In order to make schemas that will appear in the Schema Library available in the XML Options dialog box, what file extension should a user give to schemas?

--.xml
--.xsl
--.xslt
--.xsd

Answers

Answer 1

Answer:

You can use your XML parser

Explanation:

hope this helps!


Related Questions

Create a Python script that takes two parameters to do the following:-
1) List all files names, size, date created in the given folder
2) Parameter1 = Root Folder name
Parameter2= File size >>> to filter file size ( you can do =, > or <) it is up to you, or a range.
The script should check and validate the folder name, and the size
The script should loop until find all files greater than the specified size in all the sub-folders
3) Use catch-exception block (Make sure that the error messages do not reveal any of the application code)
4) Optionally, you can save the list into a file "Results.txt" using the redirection operator or by creating the file in the script.

Answers

Answer:

import sys, time

from os import walk, remove

from os.path import exists, join, getsize, getctime

file_counter = [ ]

folder_name, file_size = argv

isExist = exists( folder_name )

if folder_name == True:

    for root, folder, files in walk( folder_name ):

          for file in files:

               if getsize( join ( root, file ) ) >= file_size:

                   file_log = [ ]

                   file_log.append( file )

                   file_log.append( join ( root, file) )

                   file_log.append( time.ctime( getctime( file ) ) )

                   file_counter.append( file_log )

               else:

                   remove ( join ( root, file ) )

Explanation:

The python script above output the filename, size and file creation date of any folder passed to it.

Which keys can you use to delete
a WordArt?
Answer the following question​

Answers

Answer:

Ctrl + Delete, thats it

Explanation:

i think, ?

Which statement best illustrates how Herman Hollerith's counting machine
was a precursor to today's modern programming?
A. Today's programming languages are all used to count objects the
way Hollerith's machine did.
B. The size of the machine determined how many instructions it
could understand.
C. Today's programming languages are much more advanced than
Hollerith's machine.
D. The location of the holes on the punch cards represented different
numbers and details.
SUBMIT

Answers

Herman Hollerith is considered to be a forerunner of modern programming technology because today's programming includes aspects developed by Herman Hollerith (option A).

Who was Herman Hollerith?

Herman Hollerith (1860-1929) was an American inventor who was noted for having developed an electromagnetic punched card tabulator to aid in data collection and analysis.

His tabulating machine is one of the most important inventions in data processing because it uses electromagnetic programming that has influenced the development of the most modern machines.

Learn more about Herman Hollerith in: https://brainly.com/question/24417344

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:

Sir Tim Berners-Lee wrote the three fundamentals for the Web. What are these three fundamentals? Choose the answer. OO HTMT, IP, URL (or URI) HTML, HTTP, URR HTTP, HTML, IP HTML, HTTP, URL (or URI)​

Answers

Answer:

HTML, HTTP, and URI/URI

Explanation:

In 1990, Berners-Lee developed three fundamental technologies: HTML, HTTP, and URI/URL; which remain the core of the web as we know it today.

Hope it helped! :)

Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT

Answers

Answer: C. Executive information system

Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.

An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.

Given that,

Most useful information about determining what direction to go in the next two years.

Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.

It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.

This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.

EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.

So, the correct option is,

C. Executive information system

To learn more about Executive information systems visit:

https://brainly.com/question/16665679

#SPJ6

where in system settings can you find which version of Windows is installed on your computer?​

Answers

Answer:

Select the Start button > Settings > System > About . Under Device specifications > System type, see if you're running a 32-bit or 64-bit version of Windows. Under Windows specifications, check which edition and version of Windows your device is running.

Explanation:

brainliest pls

what are the five generation of computer hardware​

Answers

Answer:

First Generation: Vacuum Tubes.

Second Generation: Transistors.

Third Generation: Integrated Circuits.

Fourth Generation: Microprocessors.

Fifth Generation: Artificial Intelligence.

Which of the following would be considered unethical for a programmer to do? (5 points)

Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission

Answers

One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues

Why would this be unethical for a programmer ?

Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.

Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.

