Solve the recurrence :
a) T(n) = T(n − 1) + n T(1) = 1
b) T(n) = T(n/2) + 1 T(1) = 1
c) T(n) = 2T(n/2) + n T(1) = 1

Answers

Answer 1

The solution to the recurrence relation is T(n) = Θ(n^log_b(a)) = Θ(n^log_2(2)) = Θ(n^1) = Θ(n).

a) To solve the recurrence T(n) = T(n − 1) + n with T(1) = 1, we can expand the recurrence relation recursively:

T(n) = T(n - 1) + n

= T(n - 2) + (n - 1) + n

= T(n - 3) + (n - 2) + (n - 1) + n

= ...

= T(1) + 2 + 3 + ... + n

Using the formula for the sum of an arithmetic series, we have:

T(n) = 1 + 2 + 3 + ... + n

= n(n + 1)/2

Therefore, the solution to the recurrence relation is T(n) = n(n + 1)/2.

b) To solve the recurrence T(n) = T(n/2) + 1 with T(1) = 1, we can express the recurrence relation in terms of T(1) and repeatedly substitute until we reach the base case:

T(n) = T(n/2) + 1

= T(n/2^2) + 1 + 1

= T(n/2^3) + 1 + 1 + 1

= ...

= T(n/2^k) + k

We continue this process until n/2^k = 1, which gives us k = log2(n).

Therefore, the solution to the recurrence relation is T(n) = T(1) + log2(n) = 1 + log2(n).

c) To solve the recurrence T(n) = 2T(n/2) + n with T(1) = 1, we can use the Master theorem, specifically case 2.

The recurrence has the form T(n) = aT(n/b) + f(n), where a = 2, b = 2, and f(n) = n.

Comparing f(n) = n with n^log_b(a) = n^log_2(2) = n, we see that f(n) falls into case 2 of the Master theorem.

In case 2, if f(n) = Θ(n^c) for some constant c < log_b(a), then the solution to the recurrence is T(n) = Θ(n^log_b(a)).

Since f(n) = n = Θ(n^1), and 1 < log_b(a) = log_2(2) = 1, we can apply case 2 of the Master theorem.

Therefore, the solution to the recurrence relation is T(n) = Θ(n^log_b(a)) = Θ(n^log_2(2)) = Θ(n^1) = Θ(n).

To learn more about recurrence  visit;

https://brainly.com/question/6707055

#SPJ11


Related Questions

T/F: stopping the workstation service affects the computer browser, dfs namespace, netlogon, and remote desktop configuration services.

Answers

It is true that stopping the workstation service affects the computer browser, dfs namespace, netlogon and remote desktop configuration services.

How does stopping the Workstation service impact services?

Stopping the Workstation service does indeed have an impact on several other services. The Computer Browser service relies on the Workstation service to function properly. By stopping the Workstation service, the Computer Browser service will also be affected and may cease to operate as expected.

The DFS Namespace service which is responsible for managing Distributed File System namespaces depends on the Workstation service. Disabling the Workstation service can disrupt the functionality of DFS Namespace.

Read more about workstation

brainly.com/question/29554975

#SPJ4

JAVA Write code that asks for a positive integer n, then prints 3 random integers from 2 to n+2 inclusive using Math. Random().

Note #1: In the starter code for this exercise the line "import testing. Math;" appears. You should not remove this line from your code as it is required to correctly grade your code. Also make sure that your code outputs exactly 3 numbers (be particularly careful there aren't any extra numbers in your prompt for user input).

Note #2: Make sure your minimum output is 2 or more and make sure your maximum output is only up to n + 2 (so if user inputs 5, the maximum output should only be 7). Hint: Knowing your PEMDAS will help a lot.

Sample Run: Enter a positive integer: 6 7 2 5

Answers

The program for the positive integer is illustrated thus:

/*Importing Necessary Classes*/

import java.util.*;

/*Note : Comment This Line Of Code If you Want to Run the Code in your IDE*/

import testing.Math;/*Note : Comment This Line Of Code If you Want to Run the Code in your IDE*/

/*Note : Comment This Line Of Code If you Want to Run the Code in your IDE*/

/*Declaring A Public Class*/

public class Main{

   

   /*Declaring Main Method Execution Starts From Here*/

   public static void main(String[] args){

       

       /*Declaring a startFrom int Variable to Store the starting value*/

       int startFrom = 2;

       

       /*Declaring a endAt int Variable to Store the End Value value*/

       int endAt;

How to illustrate the program?

