Exercise 7-1 Opening Files and Performing File Input in the Java. Rather than just writing the answers to the questions, create a Java file in jGrasp and enter the code. Get the code running as you answer the questions in this assignment. Submit both your typed answers as comments in your code as well as the correctly-running .java file, with your solution for 3d.
Exercise 7-1: Opening Files and Performing File Input
In this exercise, you use what you have learned about opening a file and getting input into a
program from a file. Study the following code, and then answer Questions 1–3.
1. Describe the error on line 1, and explain how to fix it.
2. Describe the error on line 2, and explain how to fix it.
3. Consider the following data from the input file myDVDFile.dat:
1 FileReader fr = new FileReader(myDVDFile.dat);
2 BufferedReader br = new BufferedReader();
3 String dvdName, dvdPrice, dvdShelf;
4 dvdName = br.readLine();
5 dvdPrice = br.readLine();
6 dvdShelf = br.readLine();
Fargo 8.00 1A
Amadeus 20.00 2C
Casino 7.50 3B
1 FileReader fr = new FileReader(myDVDFile.dat);
2 BufferedReader br = new BufferedReader();
3 String dvdName, dvdPrice, dvdShelf;
4 dvdName = br.readLine();
5 dvdPrice = br.readLine();
6 dvdShelf = br.readLine();
Figure 7-2 Code for Exercise 7-1
121
File Handling
a. What value is stored in the variable named dvdName?
b. What value is stored in the variable name dvdPrice?
c. What value is stored in the variable named dvdShelf?
d. If there is a problem with the values of these variables, what is the problem and
how could you fix it?

Answers

Answer 1

Here is a possible solution in Java for Exercise 7-1:

java

import java.io.*;

public class FileInputExample {

   public static void main(String[] args) {

       try {

           // Question 1: Describe the error on line 1, and explain how to fix it.

           // Error: myDVDFile.dat needs to be in quotes to indicate it's a String.

           String fileName = "myDVDFile.dat";

           FileReader fr = new FileReader(fileName);

           // Question 2: Describe the error on line 2, and explain how to fix it.

           // Error: BufferedReader constructor should take a FileReader object as argument.

           BufferedReader br = new BufferedReader(fr);

           String dvdName, dvdPrice, dvdShelf;

           dvdName = br.readLine();

           dvdPrice = br.readLine();

           dvdShelf = br.readLine();

           // Question 3a: What value is stored in the variable named dvdName?

           // Answer: "Fargo 8.00 1A"

           System.out.println("DVD name: " + dvdName);

           // Question 3b: What value is stored in the variable name dvdPrice?

           // Answer: "20.00"

           System.out.println("DVD price: " + dvdPrice);

           // Question 3c: What value is stored in the variable named dvdShelf?

           // Answer: "3B"

           System.out.println("DVD shelf: " + dvdShelf);

           // Question 3d: If there is a problem with the values of these variables, what is the problem and

           // how could you fix it?

           // Possible problems include: null values if readLine returns null, incorrect data format or missing data.

           // To fix, we can add error handling code to handle null values, use regex to parse data correctly,

           // or ensure that the input file has correct formatting.

           br.close();

       } catch (IOException e) {

           System.out.println("Error reading file: " + e.getMessage());

       }

   }

}

In this Java code, we first fix the errors on line 1 and line 2 by providing a String filename in quotes and passing the FileReader object to the BufferedReader constructor, respectively. We then declare three variables dvdName, dvdPrice, and dvdShelf to store the data read from the input file.

We use the readLine() method of BufferedReader to read each line of data from the input file, storing each value into the respective variable. Finally, we print out the values of the three variables to answer questions 3a-3c.

For question 3d, we can add error handling code to handle potential null values returned by readLine(), or ensure that the input file has correct formatting to avoid issues with parsing the data.

learn more about Java here

https://brainly.com/question/33208576

#SPJ11


Related Questions

Write the function prototype for a void function named getSquare. It should accept a pointer to an integer as an argument.

Answers

Answer:

void getSquare(int*);

Explanation:

The void is because it does not return a value.

Next is the name of the function "getSquare".

Then inside the ( ) you add the data types you want the function to accept, in this case its int*.

Finally you end with a ; because it is a function prototype.

Relativity uses different Object types to store a document's metadata (like Email Subject) and its coding (Responsiveness). true or false

Answers

False. Relativity is a software platform that is primarily used for managing electronic documents in the context of legal discovery and litigation. While it provides a range of tools for managing and analyzing data, including metadata, it does not use different object types to store a document's metadata and coding.