Find out more on programmers at https://brainly.com/question/13341308

#SPJ1

4-14. The article mentions that Peloton released a new treadmill exercise platform to accompany its stationary bike product. What recommendation would you give to the company to increase sales of both products, especially since they are so expensive?

Answers

In order to draw in a wider audience of clients, Peloton should increase the variety of workout classes available on their website. This can entail introducing more challenging courses like HIIT.

What is HIIT?

A training method known as high-intensity interval training involves alternating quick bursts of severe or explosive anaerobic exercise with quick rest intervals till exhaustion.

Exercises are performed in HIIT in short, repetitive bursts of maximum or almost maximal effort, followed by periods of rest or low activity.

Due to the body's large recruitment of anaerobic energy systems, the activity differs from aerobic activity in terms of intensity, interval length, and number of bouts.

Hence, "the anaerobic energy release mechanism virtually maximally" is relied upon by the approach. HIIT exercises enhance glucose metabolism while also enhancing athletic performance. The intensity of the high-intensity workout should be close to maximal.

Learn ore about HIIT, here

https://brainly.com/question/26524818

#SPJ1

Which search strategy is most similar to greedy search?

A.
depth-first search
B.
breadth-first search
C.
bidirectional search
D.
uniform-cost search

Answers

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

convert 423 from base 5 to base 3
(show work)

Answers

To convert 423 from base 5 to base 3:

423 (base 5) = 11121 (base 3)

To convert the number 423 from base 5 to base 3, follow these step-by-step explanations:

Step 1: Write down the number in base 5.

423 (base 5)

Step 2: Convert the number from base 5 to base 10.

4 * 5^2 + 2 * 5^1 + 3 * 5^0

= 4 * 25 + 2 * 5 + 3 * 1

= 100 + 10 + 3

= 113 (base 10)

Step 3: Convert the number from base 10 to base 3.

To convert from base 10 to base 3, divide the number repeatedly by 3 and record the remainders.

113 ÷ 3 = 37 with a remainder of 2

37 ÷ 3 = 12 with a remainder of 1

12 ÷ 3 = 4 with a remainder of 0

4 ÷ 3 = 1 with a remainder of 1

1 ÷ 3 = 0 with a remainder of 1

Reading the remainders in reverse order gives us the base 3 representation.

The number 423 (base 5) is equal to 11121 (base 3).

Therefore, 423 (base 5) is equivalent to 11121 (base 3).

For more such question on base

https://brainly.com/question/9624014

#SPJ8

Given the following pseudocode:

Class Coordinate
Private Real _x
Private Real _y

Public Module set_x(Real value)
Set _x = value
End Module

Public Module set_y(Real value)
Set _y = value
End Module

Public Function get_x()
Return _x
End Module

Public Function get_y()
Return _y
End Module

Public Module add(Coordinate c)
Set _x = _x + c.get_x()
Set _y = _y + c.get_y()
End Module
End Class

Module main()
Declare Coordinate c1 = New Coordinate()
Declare Coordinate c2 = New Coordinate()

Call c1.set_x(1.0)
Call c1.set_y(2.0)
Call c2.set_x(3.0)
Call c2.set_y(4.0)

Display c1.get_x(), c1.get_y(), c2.get_x(), c2.get_y()

Call c1.add(c2)

Display c1.get_x(), c1.get_y(), c2.get_x(), c2.get_y()
End Module
What will be the output when the main() module is called? Separate each answer with a single space.

Answers

Hello um are you still in this question this question is so big lol dbdhxhdbxhxbxhdx

Insertion sort in java code. I need java program to output this print out exact, please. The output comparisons: 7 is what I am having issue with it is printing the wrong amount.
When the input is:

6 3 2 1 5 9 8

the output is:

3 2 1 5 9 8

2 3 1 5 9 8
1 2 3 5 9 8
1 2 3 5 9 8
1 2 3 5 9 8
1 2 3 5 8 9

comparisons: 7
swaps: 4
Here are the steps that are need in order to accomplish this.
The program has four steps:

1 Read the size of an integer array, followed by the elements of the array (no duplicates).
2 Output the array.
3 Perform an insertion sort on the array.
4 Output the number of comparisons and swaps performed.
main() performs steps 1 and 2.