We first import the necessary classes that will be utilized by the program.

We must now declare the Main class as a public class. Execution begins after declaring a Main Method inside the Public Main Class.

Next, declare an int variable called startFrom to store the starting value.

Next, create an int variable named endAt to store the end value. Next, declare an int variable named randomNumber to hold the random value. Here, creating a Scanner Class object to receive input from the user

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Assume you need to create a presentation on the effects of global warming. Keeping the topic in mind, you need to
focus on certain key guidelines while creating the presentation. In a table, list those appropriate guidelines that you
would follow to create an effective presentation. Your table should have guidelines related to image choices, font
size for the heading and body text, background and text color for the slide, number of bullet points you will use,
and number of words per line. Also, provide your rationale about the choices for these elements.

Answers

Answer:

................................................................................................

Explanation:

Assume you need to create a presentation on the effects of global warming. Keeping the topic in mind,

How do you specify what type the vector will hold?
When declaring it: double bob-vector;
You don't need to specify, C++ will automatically deduce the type when it is used.
Whatever is inside the <> as in vector
By casting all types to be in the vector type.

Answers

When declaring a vector in C++, you can specify what type it will hold by using the template syntax. For example, if you want a vector of integers, you would declare it as follows:

vector myVector;


This tells C++ that myVector will hold integers. You can also use other data types, such as doubles or strings, by replacing "int" with the appropriate type.


It is important to note that you cannot store different data types in the same vector. If you need to store multiple types, you can create a vector of a common base class or use casting to convert all types to a common type before storing them in the vector. However, casting can be tricky and should be used with caution to avoid errors.

To learn more about C++, click here:

https://brainly.com/question/30101710

#SPJ11

Name four factors that are important to consider when selecting hose for an installation.

Answers

Therefore, when selecting a hose for an installation, it is important to consider factors such as material compatibility, pressure rating, temperature range, and size/length. By carefully evaluating these factors, you can choose a hose that meets the specific requirements of the installation and ensures safe and efficient operation.

When selecting a hose for an installation, there are several important factors to consider. Here are four factors that should be taken into account:

1. Material compatibility: It is crucial to choose a hose material that is compatible with the substances it will come into contact with. Different materials may react differently to various chemicals or fluids, so considering the compatibility ensures the hose will not degrade or contaminate the substances being transferred.

2. Pressure rating: The pressure rating of the hose should match or exceed the maximum pressure it will be subjected to in the installation. If the pressure exceeds the hose's rating, it can lead to bursting or leakage, posing safety risks. So, it is important to select a hose that can withstand the expected pressure levels.

3. Temperature range: The temperature at which the hose will operate is an important factor to consider. Hoses have temperature limits, and exceeding these limits can cause them to become brittle, lose flexibility, or even melt. It is crucial to choose a hose that can handle the expected temperature range without compromising its performance.

4. Size and length: The size and length of the hose should be appropriate for the installation. The diameter of the hose determines its flow rate, and choosing the right size ensures efficient fluid transfer. Additionally, selecting the correct length ensures that the hose can reach the necessary connections without excessive stretching or bending, which can lead to damage or reduced flow.

When selecting a hose for an installation, it is important to consider factors such as material compatibility, pressure rating, temperature range, and size/length. By carefully evaluating these factors, you can choose a hose that meets the specific requirements of the installation and ensures safe and efficient operation.

To learn more about brittle visit:

brainly.com/question/31829460

#SPJ11

Which statement of the visualization is incorrect? A) Virtualization works on the desktop, allowing only one operating system(Mac OS, Linux, or Windows) to run on the platform B) A server running virtualization software can create smaller compartments in memory that each behaves like a separate computer with its own operating system and resources C) Virtualization is referred to as the operating system for operating systems D) Virtualization can generate huge savings for firms by increasing the usage of their hardware capacity.