However, it is possible to use different object types in Relativity to organize and categorize documents based on various criteria, including metadata and coding. For example, you could create custom object types to track the responsiveness of documents to a particular legal request, or to categorize documents based on their subject matter.

To learn more about platform click on the link below:

brainly.com/question/15215618

#SPJ11

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

in the ssl client-server protocol, why does the server require a public certificate,

Answers

In the SSL client-server protocol, the server requires a public certificate for authentication purposes. When a client attempts to establish a secure connection.

The server must provide proof of its identity. This is where the public certificate comes in. The public certificate is essentially a digital identity card that confirms the identity of the server to the client. It contains information such as the server's name, public key, and the digital signature of the certificate authority (CA) that issued it. The client can verify the authenticity of the certificate by checking its digital signature against the CA's public key. Once the certificate has been verified, the client can trust that it is communicating with the correct server and that any information exchanged between them will be encrypted and secure. In summary, the server requires a public certificate to prove its identity and establish a secure connection with the client.

A distributed database called DNS converts domain names like www.example.com into IP addresses like 192.168.1.1 that networked devices can use to interact with one another. The DNS resolver sends a request to a DNS server to resolve a domain name into an IP address whenever a user inserts a domain name into a web browser or another application.

Learn more about client-server protocol here

https://brainly.com/question/31464210

#SPJ11

Which cue will typically elicit the fastest reaction time to the target in the symbolic cuing task?A) InvalidB) NeutralC) ValidD) Colorful

Answers

The cue that typically elicits the fastest reaction time to the target in the symbolic cuing task is option C) Valid.

In the symbolic cuing task, participants are presented with a cue that indicates the location where the target stimulus will appear. The cue can be valid (correctly indicating the target location), invalid (incorrectly indicating the target location), neutral (providing no information about the target location), or colorful (having distinct color or visual features).

The valid cue provides accurate information about the target location, allowing participants to prepare and direct their attention to that specific location. This prior information results in faster reaction times as compared to invalid or neutral cues where attention needs to be redirected or gathered from scratch. The colorful cue may attract attention, but its impact on reaction time may vary depending on the specific task and individual factors.

Learn more about specific task and individual here:

https://brainly.com/question/7640497

#SPJ11

Effective planning for information security involves:a.collecting information about an organization's objectives.b.collecting information about an organization's information security environment.c.collecting information about an organization's technical architecture.d.All of the above

Answers

The answer to the question is Option (d). The choices listed above are all accurate.

How do you define organization?

An group is a collection of people who interact, such as a firm, homeowners association, charity, or labor. The term "organization" can be used to describe a person, a group, a company, or the process of creating or developing anything.

What are 3 types of organization?

The organisations utilized by the majority of organizations today can be divided into three types functional, departmental, and matrix. Before choosing which of these forms to use for their company, owners must assess the benefits and drawbacks of each.

To know more about organization visit :

brainly.com/question/12825206

#SPJ4

Effective planning for information security involves collecting information about an organization's objectives, collecting information about an organization's information security environment, and collecting information about an organization's technical architecture.

Thus option D is correct.

Here,

1. Collecting information about an organization's objectives:

In order to effectively plan for information security, it is important to understand the goals and objectives of the organization. This includes understanding what the organization wants to achieve, its priorities, and its long-term plans.

2. Collecting information about an organization's information security environment:

Understanding the information security environment of an organization is crucial for effective planning. This includes assessing the current security measures in place, identifying any vulnerabilities or weaknesses, and evaluating the overall security posture of the organization.

3. Collecting information about an organization's technical architecture:

The technical architecture of an organization refers to the infrastructure, systems, and technologies used to support its operations. This includes hardware, software, networks, and data storage systems.

Collecting information about the technical architecture is essential for planning information security because it allows organizations to assess the security controls in place, identify any gaps or vulnerabilities in the infrastructure, and determine the best strategies to protect critical assets and data.

Therefore, effective planning for information security involves collecting information about an organization's objectives, information security environment, and technical architecture.

Thus option D is correct.

Know more about effective planning,

https://brainly.com/question/11228483

#SPJ6

Which of the following is not a valid SQL clause?
TOP
ORDER BY
WHERE
-BOTTOM

Answers

The "-BOTTOM" clause is not a valid SQL clause. The correct keyword is "BOTTOM" without the minus sign. The "TOP" clause is used in SQL to specify the number of rows or percentage of rows to be returned.

from a query result. It is commonly used in combination with the "SELECT" statement.