Implement step 3 based on the insertion sort algorithm in the book. Modify insertionSort() to:

Count the number of comparisons performed.
Count the number of swaps performed.
Output the array during each iteration of the outside loop.
Complete main() to perform step 4, according to the format shown in the example below.

Hints: In order to count comparisons and swaps, modify the while loop in insertionSort(). Use static variables for comparisons and swaps.

The program provides three helper methods:

// Read and return an array of integers.
// The first integer read is number of integers that follow.
int[] readNums()

// Print the numbers in the array, separated by spaces
// (No space or newline before the first number or after the last.)
void printNums(int[] nums)

// Exchange nums[j] and nums[k].
void swap(int[] nums, int j, int k)

Answers

Answer:

Explanation:

public class InsertionSort {

   static int numComparisons;

   static int numSwaps;

   public static void insertionSort(int[] nums) {

       for (int i = 1; i < nums.length; i++) {

           int j = i;

           while (j > 0 && nums[j] < nums[j - 1]) {

               swap(nums, j, j - 1);

               j--;

           }

           numComparisons++;

           printNums(nums);

       }

   }

   public static void main(String[] args) {

       int[] nums = readNums();

       printNums(nums);

       insertionSort(nums);

       System.out.println("comparisons: " + numComparisons);

       System.out.println("swaps: " + numSwaps);

   }

   public static int[] readNums() {

       Scanner scanner = new Scanner(System.in);

       int count = scanner.nextInt();

       int[] nums = new int[count];

       for (int i = 0; i < count; i++) {

           nums[i] = scanner.nextInt();

       }

       scanner.close();

       return nums;

   }

   public static void printNums(int[] nums) {

       for (int i = 0; i < nums.length; i++) {

           System.out.print(nums[i]);

           if (i < nums.length - 1) {

               System.out.print(" ");

           }

       }

       System.out.println();

   }

   public static void swap(int[] nums, int j, int k) {

       int temp = nums[j];

       nums[j] = nums[k];

       nums[k] = temp;

       numSwaps++;

   }

}

Draw a third domain model class diagram that assumes a listing might have multiple owners. Additionally, a listing might be shared by two or more agents, and the percentage of the com- mission that cach agent gets from the sale can be different for cach agent

Answers

The required  third domain model class diagram is attached accordingly.

What is the explanation of the diagram?

The third domain model class diagram represents a system where a listing can have multiple owners and can be shared by multiple agents.

Each agent may receive a different percentage of the commission from the sale.

The key elements in this diagram include Author, Library, Book, Account, and Patron. This model allows for more flexibility in managing listings, ownership, and commission distribution within the system.

Learn more about domain model:
https://brainly.com/question/32249278
#SPJ1

Draw a third domain model class diagram that assumes a listing might have multiple owners. Additionally,

Drag each tile to the correct box.
Match the job title to its primary function.
computer system engineer
online help desk technician
document management specialist
design and implement systems for data storage
data scientist
analyze unstructured, complex information to find patterns
implement solutions for high-level technology issues
provide remote support to users

Answers

The correct match for each job title to its primary function:

Computer System Engineer: Design and implement systems for data storage.

Online Help Desk Technician: Provide remote support to users.

Document Management Specialist: Implement solutions for high-level technology issues.

Data Scientist: Analyze unstructured, complex information to find patterns.

Who is a System Engineer?

The key responsibility of a computer system engineer is to develop and execute data storage systems. Their main concentration is on developing dependable and effective storage options that fulfill the company's requirements.

The primary duty of an online help desk specialist is to offer remote assistance to users, addressing their technical concerns and resolving troubleshooting queries.

The main responsibility of a specialist in document management is to introduce effective measures to address intricate technological matters pertaining to document security, organization, and retrieval.