Answers

The incorrect statement is A) Virtualization works on the desktop, allowing only one operating system (Mac OS, Linux, or Windows) to run on the platform. Virtualization on the desktop enables the concurrent execution of multiple operating systems.

Explanation:

A) Virtualization works on the desktop, allowing only one operating system (Mac OS, Linux, or Windows) to run on the platform.

This statement is incorrect because virtualization on the desktop allows multiple operating systems to run concurrently on the same platform. Virtualization software, such as VMware or VirtualBox, enables users to create and run virtual machines (VMs) that can host different operating systems simultaneously, including Mac OS, Linux, and Windows.

B) A server running virtualization software can create smaller compartments in memory that each behaves like a separate computer with its own operating system and resources.

This statement is correct. Virtualization software allows the creation of virtual compartments or containers within a server's memory. Each compartment, known as a virtual machine, can operate independently with its own dedicated operating system and allocated resources.

C) Virtualization is referred to as the operating system for operating systems.

This statement is correct. Virtualization is often referred to as the "operating system for operating systems" because it provides a layer of abstraction and management for multiple operating systems running on the same physical hardware.

D) Virtualization can generate huge savings for firms by increasing the usage of their hardware capacity.

This statement is correct. Virtualization enables efficient utilization of hardware resources by consolidating multiple virtual machines onto a single physical server. This consolidation reduces the need for additional physical servers, leading to cost savings in terms of hardware procurement, maintenance, and power consumption.

To know more about operating system visit :

https://brainly.com/question/29532405

#SPJ11

Write the working principle of a computer and explain it. ​

Answers

Explanation:

The process in which computer takes data as an input , process them and provides the result to the user which is called working principal of computer......

The working principal of computer are :

Input = This is the first step of computer working in which computer takes raw data from the user through input devices such as keyboard, mouse etc and provides in computer understandable form for processing....

Processing = The second step of computer working in which computer's processor ( CPU ) process the data based on predefined set of instructions...

Output = This is the next step of computer in which the computer displays the output as meaningful information through output devices such as monitor , printer etc...

Storage = This is another step of computer working in which the computer stores the processed information permanently on storage device such as hard disk , CD/DVD etc...

Answer:

the working principle of computer are :-

Explanation:

Input = this is the first step of computer working in which come to take raw data from the user through input device such as a keyboard mouse etc and provides in computer understandable form for processing

Process = this is the second step of computer walking in which computers processor CPU processes the input data based on predefined set of instruction .after processing data is send them to aap put device under the supervision of control unit Output = this is the next step of computer walking in the computer display the output at meaningful information through output device such as monitor printer etc .

Storage = this is the another is type of computer working in which the computer is the process information permanently on storage device other hard disk CD DVD etc

the bracing working principle of computer can make clearly from the above given figure ☝️☝️

 Write the working principle of a computer and explain it.

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

Which wireless standard operates in both the 2.4 and 5 GHz ranges and is backwards compatible with all of the previous wireless standards

Answers

Wi-Fi 6/802.11ax is a wireless standard that operates in both the 2.4 and 5 GHz ranges and it's backward compatible with all of the previous wireless standards.

What is Wi-Fi 6/802.11ax?

Wi-Fi 6/802.11ax can be defined as one of the wireless network standards that was designed and developed by the Institute of Electrical and Electronics Engineers (IEEE) to operate on both a 2.4 and 5 GHz microwave bandwidth.

Also, Wi-Fi 6/802.11ax is a wireless standard that was released in late 2019 and early part of 2020.

In conclusion, Wi-Fi 6/802.11ax is designed to be backward compatible with all of the previous wireless standards such as:

Wi-Fi 4/802.11nWi-Fi 3/802.11gWi-Fi 5/802.11ac

Read more on wireless here: https://brainly.com/question/20366069

How do i fix this? ((My computer is on))

How do i fix this? ((My computer is on))

Answers

Answer:

the picture is not clear. there could be many reasons of why this is happening. has your computer had any physical damage recently?

Answer:your computer had a Damage by u get it 101 Battery

and if u want to fix it go to laptop shop and tells him to fix this laptop

Explanation:

What is the additional space complexity of removing an element at the back of a queue with n elements and returning the queue with all other elements in their original order?.