The "ORDER BY" clause is used to sort the result of a query in ascending or descending order based on one or more columns.

The "WHERE" clause is used to filter rows based on specified conditions. It allows you to specify criteria to select only the rows that meet the given conditions.

However, "-BOTTOM" is not a recognized SQL clause. If you intended to specify the last few rows in a result set, you could use the "ORDER BY" clause with "DESC" (descending order) and limit the number of rows using the "TOP" clause or equivalent syntax provided by the specific database system.

Learn  more about  SQL    here:

https://brainly.com/question/31663284

#SPJ11

5.
1 point
*
*
dog#
Choose
This is a required question

Answers

Answer:

WHAT IS YOUR QUESTION ⁉️⁉️

SO I CAN HELP YOU

BECAUSE I APPLIED IN BRAINLER HELPER

What is 1 of the rules for naming variables?

Answers

Answer:

Rules for Naming VariablesThe first character must be a letter or an underscore (_). You can't use a number as the first character. The rest of the variable name can include any letter, any number, or the underscore. You can't use any other characters, including spaces, symbols, and punctuation marks.

#Markasbrainlessplease

Help immediately!!!

How do you think mobile sites have affected the development of businesses?

- Have they helped?

- Would businesses be better off without them?

- What do mobile sites offer businesses that they do not have otherwise?


Please provide 3 emerging issues for websites. (one sentence)

Please provide 3 trends for websites. (one sentence)

Which issue do you think affects websites the most & which trend do you like the most?

Answers

Answer:

It takes away in-person stores sales

Explanation:
now a days, people are always online shopping since they don’t have to leave the comfort of their homes, this effects in person businesses because they loose costumers and money because everyone is going online, that’s why a lot of people make online stores.

They would do better off because now people don’t want to get their butt up and drive to a store! Didn’t have time to answer it all, but I hope this helps you!

When using a windows internet browser, pressing _____ reloads a page.
a. f7
b. f3
c. f1
d. f5

Answers

When using a windows internet browser, pressing option d. f5 helps to reloads a page.

What is function F5?

The function F5 is known to be used in computing and it is one that is used for all forms of  modern Internet browsers.

Note that if a person is said to be pressing F5, the page will reload or it will help to refresh the said document window or the page.

Therefore, based on the above, one can say that when using a windows internet browser, pressing option d. f5 helps to reloads a page.

Learn more about windows internet browser from

https://brainly.com/question/22650550
#SPJ1

Telecommunications, Bridges, Power and energy, combine them to form one sentece

Answers

The combined sentence is given below

In the world today, the use of Telecommunications is acting as Bridges between the old and the new,  there are new innovations in the are of Power and energy,

Describe what telecommunication is?

Information is transmitted electronically over distances through telecommunications. The data could take the shape of voice calls, data, text, photos, or video. These days, telecommunications are utilized to connect relatively far-flung computer systems into networks.

Therefore, one can say that by altering sentence structure, sentence combining "smooths out" rough writing and makes a piece of writing more interesting for the reader. Simply connecting words with a conjunction such as seen above.

Learn more about Telecommunications  from

https://brainly.com/question/26152499
#SPJ1

Describe the indicators and hazards of a metal deck roof fire in an unprotected steel joist warehouse as well as the techniques to deal with the problem.

Answers

Answer:

Explanation:

Joist mansory building is a type of building with the exterior wall of mansory, which is capable of withstanding combustion or fire for nothing less than an hour.

Therefore, the best method to deal with fire is to build with materials that are fire resistant.

Based on the information given, it's vital to make the construction with materials that are fire resistant.

Within the fire service, building construction can simply be defined as the study of how buildings can be put together. It's also how materials and connections are used.

From the information given, it's stated that the metal deck roof is in an unprotected steel joist warehouse. Therefore, in order to prevent hazard, it's important to make the construction with materials that are fire-resistant.

Read related link on:

https://brainly.com/question/17050293

Choose the correct answer
1. Which of the variable names given below, is invalid?
O Goodluck
O
d2420
O input
O Abcd

Answers

not valid bro so u check again

Can somoene explain the function of-

def __init__():

In python programming language​

Answers

Answer:

def is a keyword used to define a function, placed before a function name provided by the user to create a user-defined function

__init__ is one of the reserved methods in Python. In object oriented programming, it is known as a constructor. Python will call the __init__() method automatically when you create a new object of a class, you can use the __init__() method to initialize the object’s attributes.