Read more about data scientists here:

https://brainly.com/question/13104055

#SPJ1

Array Basics pls help

Array Basics pls help

Answers

Answer:

import java.util.Random;

class Main {

 static int[] createRandomArray(int nrElements) {

   Random rd = new Random();

   int[] arr = new int[nrElements];

   for (int i = 0; i < arr.length; i++) {

     arr[i] = rd.nextInt(1000);

   }

   return arr;

 }

 static void printArray(int[] arr) {

   for (int i = 0; i < arr.length; i++) {

     System.out.println(arr[i]);

   }

 }

 public static void main(String[] args) {

   int[] arr = createRandomArray(5);

   printArray(arr);

 }

}

Explanation:

I've separated the array creation and print loop into separate class methods. They are marked as static, so you don't have to instantiate an object of this class type.

For questions 5-8, consider the following code:



def mystery(a = 2, b = 1, c = 3):

return 2 * a + b + 3 * c

What is the output for mystery(4, 3, 7)?

What is the output for mystery(5, 8)?

What is the output for mystery(1)?

What is the output for mystery()?

Answers

Answer:

les go, it has optional parameters so...

Explanation:

output of 1 is 32

second 27

third 12

fourth 14

is pseudocode obtained from Algorithm or is Algorithm obtained from pseudocode?

Answers

Answer:

An algorithm is defined as a well-defined sequence of steps that provides a solution for a given problem, whereas a pseudocode is one of the methods that can be used to represent an algorithm.

hope this gives you at least an idea of the answer:)

FILL IN THE BLANK Claudette is a developer working for a software company that uses JIRA, a PLM product. Claudette knows that using JIRA benefits her organization because _____.

Answers

Developer Claudette works for a software firm that use JIRA, a PLM solution. Because higher management may use JIRA to track project progress and make strategic decisions, Claudette is aware that utilizing it is advantageous to her company.

Use Jira among programmers?

Throughout the whole development lifecycle, software development teams use Jira Software. This manual is intended for developers joining an active Jira Software project.

What does a Jira developer do?

You construct dashboards for JIRA Connect add-ons, define custom fields, support JIRA configurations that take into account all client requirements, build and deploy servers and apps, develop plugins to enhance JIRA capabilities, create custom preset filters, test results, and find bugs.

To know more about software firm visit :-

https://brainly.com/question/15712126

#SPJ4

How technology works?

Answers

First of all, technology refers to the use of technical and scientific knowledge to create, monitor, and design machinery. Also, technology helps in making other goods.

If you define CSS rules on a parent control, the rules will be inherited by all of the children widgets.
A. True
B. False

Answers

Answer:

TRUE

Explanation:

aya what's the full form of JPEG ?​

Answers

Hi!jpeg stands for "Joint Photographic Experts Group."

Answer:

"Joint Photographic Experts Group",

Explanation:

JPG is a digital image format which contains compressed image data. With a 10:1 compression ratio JPG images are very compact. JPG format contains important image details. This format is the most popular image format for sharing photos and other images on the internet and between Mobile and PC users.

After turning volume all the way up on your computer speaker you still can’t hear any sound. What should be done next

Answers

Answer:

check to see if you have headphones or snything plug in to it that might take the sound if not try restarting your computer, or your speakers are broken with water damage or over use

Explanation:

In Python what are the values passed into functions as input called?

Answers

formal parameter or actual parameter i think

What are some current and future trends for network technology? Check all of the boxes that apply. an increase in the number and types of devices an increase in the people who will not want to use the network an increase in the number and types of applications an increase in the use of wired phones an increase in the use of the cloud

Answers

Answer: A,C,E

Source: trust me bro

different between input and output device​

Answers

Answer:

An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Explanation:

There Are Two Programs in this Question who will attempt first i will give brainliest ans reward and big points:-
Question no 1:-
Consider a base class named Employee and its derived classes HourlyEmployee and PermanentEmployee while taking into account the following criteria.
 Employee class has two data fields i.e. a name (of type string) and specific empID (of type integer)
 Both classes (HourlyEmployee and PermanentEmployee) have an attribute named hourlyIncome
 Both classes (HourlyEmployee and PermanentEmployee) have three-argument constructor to initialize the hourlyIncome as well as data fields of the base class
 Class HourlyEmployee has a function named calculate_the_hourly_income to calculate
the income of an employee for the actual number of hours he or she worked. One hour income is Rs. 150
 Similarly, PermanentEmployee class has function named calculate_the_income to calculate the income of an employee that gets paid the salary for exact 240 hours, no matter how many actual hours he or she worked. Again, one hour salary is Rs. 150.
Implement all class definitions with their respective constructors to initialize all data members and functions to compute the total income of an employee. In the main() function, create an instance of both classes (i.e. HourlyEmployee and PermanentEmployee) and test the working of functions that calculate total income of an employee
Question no 2:-
Consider a class BankAccount that has
 Two attributes i.e. accountID and balance and
 A function named balanceInquiry() to get information about the current amount in the account
Derive two classes from the BankAccount class i.e. CurrentAccount and the SavingsAccount. Both classes (CurrentAccount and SavingsAccount) inherit all attributes/behaviors from the BankAccount class. In addition, followings are required to be the part of both classes
 Appropriate constructors to initialize data fields of base class
 A function named amountWithdrawn(amount) to withdraw certain amount while taken into account the following conditions
o While withdrawing from current account, the minimum balance should not decrease Rs. 5000
o While withdrawing from savings account, the minimum balance should not decrease Rs. 10,000
 amountDeposit(amount) to deposit amount in the account
In the main() function, create instances of derived classes (i.e. CurrentAccount and SavingsAccount) and invoke their respective functions to test their working

Answers

Answer:

here you go ,could only do Question 2.try posting question 1 seperately maybe someone else can also try to help

Explanation:

Question 2.

#include <iostream>

using namespace std;

// class BankAccount

class BankAccount{

  

    // instance variables

    private:

        int accountID;

        int balance;

  

    public:

      

        // constructor

        BankAccount(int accountID, int balance){

            this->accountID = accountID;

            this->balance = balance;

        }

      

        // getters and setters

        void setAccoutnId(int accountID){

            this->accountID = accountID;

        }

      

        int getAccountId(){

            return accountID;

        }

      

        void setBalance(int balance){

            this->balance = balance;

        }

      

        int balanceInquiry(){

            return balance;

        }

};

class CurrentAccount : public BankAccount{

  

    public:

  

        // constructor

        CurrentAccount(int accountID, int balance):BankAccount(accountID,balance){

          

        }

      

        // function amount to withdraw

        void amountWithdrawn(int amount){

            setBalance(balanceInquiry()-amount);

        }

      

        // function to deposit amount

        void amountDeposit(int amount){

            setBalance(balanceInquiry()+amount);

        }

};

class SavingsAccount : public BankAccount{

  

    public:

      

        // constructor

        SavingsAccount(int accountID, int balance):BankAccount(accountID,balance){

          

        }

  

        // function amount to withdraw

        void amountWithdrawn(int amount){

            setBalance(balanceInquiry()-amount);

        }

      

         // function to deposit amount

        void amountDeposit(int amount){

            setBalance(balanceInquiry()+amount);

        }

      

      

};

int main()

{

    // calling function of Current Account

    cout<<"Current Account : "<<endl;

    CurrentAccount current(122,100000);

    current.amountWithdrawn(10000);

    cout<<"Your balance after withdraw : ";

    cout<<current.balanceInquiry()<<endl;

    current.amountDeposit(30000);

    cout<<"Your balance after deposit : ";

    cout<<current.balanceInquiry()<<endl;

    cout<<endl<<endl;

  

    // calling function of Savings Account

    cout<<"Savings Account : "<<endl;

    SavingsAccount saving(125,80000);

    saving.amountWithdrawn(5000);

    cout<<"Your balance after withdraw : ";

    cout<<saving.balanceInquiry()<<endl;

    saving.amountDeposit(20000);

    cout<<"Your balance after deposit : ";

    cout<<saving.balanceInquiry();

    return 0;

}

What is your favorite tech

A phone b computer

Answers

Answer:

phone

Explanation:

Answer:

A. Phone!

I use it way more often than my computer :)

The following segment of code is meant to remove the even numbers from an ArrayList list and print the results:

int counter = 0;
while(counter < list.size())
{
if(list.get(counter) %2 == 0)
{
list.remove(counter);
}
counter++;
}
System.out.println(list.toString());
The method as written, however, is incorrect. Which ArrayList(s) list would prove that this method was written incorrectly?