Answers

Dequeue() operations take O(1) time to complete. It will take O(N) time to eliminate N elements from the queue (in total). The time required for one enqueue () operation is O(1). The time required to add N elements to the queue is O(N) (in total).

For a single operation, insertion has an O(1) time complexity and deletion, in the worst case, has an O(n) time complexity. Since it still takes O(n) time to delete n elements from the queue, the amortised costs for both are O(1).

In a balanced binary search tree, the time complexity for a single search is O(log(n)). The difficulty of the question may force you to perform n searches in the binary tree, making it O(nlog(n)) in total. A single search in an unbalanced binary search tree has a worst-case complexity of O. (n).

Learn more about queue:

https://brainly.com/question/24275089

#SPJ4

Samiyah is playing a game that mainly uses black and gray colors. What mood is most likely being portrayed?

A.
joy and happiness

B.
energy and strength

C.
anger and violence

D.
fear and horror

Answers

Answer:     D

Explanation:if u want to go into details we can but its the answer trust me

6. relate how windows server active directory and the configuration of access controls achieve cia for departmental lans, departmental folders, and data.

Answers

To relate how Windows Server Active Directory and the configuration of access controls achieve CIA (Confidentiality, Integrity, and Availability) for departmental LANs, departmental folders, and data, follow these steps:

1. Implement Active Directory (AD): AD is a directory service provided by Windows Server for organizing, managing, and securing resources within a network. It centralizes the management of users, computers, and other resources, ensuring consistent security settings and access controls across the entire environment.

2. Organize resources into Organizational Units (OUs): Within AD, create OUs to represent different departments or functional areas. This allows for the efficient application of security policies and access controls based on departmental requirements.

3. Create user accounts and groups: In AD, create user accounts for each employee and assign them to appropriate departmental groups. This allows for the management of access rights and permissions based on group membership, ensuring that users only have access to the resources required for their roles.

4. Configure access controls: Apply access control lists (ACLs) to departmental LANs, folders, and data. ACLs define the permissions that users or groups have on specific resources, ensuring confidentiality by restricting unauthorized access.

5. Implement Group Policy Objects (GPOs): Use GPOs to enforce security policies and settings across the entire network. This ensures consistent security configurations, such as password policies and software restrictions, contributing to the integrity of the environment.

6. Monitor and audit: Regularly review security logs and reports to identify potential security breaches or unauthorized access attempts. This allows for prompt remediation and ensures the ongoing availability of resources to authorized users.

In summary, Windows Server Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data by centralizing the management of resources, implementing access controls based on user roles, and enforcing consistent security policies across the environment.

Learn more about Windows Server: https://brainly.com/question/30985170

#SPJ11

how many bits are found in 4 bytes​

Answers

Answer:

32 bits = 4 bytes

Explanation:

well its what i know, so it has to be correct, hope i helped

Answer:

32

Explanation:

1 byte = 8 bits

4 x 8 =32

hope this helps

what value determines how much of the current color range falls into the selection when selecting color ranges?

Answers

The magic wand tool is used to choose pixels in a nearby region that have the same or similar colour. The tolerance level of the magic wand tool may be adjusted to decide how close the colors must be.

When the Marquee tool isn't cutting it, use the Lasso tool to choose unusual forms with protrusions and extrusions or plain weird curvatures. There are three types of lassos: the classic Lasso, the Polygonal Lasso, and the Magnetic Lasso. Color and tone tweaks and effects are applied to a selection using the Smart Brush tool. The programmed produces an adjustment layer for non-destructive editing automatically. When we use the Magic Wand to choose areas of comparable hue in an image, we click on the image itself. With Color Range, we use an eyedropper tool to click on the image. With the selection radio button selected, mouse around the little preview area or in your image behind the window to pick the colour. You may next experiment with the quantity of Fuziness to fine-tune the range of comparable colors that should be picked.

Learn more about Smart Brush tool from here;

https://brainly.com/question/10863842

#SPJ4

Radix sort works correctly even if insertion sort is used as its subroutine sort instead of counting sort. O True O False

Answers

It is False. Radix sort relies on the stability of its subroutine sort, and using insertion sort instead of counting sort may lead to incorrect results.

How does radix sort work?