Example code:

class Person:

 def __init__(self, name, age):

   self.name = name

   self.age = age

p1 = Person("John", 36)

print(p1.name)

print(p1.age)

Summary

Use the __init__() method to initialize the instance attributes of an object. The __init__() doesn’t create an object but is automatically called after the object is created.

Why is it important to use the correct fingers when typing?

Answers

Explanation:

Typing quickly and accurately with correct finger placement involves building up some muscle memory in your hands, so they feel comfortable reaching for keys in sequence and the movements become automatic.

Answer:

It's important to use the correct fingers when typing to build a habit of quicker and proper typing. It can also make you more comfortable with speed-typing.

In what way, if any, are problems related to conflicts?
O Conflicts and problems are two completely different things.
O Most conflicts concern ideas, but problems concern people.
O Some problems involve conflict, but not all do.
O Problems and conflicts are the same thing.

Answers

The answer is C Some problems involve conflict, but not all do.

Conflicts and problems are related, but they are not the same thing. Conflicts can arise from problems, but not all problems involve conflict. For example, a problem could be a technical issue with a product, while a conflict could be a disagreement between two people. However, some problems can involve conflict, such as a dispute over how to solve a problem or a disagreement over who is responsible for a problem.

What function or service prevents an Internet host from accessing servers on the LAN without authorization?

Answers

The firewall service is used to prevent an Internet host from accessing servers on the LAN without authorization.

Firewall service refers to a security mechanism that controls access to a network or computer resource by screening all inbound and outbound network traffic, allowing only authorized traffic, and blocking any traffic that does not meet the specified security rules.Firewall service is an essential part of network security infrastructure that can help prevent unauthorized access to network resources such as files, printers, databases, and applications.

Firewalls can be software, hardware, or a combination of both. Firewalls work by monitoring network traffic and filtering out any traffic that does not meet the specified security rules and policies.Furthermore, a firewall provides protection against various types of attacks such as port scanning, denial-of-service attacks, and malware. It is also used to create secure VPN tunnels for remote users and to limit access to sensitive data.

Overall, the firewall service is a critical security function that protects LAN servers and other network resources from unauthorized access, thereby ensuring the confidentiality, integrity, and availability of network data.

Learn more about LAN here,

https://brainly.com/question/8118353

#SPJ11

Explain why computer professionals are engaged in technical services

Answers

Answer: It's probably because they love computers and they know what they are doing. Also they can write specs for new computers.

Explanation: Hope this helps.

How do you reset a g.mail password?

Answers

Answer:

put: forgot password to reset it

Answer:

Change your pass word

Open your Go ogle Account. You might need to sign in.

Under "Security," select Signing in to G oo gle.

Choose Password. You might need to sign in again.

Enter your new password, then select Change Password.

In Scratch, what term refers to a message that gets passed along and causes an action to happen?
broadcast
mechanical
trigger
variability

Answers

Answer:

Broadcast

In scratch, let's use a block and a message as our example, when I receive and broadcast.

So you would put your syntax like this,

When green flag clicked

broadcast message1

 When I receive message1

 say Hello World!

Answer:

your answer is A. Broad cast

Explanation:

What should a vessel operator do to keep a proper lookout

Answers

The thing that a vessel operator should do to keep a proper lookout is to Regularly scan the horizon .

What Does an Operator of a Vessel Do?

A vessel operator is in charge of managing a variety of shipboard activities, which includes the personnel management, payments, as ell as paperwork.

It should be noted that he should be able to Regularly scan the horizon,Providing vital marine services all over the world, vessel operations  can be seen as one of the important workboat sector and a rising portion of the merchant marine fleet and they are employed by the coastal network of ports that run along the coasts, outlying islands, and territories.

Learn more about vessel operator at:

https://brainly.com/question/30262742

#SPJ1

Final answer:

To keep a proper lookout while operating a vessel, a student should constantly scan the surrounding area, use available resources, and communicate effectively with other vessels.

Explanation:

To keep a proper lookout while operating a vessel, there are several important steps to follow:

Scan the surrounding area constantly to detect other vessels, objects, or hazards.Use all available resources such as radar, charts, and navigation aids to gather information about the course, speed, and intentions of other vessels.Communicate clearly and effectively with other vessels to establish right-of-way, avoid collisions, and navigate safely.

By following these steps, a vessel operator can maintain situational awareness and prevent accidents or collisions on the water.