I.
[1, 2, 3, 4, 5]
II.
[2, 4, 5, 6, 7]
III.
[2, 4, 6, 8, 10]
IV.
[2, 5, 6, 7, 8]
III only


II and IV


II only


I and IV


II and III

Answers

Answer:

II and III

Explanation:

I took the quiz and got this wrong, but it gives you the answer afterwards, just trying to help everyone else out.

Answer:

II and III

Explanation:

The following segment of code is meant to remove the even numbers from an ArrayList list and print the
Other Questions
"in shakespeare's day, children could determine their own lives and make their own choices" true or false? A fever is a response to a disease-causing agent infecting the body. Raising one's body temperature changes the shape of enzymes in the agent so it cannot reproduce. Which statement best describes a fever? ILL GIVE BRAINLIESAT FOR FIRST ANSWER!Divide31/12 9. Jennifer left the Visitor Center at 3:30 P.M. after spending40 minutes there. At what time did she arrive?10. A football game lasted 2 hours and 37 minutes. It finishedat 4:22 P.M. When did it start?A 1:45 P.M. B 1:55 P.M. C 2:45 P.M. D11. Explain It What is 1 hour and 35 minutes before 4:05 P.M.?Explain how you solved this problem.Type answer here How does the text structure of the persuasive essay correlate to the thesis statement In triangle ABC, mA=23 and mB=33. What is mC? A round loop of wire carries a current of 100 A, has a radius of 10 cm, and its plane makes an angle of 30 with a magnetic field of 0.324 T.1)What is the torque on the loop? (Express your answer to two significant figures.)2)What is the torque on the loop if the angle decreases to 10 ? (Express your answer to two significant figures.)3)What is the torque on the loop if the angle increases to 50 ? (Express your answer to two significant figures.) The vote to leave the European Union was hotly contested. Whatare the benefits of leaving? Will the United Kingdom be better offoutside the bloc? Why has the process of leaving been sochallenging? CAN ANY ONE HELP!!! i hate questions like these what is a astart color #1fab54, start text, a, end text, end color #1fab54 rounded to the nearest tenth? a number line labeled 14 to 15 with tick marks every one tenth unit. point a appears slightly to the left of tick mark 14.4. 14 14 14.1 14.1 14.2 14.2 14.3 14.3 14.4 14.4 14.5 14.5 14.6 14.6 14.7 14.7 14.8 14.8 14.9 14.9 15 15 a a a number line labeled 14 to 15 with tick marks every one tenth unit. point a appears slightly to the left of tick mark 14.4. what is a astart color #1fab54, start text, a, end text, end color #1fab54 rounded to the nearest one? Why do researchers need a lot of data to monitor a species population? Layer 5 of the OSI model is called:1) Session layer2) Application layer3) Transport layer4) Presentation layer A B C D E F G H I J K L M N O P Q R S T U V W X Y Z**If CMYK = 104, OUTPUT = 226 and RAM = 64.What is the value of BITMAP? A ball is falling toward the ground. Which is true? a. The net force acting on it is downward.b. The net force acting on it is upward.c. The net force is zero.d. All forces can add up to any number. We don't have enough information. HELP? ................................................. Carly is making flags for her school's homecoming football game. Each flag requires 0.5 yardsof fabric, and Carly bought 25 yards of fabric.Write an equation that shows how the number of yards remaining, y, depends on the numberof flags Carly has made, x.Ver en e Given the following information, what is the total cost of unused capacity? Cost of material supplied is $3,650; Cost of material used is $3,200; Cost of material used per cake is $3.2; Cost of material supplied per cake is $3.65. Really Need Help please worth 50 points Susie pushes a box to the left while Rod is pushing it to the right T force is shown in the image. What is the net force on the box? 25 N 10 NA. 5NB. 15NC. 25ND. 10N Due to increase in GST the supply of Air conditioner decease from 20 units to 10 units at same price this situation leads to what? which group is credited with the development of monotheism?