Radix sort relies on the stable sorting property of its subroutine sort to ensure correct sorting. While insertion sort is a comparison-based sorting algorithm and can be used as a subroutine for radix sort, it does not guarantee stability.

Stability is essential in radix sort to preserve the relative order of elements with the same key during each iteration.

Counting sort, on the other hand, is a non-comparison-based sorting algorithm that ensures stability. It counts the occurrences of each key and uses this information to determine the correct position of each element in the sorted sequence.

If insertion sort is used as the subroutine in radix sort instead of counting sort, it may produce incorrect results.

Insertion sort does not inherently maintain stability, and the relative order of elements with the same key may not be preserved, leading to incorrect sorting.

Therefore, to ensure the correctness of radix sort, it is crucial to use a stable sorting algorithm like counting sort as its subroutine.

Learn more about Radix

brainly.com/question/23424908

#SPJ11

What are three tasks that space technology can assist humans with when studying Earth remotely?

Answers

Answer:

Finding life on new planets? Finding new galaxies!! Studying other planets like mars!!!

Explanation:

Please brainliest this!!!

Select the correct answer.
Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?
OA.
inspection
OB
internal audit
Ос.
test review
OD
walkthrough

Answers

Answer:

A.  inspection

Explanation:

To find - Monica, a reviewer, wants to use a formal review for the SQA process. Which review should Monica use for this purpose?

A.  inspection

B . internal audit

C.  test review

D . walkthrough

Proof -

SQA process - Software Quality Assurance process

The correct option is - A.  inspection

Reason -

Formal review in software testing is a review that characterized by documented procedures and requirements. Inspection is the most documented and formal review technique.

The formality of the process is related to factors such as the maturity of the software development process, any legal or regulatory requirements, or the need for an audit trail.

The formal review follows the formal process which consists of six main phases – Planning phase, Kick-off phase, the preparation phase, review meeting phase, rework phase, and follow-up phase.

Answer:

answer:    test review

How can I learn programming in mobile?​

Answers

Answer:

You sadly cannot use your coding knowledge to complete things on mobile, but you can learn through YouTuube and Gooogle and such, and simple type it out in Gooogle docs or something. There are sadly no mobile friendly coding websites.

Hope This Helped!

Will give brainliest!!!

Which of the following defines telehealth?

the practice of using the internet to provide health care without going to a doctor’s office or hospital

the practice of using a fiber inserted in a vein to deliver medicine to a target inside the body

the practice of using telomeres to treat a disease

the practice of using a robot to perform a complicated microscopic surgery

Answers

Answer:It’s the second one

Explanation:

give brainliest plz

Telehealth is the delivery of health-related services and information via the use of electronic information and telecommunications technology.  The correct option is A.

What is Telehealth?

Telehealth is the delivery of health-related services and information via the use of electronic information and telecommunications technology. It enables long-distance interaction between patients and clinicians, as well as care, guidance, reminders, education, intervention, monitoring, and remote admissions.

The statement that best defines telehealth is "the practice of using the internet to provide health care without going to a doctor’s office or hospital".

Hence, the correct option is A.

Learn more about Telehealth:

https://brainly.com/question/22629217

#SPJ2

What kind of animation is used in the powerpuff girls show??

Answers

Calarts? Cartoon I don’t really know but that’s all the information that I have

Which of the following is NOT an example of a game mechanic?

A.
solving a puzzle

B.
shooting a robot

C.
jumping over a building

D.
listening to the game sounds

Answers

An activity which is not an example of a game mechanic include the following: D. listening to the game sounds.

What is game mechanic?

In Computer technology, game mechanic can be defined as the rules and procedures that are designed and developed to govern and guide the actions of a game player, including the response of a game to the game player's actions.

This ultimately implies that, game mechanic comprises rules and procedures that describes how a game player perform specific actions while playing a game such as the following:

A game player progressing to a new level.A game player scoring a goal.A game player solving a puzzle.A game player shooting a robot or alien.

Read more on game development here: brainly.com/question/13956559

#SPJ1

we are sending a 30 mbit mp3 file from a source host to a destination host. suppose there is only one link between source and destination with a transmission rate of 10 mbps. assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 kilo meters. suppose that the entire mp3 file is sent as one packet. the transmission delay is:

Answers

The transmission delay is found to be 24,000 seconds for transmitting the entire file over the link.

To calculate the transmission delay, we need to first calculate the time it takes to transmit the entire 30 Mbit mp3 file over the link.

The time taken can be calculated as (30 Mbits / 10 Mbps) = 3 seconds.

The propagation delay can be calculated as (10,000 km / 2 * 10^8 m/s) = 0.05 seconds.

Therefore, the transmission delay is (3 + 0.05) = 3.05 seconds.

However, since the entire mp3 file is sent as one packet, the packet needs to be fully transmitted before the receiver can start processing it.

Hence, the transmission delay is (30 Mbits / 10 Mbps) = 3 seconds + the propagation delay (10,000 km / 2 * 10^8 m/s) = 0.05 seconds multiplied by the number of times the packet needs to be transmitted, which is 8000 times.

Therefore, the transmission delay is (3 + 0.05 * 8000) = 24,000 seconds.

To know more about transmission delay visit:

brainly.com/question/14718932

#SPJ11

MEOWWWWWRARRARARARARRA

Answers

Answer:

Yes.

Explanation:

MEOWWWWWRARRARARARARRA

Many massive stars end their life cycles as black holes. Why do astronomers not believe the sun will end its life cycle as a black hole?
(1 point)
O It is much too hot.
O It is not at the center of the solar system.
O It is not a binary star.
O It is not massive enough.

Answers

Answer: It is not massive enough

Explanation: The sun doesn't have enough mass to be a black hole.

Karlie wants to eat a good breakfast before taking a test

Answers

yum sounds like a good idea

Answer:C

Explanation:

ANYONE AHHH HELP ME 50 Points

ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points

Answers

Answer:

1, tilt 2, zoom

Explanation:

I'm not sure I have a camera but I don't take pictures like prof

you are designing an application that will use an azure sql database. you have identified the following database requirements: supports four read-scale replicas supports up to 25 tb of data provides an sla of 99.99% what is the least costly service tier that meets the requirements

Answers

Based on the identified database requirements, the least costly service tier that meets the requirements is the Business Critical service tier. This service tier provides support for 4 read-scale replicas, up to 100 TB of data, and an SLA of 99.99%.

What is  SQL Database?

SQL Database, also known as Microsoft Azure SQL Database, is a cloud-based relational database service provided by Microsoft Azure. It is a fully managed database service that allows users to create, scale, and manage SQL Server databases in the cloud. SQL Database provides many of the same features as an on-premises SQL Server database, including support for Transact-SQL (T-SQL) and the ability to use familiar SQL Server tools such as SQL Server Management Studio (SSMS).

To know more about SQL Database visit:

https://brainly.com/question/31176715

#SPJ11

Explain how access restrictions on a folder or directory can block a user’s access to a file, even if the file itself may be readable by that user.

Answers

To access restrictions: Click Edit. The safety tab opens in a brand new window. The Select Users, Computers, or Groups conversation field appears. In the Enter the item names to pick out textual content field, kind the call of the consumer or organization with a purpose to have get admission to to the folder.

Access regulations can manipulate the analyzing and enhancing of database items. The modern-day consumer is capable of study or edit a database item best if the get admission to regulations permit them to carry out those actions. Otherwise, a study or edit operation will now no longer be performed at the database item.

It is essential to keep in mind that once database item fields are accessed the use of the homes of implemented items from 1С:

Enterprise script, the whole item is study and now no longer simply the cost of the specified field. The exception right here is acquiring a presentation, wherein best the values of the fields that participate in producing the presentation are study.

Access regulations are saved in roles, they may be precise for maximum metadata items. Access regulations are written in a unique language that could be a subset of the question language.

The essential a part of a limit is a circumstance which, while actual for a database item, method that the modern-day consumer is entitled to study or edit this item. Editing a report is taken into consideration allowed if the report does now no longer contradict any edit regulations both earlier than and after the alternate is implemented.

Know more about access here:

https://brainly.com/question/28388830

#SPJ4

 

If you plan to work in the media or film industry, what profession would you most like to choose? This could be acting, directing, scriptwriting, and so on. How can you prepare yourself for a career in your chosen field?

Answers

Answer:

do you have a pic of your work

Explanation:

Other Questions
Find the sum of: 4 1/4+5.5 Explain how the shape (structure) of the muscle cell contributes to its function. during the healthcare debate in the early 1960s, ronald reagan made a record (on vinyl) that the american medical association sent (by mail) to Liberals tended to belong to the ------ According to the image, what do the people need? Picture of a red coat and a purple hat. 2011 Jupiterimages Corporation Nous avons besoin d'un blouson rouge et d'un chapeau violet. Nous avons besoin d'un manteau rose et d'une charpe violet. Nous avons besoin d'un rouge manteau et d'un violet chapeau. Nous avons besoin d'un manteau rouge et d'une charpe violette. what happens to the mean?what happens to the mean median? What is the common ratio of 2, 3, 9/2 in the cash flow information for the ping kings project, ping spent $300,000 for research and development of the golf clubs. ping's tax rate is 25%. how much of this cost should be included in the initial (t The sum of eleven less than a number and three more than four times that number is 37. 1. What is the ultimate cause of all evolution?A. Sudden disasters caused by external forcesB. Infectious diseaseC. Environmental changeD. Time2. The first major anatomical difference that distinguishes our ancestors from those of the Chimpanzee and Gorilla isA. BipedalismB. Bipartite behaviorC. BrachiationD. Bulimia3. An elderly human ancestor provides extra food for her grandchildren. This is an example of: A. Environmental forcingB. Natural selectionC. Kin selectionD. Selective breeding4. Anthropology was developed as an American discipline primarily through the study ofA. Early homininsB. PrimatesC. ArrowheadsD. Native Americans Which of the following statements is TRUE regarding negligent misrepresentation?1) False statement of fact made knowingly.2) False statement of opinion made with no reasonable grounds to believe it to be true.3) False statement of fact made without due care.4) False statement of opinion made without fault on the part of the maker. The average score of this quiz is 24 points with a standard deviation of 1.5 points. What is the probability that someone scored 21.9 or less Find a generalisation of Euler's Formula for graphs which are not necessarily connected. Be sure to prove that your formula always holds. If the price of mutton increases from $15/kg to $18/kg, the demand for beef rises from 100 kg to 150kg while the quantity demand of mutton reduces from 50kg to 30kg. i) Calculate the cross-elasticity of demand (CED) for mutton & beef Ansii) Therefore, mutton & beef are: a) inferior goods b) normal goods c) substitute d) complements e) price elastic or f) price inelastic Ans:iii) Calculate the price elasticity of demand (PED) for mutton. Ans: (iv) Is mutton price elastic or inelastic? Explain Ans:v) If the mutton farmers want to raise the Total Revenue, shall they raise the price of mutton? Ans: Lou's Bakery has established that JIT should be used for chocolate chips due to the high probability of the kitchen heat melting the chips. The average demand is 160 cups of chocolate chips per week. The average setup and processing time is 1/5 day. Each container holds exactly 3 cups. The current safety stock factor is 8 percent. The baker operates four days per week.a) How many Kanbans are required for the bakery? b) What is the maximum authorized inventory? c) If the average setup and processing time is increased to 3/8 of a day due to a process change, what are the new answers to (a) and (b)? If 7 4/5 of the total came to 109,200, what is the total? __________ refers to how being in a group causes members to become less aware of themselves and less concerned with others evaluations of them. when the united states imports more than it exports, then the balance of payments would Competing FairlyIs it fair to compete with a former employer?Going Out On Your Own-You have been the assistant manager of a coffee house for the past five years and have made friends with many of the customers. You are thinking about opening up a coffee house of your own. There is an ideal space available in a shopping center around the corner from the current place of work, and you think many of the customers that you have befriended would follow you there. Is it fair to open up a shop in direct competition with your current employer? Why or why not?Business owners must deal with competition, but they might not think it is fair for a former employee to compete with them. Do you think it is fair? How can you open your business but stay on good terms with your past employer? Help meIn the late nineteenth and early twentieth centuries, the new force of nationalism began to motivate many subject peoples living in old empires. Nationalists did not feel allegiance to their imperial masters. Instead, they felt a sense of belonging and loyalty to their own ( blank.)