Learn more about Keeping a proper lookout while operating a vessel here:

https://brainly.com/question/32213116

When is the possibility of solar weather affecting terrestrial weather the highest?(1 point)

during solar minimum
during solar minimum

during the solar cycle
during the solar cycle

during solar maximum
during solar maximum

during Total Solar Irradiance
during Total Solar Irradiance

Answers

The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Does solar weather have an effect on terrestrial weather?

There are different forms of weather on Earth, this is one that ranges from the surface of the planet out unto the outer space.

Note that Space weather as well as terrestrial weather are known to be influenced by the little  alterations that the Sun undergoes during its solar cycle.

Hence, The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Learn more about solar weather from

https://brainly.com/question/15279276

#SPJ1

How to Force Quit an Application on a Windows 10 PC ?

Answers

To force quit an application on a Windows 10 PC, you can follow these steps:

The Steps

Press the "Ctrl," "Alt," and "Delete" keys simultaneously on your keyboard. This will bring up the Windows Security screen.

Click on "Task Manager" from the options provided. This will open the Task Manager window.

In the Task Manager window, click on the "Processes" tab.

Locate the application you want to force quit in the list of processes. You may need to scroll down to find it.

Select the application by clicking on it once.

Click on the "End Task" button at the bottom right corner of the Task Manager window.

A dialog box will appear asking if you want to end the task. Click on "End Task" again to confirm.

The application will now be forced quit, and you can close the Task Manager window.

Read more about Windows OS here:

https://brainly.com/question/29239021

#SPJ1

assume planets is an arraylist of strings and it currently contains several elements. also assume a string variable named first has been declared. write a statement that will assign the first element of the arraylist to the first variable. planets[0]

Answers

Use the get (index) method to obtain the first element of an array list by specifying index = 0. Utilize the get (index) method to obtain the last element of an array list by passing index = size – 1.

What assign first element array list to the first variable?

The element of the current Array List object at the provided index is returned by the get() function of the Array List class, which accepts an integer indicating the index value. As a result, if you supply 0 or list to this method, you can obtain the first element of the current Array List.

Therefore, The first item in an array is indexed as 0 when using zero-based array indexing, while the first item in an array using one-based array indexing is indexed as 1.

Learn more about array list here:

https://brainly.com/question/29309602

#SPJ1

how many different strings can be formed from the word yellowwood?

Answers

There are 3,628,800 different strings that can be formed from the word YELLOWWOOD.

To find the number of different strings that can be formed from the word YELLOWWOOD, we need to count the number of arrangements of the 10 letters. We can use the formula for permutations of n objects taken r at a time, which is: P(n,r) = n!/(n-r)!

where n is the total number of objects, and r is the number of objects we are selecting.For the word YELLOWWOOD, there are 10 letters in total, so n = 10.

To find the number of different strings that can be formed, we need to count all possible arrangements of the 10 letters.

So we want to find P(10,10), which is: P(10,10) = 10!/(10-10)! = 10!/0! = 10 x 9 x 8 x 7 x 6 x 5 x 4 x 3 x 2 x 1 = 3,628,800

Therefore, there are 3,628,800 different strings that can be formed from the word YELLOWWOOD.

Learn more about permutations at

https://brainly.com/question/15023364

#SPJ11

write a paragraph about ICT in personal life?

Answers

Answer:

Information and communications technology (ICT) is an extensional term for information technology (IT) that stresses the role of unified communications[1] and the integration of telecommunications (telephone lines and wireless signals) and computers, as well as necessary enterprise software, middleware, storage and audiovisual systems, that enable users to access, store, transmit, and manipulate information.

4. question 4 what is the largest perimeter of a shape made from the shapes in files dataset1.txt, dataset2.txt, dataset3.txt, dataset4.txt, dataset5.txt, and dataset6.txt (truncate your answer to two decimal places)?

Answers

The form will have a 30 perimeter. The greatest perimeter of a shape generated from shapes in files is 64.

What does 'truncate the data' mean?

By reallocating the data pages used to store the table data, TRUNCATE Database removes the data from the table and simply logs the page deallocations in the transaction log. Typically, fewer locks are employed. Each row in the table is locked for deletion when a row lock is used in the DELETE statement.

In programming, what does truncating mean?

Truncate, also known as prune or trim, is the process of shortening information by deleting material at the conclusion. Truncation may occur unintentionally or on purpose. To save memory or make the representation of a numerical value simpler, data may be purposefully shortened, for instance.

To know more about perimeter visit :-

https://brainly.com/question/26611855

#SPJ4

technician a says that some networks contain terminators located at both ends of the network. technician b says terminators are usually positioned inside some of the network computers. who is correct?

Answers

Based on the information, Technician B is mistaken, but Technician A is right.

Whuch technician is correct?

In computer networking, a terminator is a component that stops signals from reflecting at a transmission line's termination.

Terminators are not typically placed inside some of the network computers, as claimed by technician B. Network computers do not often contain terminators. Instead, they are typically located at the termination of the transmission line, which could be a port on a hub, switch, or router or the actual physical end of a cable.

As a result, Technician A is true that some networks contain terminators at both ends of the network, but Technician B is incorrect when they claim that some network computers also contain terminators.

Learn more about technician on

https://brainly.com/question/18428188

#SPJ1

in software efficiency analysis, resource usage directly depends on the data structures and memory management. true or false

Answers

The given statement "In software efficiency analysis, resource usage directly depends on the data structures and memory management." is true.

Data structures and memory management play a vital role in the efficiency and effectiveness of software execution, as they have a direct effect on the speed of memory access and the level of resource utilization. For example, the use of an inefficient data structure to store information can lead to high levels of unnecessary memory usage while maintaining complex data or caching can increase resource efficiency. Similarly, the use of poor memory management techniques can lead to a lack of efficiency when it comes to memory allocation and reallocation. This can lead to increased memory consumption and longer program execution times.

Therefore, the given statement is true.

Learn more about the data structures here:

https://brainly.com/question/32132541.

#SPJ4

Other Questions
true or false?those with anxiety and OCD are often hospitalized Cheese fries or Home fries how do you convert 7/6 into a mixed number or how do you covert fractions into a number in general. A proton accelerates from rest in a uniform electric field of 610 NC At one later moment, its speed is 1.60 Mnys (nonrelativistic because is much less than the speed of light) (a) Find the acceleration of the proton(b) Over what time interval does the proton reach this speed ?(c) How far does it move in this time interval?(d) What is its kinetic energy at the end of this interval? Consider the following financial data for an investment project:.Required capital investment at n = 0: $200,000Project service life: 5 yearsSalvage value at the end of 5 years: $50,000Depreciation method for tax purposes: 5-year MARSAnnual revenue: $300,000Annual O&M expenses (not including depreciation and interest): $180,000The income tax rate to use: 40%What is the net income at the end of Year 3? (round to the nearest dollar, omit $ and ,)What is the net cash flow at the end of Year 3? (round to the nearest dollar, omit $ and ,) when does the axillary artery change its name to brachial artery? why is this an appropriate name change? Suppose SAT critical reading scores are normally distributed with a mean of 404 and a standard deviation of 84. A university plans to recruit students whose scores are in the 90th percentile. What is the minimum score required for recruitment? CAN ANYONE HELP ME I DONT GET THIS WORK?? ANSWER QUICK When people first think of pollution, which items come to mind? A smoke stacks B oil spills C dirty air, water, and land D all of the above Electric charges are either positive or ____ Do you see any grounds for compromise between supporters and opponents of slavery expansion? Write two expressions that are equivalent to the expression below. (9- c) +(9 -c)+(9- c) +(9- c) Determine the slope of the line that contains the given points. X(0,2), Y(-3,-4) help please. will mark brainliest The measure of one side of a square is parentheses X +3 in parentheses inches long which pair of expressions both represent the perimeter of a square S. (Fahrenheit 451) Why is it ironic that Mildred sees no value in reading since "Books aren't people"? A. The books are more valuable than people. B. Her 'family' members are not real people, but she feels a connection to them. C. The books can bring people together, forming connections. D. Mildred does not know how to read. solve assuming a linear equation fits the situation. the value of a computer is $3500. after 2 years the value of the computer is $2200. find the value of the computer after 5 years Why did peter walks on water? under the taxpayer relief act of 1997, a buyer can use up to how much of their ira fund towards a down payment, without being subject to an early withdrawal penalty...? Which statement describes the narrator's reaction when Father Terry's dog is put down against hiswill in paragraph 89?A.B.C.OUTRAGE" (Paragraph 76)D.He is sympathetic but does nothing to stop the dog from being put down.He is indifferent towards Father Terry's distress and helps put the dog down.He is upset with Father Terry and his reluctance to put down his dog for everyone'ssafety.He is ashamed of his actions as he realizes that he has gone too far.