x/)/, from x=0 to x=8, is revolved around the x-axis. Calculate the area of the resulting surface. ACROSS2 The 1st part of Burgoyn's Plan was for him totake 7,700 men south fromtoward Albany.3 Treaty that ended the Revolutionary War4 In the Treaty of Paris, the British gaveback to SP.8 BR General that developed a three-prongedattack-3 generals will meet at Albany and thenmarch to NY to isolate New England from thesouthern colonies.odde onics.11 A combined force 17,000 men defeatsCornwallis at this final battle12 Native American tribe that joins the BR in hopsof keeping American settlers off their lands13 1st BR commander in New England15 FR Admiral of the fleet heading for Yorktown.16 After evacuating Boston, the BR landed 32,000troops into intimidate theAmericans17 Commander of the sharpshooters20 Served as BR headquarters throughout the war23 On Christmas Day, George Washington took2400 of his men and crossed the DelawareRiver in a surprise raid on 1500 British-Hessians.26 Defeats the BR gunship Serapis. "I have not yetbegun to fight!"28 Cornwallis decided to invadeb/c he knew the FR were on their way and thatif new troops and supplies kept coming fromthe south their was very little time left to winthe war30 Pamphlet written by Thomas Paine toencourage the soldiers retreating from NYThese are the times that try men's souls"32 Washington bluffed the British into evacuatingby placing cannons around the citywith no ammo33 Governor of SP Louisiana, allowed the U.S., &FR to use the MS River to supply the rebels -he also fights BR troops at Baton Rouge,Natchez, Mobile & Pensacola35 General from Prussia that helps discipline andtrain the troops at Valley Forge37 Leader of AM force that caused Comwallis andAmold to retreat to Yorktown39 A 19 year old French aristocrat, volunteers toserve without pay, is appointed major general,& will be one of GWs most trusted aides.40 As Washington retreats from New York theBritish stop chasing him and head toward41 Results in the first major American victory ofthe Revolutionary War and turning point42 FR General leading 6,000 FR troops with GWto attack NY City but he learns that FR fleetwas on its way from the Caribbean43 Joined the US after Saratoga, the first nation toofficially recognize the United States as anindependent nation44 Under the Articles of Confederation,is the sole authority.45 Congress adopted this as the first governmentDOWN1 Declared war on BR, but did not make analliance with the US.2 The worst AM defeat of the War. 5400 (entire SArmy) captured.6 The 2nd part of Burgoyne's Plan was for a forceof BR and their Indian allies go up the St.Lawrence to Lake Ontario and then turn casttoward Albany.6 General Clinton returned to NY and leftin command of the Southernarmy7 In the Treaty of Paris, France received BRcolonies in Africa and the9 Because of the defeat at Saratoga,British forces.commander of all Breplaces Gen. Howe as10 Where Loyalist support is strongest-the BRhope to keep this region b/c of valuable cropseven if they lose New England14 Known asagainst BR"swamp fox" led hit and run raidsagainst BR camps as and supply wagons18 In the Treaty ofof Paris, theindependence and thethe BR recognize AMas theUnited States' western border.19 Commander of West Point, plan to turn overWest Point is discovered and he flees to the BRship Vulture& fights for the BR.21 Battle in which GW is defeated, Congressleaves Philadelphia, & the BR occupy it22 Gen. Howe will come north up tthefrom New York City toward Albany.Hom24 Named as the new commander of the SouthernArmy that begins a strategy of wearing downthe BR by leading Gen. Cornwallis on a sixmonth chase through the back woods of SC.NC, & VA.25 Licenses that authorized private ship owners toattack BR merchant ships allowing the seizureof millions of $ in cargo27 Howe wanted to capture NY to separatefrom the Southern states29 BR cavalry officers the led many Loyalistforces in the Carolinas-known for theirbrutality31 A wealthy Pennsylvania merchant & bankerthat personally pledged large amounts of moneyfor the war34 American spy for GW-as he was executed hesaid, "I only regret that I have but one life tolose for my country"36 Where the Continental Arthy led byWashington set up winter quarters. They havelittle food, no shoes or blanket, nearly 2,500 diefrom food shortages and cold38 The British were forced to stop their advance onPhiladelphia becausehad begun. What are the 5 types of compound words? What is an informative essay? the healthcare provider writes the following order for a child: diflucan suspension 100 mg po now. the pharmacy sends a bottle labeled: diflucan oral suspension 40 mg/ml. the nurse is correct to measure: