what will be the text displayed in the jtextarea for the given code? private jtextarea myintrotext ; myintrotext

Answers

Answer 1

The given code snippet declares a private variable called "myintrotext" of type JTextArea. However, it does not provide any code for initializing or setting the text of the JTextArea.

The code snippet provided declares a private instance variable named "myintrotext" of type JTextArea. However, it does not include any code for initializing or setting the text of the JTextArea. In Java, when a JTextArea is created, it does not have any default text value unless explicitly specified. Hence, without any explicit assignment of text to the JTextArea, it will initially display an empty or blank area. To set the text for the JTextArea, you would need to use methods such as setText(String text) to assign the desired text value to the "myintrotext" variable. Without such assignment, the JTextArea will remain empty.

In the given code snippet, a private variable named "myintrotext" of type JTextArea is declared. However, the code snippet does not include any statements to initialize or set the text content of the JTextArea. In Java, when a JTextArea is instantiated, it does not have any default text unless explicitly assigned. Therefore, without any explicit assignment of text to the JTextArea, it will initially display an empty or blank area.

To populate the JTextArea with text, you would need to use methods such as setText(String text) to set the desired text content. For example, you could write myintrotext.setText("Hello, this is my introduction."); to display the specified text in the JTextArea. Without such assignment, the JTextArea will remain empty and display no visible text.

To learn more about myintrotext -  brainly.com/question/31850780

#spj11


Related Questions

The attributes and relationships associated with a particular entity will be somewhat similar across databases. T/F

Answers

The attributes and relationships associated with a particular entity will be somewhat similar across databases. is false.

What are the definitions of entity attribute relationship and metadata that are particular to databases?A property of an entity is described by an attribute, which is a name and a data type combination. Relationship: A connection between two entities that the database keeps track of. Database management system (DBMS) data that specifies the tables and properties of a database is known as metadata.Each row may be used to establish a relationship between multiple tables using a foreign key, which is a reference to a primary key of an existing table. All tables in a relational database have an attribute known as the primary key, which is a unique identifier of a row.

To learn more about attributes refer to:

https://brainly.com/question/29796715

#SPJ4

Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produced. true/ false

Answers

True. Most basic programs follow this structure.

The given statement input is received, some process is performed on the input, and output is produced about computer programs is true.

What are the basic steps computer programs typically perform?

Any computer program to perform it follows three basic steps, which make the program better to run:

Generally, a computer program receives a kind of data that is an input, this data may be a file or something provided by the user.This data is altered by the program in some specific way.The altered data is provided as output.

There is some basic software also that can run on computer system software, utility software and application software. These programs are running on the information. and provides output.

Therefore, the steps given in the question are true.

Learn more about computers, here:

https://brainly.com/question/3397678

#SPJ2

a quorum is shared storage used to store cluster configuration data.True or False

Answers

False. A quorum is not shared storage used to store cluster configuration data. A quorum in a clustered computing environment refers to a mechanism used to determine the availability and majority opinion of nodes or members in the cluster.

The purpose of a quorum is to prevent split-brain scenarios, where multiple nodes in a cluster might assume control simultaneously, leading to conflicting decisions and potential data corruption.

A quorum ensures that a majority of nodes must agree on decisions and have the ability to form a coherent cluster. It is not directly related to shared storage or the storage of cluster configuration data.

On the other hand, shared storage in a clustered environment typically refers to a storage system or network storage that is accessible and shared by multiple nodes in the cluster. This shared storage is used to store data that can be accessed and modified by different nodes in the cluster, enabling high availability and data consistency.

While both quorum and shared storage are important concepts in clustering, they serve different purposes. Quorum is about determining the majority opinion and avoiding conflicts, whereas shared storage is focused on providing a common storage platform for data access and management within the cluster.

Learn more about quorum here:

https://brainly.com/question/29034370

#SPJ11

you are building a data loss prevention application that needs to read text content in images and which can detect and prevent the leak of social security numbers as part of your compliance requirements? which aws service can help you with this?

Answers

Since you are building a data loss prevention application that needs to read text content in images, the AWS service that can help you with this is Amazon Rekognition.

What is the purpose of Amazon Rekognition?

In 2016, Amazon Rekognition, a cloud-based platform for computer vision software as a service, was introduced. It has been marketed to and used by a variety of US government agencies, notably the police in Orlando, Florida, and US Immigration and Customs Enforcement.

Therefore, Videos can have objects, scenes, people, celebrities, text, and offensive content detected using Amazon Rekognition Video. Using your own database or collection of face photos, you may also look for faces in videos.

Learn more about AWS service from
https://brainly.com/question/14014995

#SPJ1

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white

why might you want to split the window for a long document?

Answers

To view two different areas of the document you want to split the window for a long document.

Why would you choose the Print Layout for modification over the Read Mode view?

When modifying the document's structure or layout, you might choose the Print Layout view since it displays graphics, tables, formatting, and page numbers. When altering content or when you want the text to look like you're reading a book, you might utilise Read Mode.

The most popular view is called normal view, which displays formatting options including italics, line spacing, and font size. Text with many columns is shown in a single continuous column. The document is enhanced for online viewing in the Web Layout view (viewing the document in a browser).

Learn more about the Window here: https://brainly.com/question/26420125

#SPJ4

NOTE: The given question is incomplete on the portal. Here is the complete question.

QUESTION: Why might you want to split the window for a long document?

(A) To view two different areas of the document.

(B) To open a second document to compare to the first.

(C) To change the zoom for different pages in the document.

(D) To view the non-printing characters in the document.

in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4

Answers

Answer:

c)4

Explanation:

Hope it could helps you

you are purchasing a hard disk from an online retailer over the internet. what does your browser use to ensure that others cannot see your credit card number on the internet?

Answers

When a customer purchases a hard disk or any other item online, one of the primary concerns is the protection of sensitive information such as credit card details. To ensure this, internet browsers utilize a technology called Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocols to encrypt the data transmitted between the customer and the server. This encryption process is often represented by a padlock symbol that appears in the address bar of the browser.
The SSL and TLS protocols work by using a complex system of public and private keys to scramble the data, which can only be unscrambled using the correct key. This ensures that the data cannot be accessed by any third party, and if it is intercepted by an unauthorized person, they will not be able to read it.

It is important for customers to also take steps to ensure their own safety when shopping online. This includes making sure that the website they are using is legitimate, checking for the padlock symbol and the "https" in the URL, using strong passwords, and keeping their software up-to-date. By taking these precautions, customers can minimize the risk of their sensitive information being compromised while shopping online.

To know more about  customer visit:

https://brainly.com/question/31192428

#SPJ11

Every time you interact with a question, a pop-up window will tell you whether your response is correct or incorrect, and it will usually give you additional feedback to support your learning. Which types of feedback can you expect to receive from InQuizitive? You might have to guess on this question and risk getting it wrong___that's okay! InQuizitive is for learning, so do your best and read the feedback so you know more for next time.

Answers

InQuizitive provides various types of feedback to support your learning. These types of feedback can include both correct and incorrect responses. When you interact with a question, InQuizitive will provide you with immediate feedback in a pop-up window. The feedback will inform you whether your response is correct or incorrect, allowing you to gauge your understanding of the topic.

If your response is correct, the feedback may provide positive reinforcement and congratulate you on your accurate answer. It may also provide additional explanations or information to reinforce your understanding of the concept.

If your response is incorrect, the feedback will gently guide you towards the correct answer. It may explain why your response is incorrect and provide insights or hints to help you arrive at the correct answer. The feedback is designed to help you learn from your mistakes and deepen your understanding of the topic.

InQuizitive encourages you to do your best and view incorrect responses as opportunities for learning and improvement. By reading and understanding the feedback provided, you can enhance your knowledge and be better prepared for future questions.

For more such answers on InQuizitive

https://brainly.com/question/14408521

#SPJ8

Which is a screen that shows information from a computer​

Answers

computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the visual display, circuitry, casing, and power supply.

A greater stopping distance _______ especially in emergency situations

A) can be helpful
B) is reccomended
C) can be very dangerous

Answers

A greater stopping distance C) can be very dangerous. especially in emergency situations

What is the emergency situations about?

A greater stopping distance means that it takes longer for a vehicle to come to a stop, which can be dangerous in emergency situations, as the driver may not be able to stop in time to avoid a collision.

Therefore, based on the above, This can lead to serious accidents and injuries. It's important for drivers to be aware of their vehicle's stopping distance and take steps to improve it, such as by ensuring that their brakes are in good working condition.

Learn more about  emergency situations from

https://brainly.com/question/1490331

#SPJ1

1 Type the correct answer in the box. Spell all words correctly. Which skill type refers to the ability to interact and communicate effectively with people? skills refer to the ability to interact and communicate effectively with people. Reset Next​

Answers

Answer:

interpersonal skills

Explanation:

please rate

Explain why certain locations in the
United States are in "dead zones” where cell
phones cannot send or receive messages.

Answers

Answer:

Since cell towers are not uniformly distributed, certain areas will fall into a dead zone. ... Obstructions: Trees, hills, mountains, high rise buildings and certain building materials tend to interfere with the transmission of cell signals and may block them out entirely.

Examine the cisco switch. using an appropriate fiber optic cable, connect it to the corpiscsi server. connector a (red) is tx. connector b (black) is rx. remove the ethernet cable from the server and switch and then confirm network connectivity through the fiber connection using network and internet settings. locate and replace the broken cable in the networking closet. complete the following tasks in order on floor 1 overview > executive office > hardware: install the network interface card with the fastest speed into the exec computer and then connect to the network using the existing cable. use the network and internet settings app to confirm a connection to the network and internet.

Answers

The examination of the cisco switch using an appropriate fiber optic cable, connect it to the corpiSCSI server is in the explanation part.

What is switch?

Switches are essential components of any network. They link numerous hardware components, including printers, servers, wireless access points, and computers, to a single network within a structure or campus.

Connected devices can exchange data and communicate with one another thanks to a switch.

The given scenario can be done by:

Extend the Cables category on the shelf.Drag the ST to LC fibre cable over to the switch's SFP 1 LC connector.Choose the LC connector from the Select Connector window.To convert to the back view, choose Back above the rack.Drag the ST Connector (A) to the CorpiSCSI server's Tx port from the Selected Component window (the bottom server).Drag the ST Connector (B) to the CorpiSCSI server's Rx port from the Selected Component window.The CorpiSCSI server's Cat5e cable should be disconnected as follows:Drag the RJ45 connector to the shelf from the server's back.Over the rack, select Front using the button.Drag the switch's marked RJ45 connector to the shelf.Select Windows Server 2016 and click to examine it on the CorpiSCSI monitor (right-most monitor).Right-click the Network symbol in the notification box and choose "Open Network and Sharing Center."Choose Modify adapter settings.Check to see if CorpNet is connected to Ethernet 3 at all.To complete the lab, click Done.

Thus, this can be the method to follow.

For more details regarding iSCSI, visit:

https://brainly.com/question/28328792

#SPJ4

at what point does a client send a unicast packet to the dhcp server to request a lease renewal for its current ip address?

Answers

When the lease is 50% expired, a client sends an unicast packet to the DHCP server to request a lease renewal for its current IP address

What is an IP address?An Internet Protocol address (IP address) is a numerical label that identifies a computer network that employs the Internet Protocol for communication. An example of such an IP address is 192.0.2.1. Identification of the network interface and location addressing are the two primary purposes of an IP address.The Internet Assigned Numbers Authority (IANA) oversees the management of the IP address space on a global scale, Five regional Internet registries (RIRs) are in charge of managing it in their respective regions for assignment to local Internet registries, such as Internet service providers (ISPs) and other end users. IANA allocated IPv4 addresses to the RIRs in blocks of roughly 16.8 million addresses each, however the supply has been depleted at the IANA level since 2011. In Africa, only one RIR still has a supply of local assignments available. Some IPv4 addresses are not globally unique and are set aside for private networks.

To learn more about IP address, refer to

https://brainly.com/question/21864346

#SPJ4

Hi everyone! I was wondering if any of you want to help me with a computer science problem I have for one of my classes. I do not understand how to do it which is why I ask.

Here is the problem: Write an algorithm for placing a set of pencils in order from largest to smallest (left to right).

I learned other sorting algorithms but I don't quite understand how to implement them into my own algorithm.

Thanks.

Answers

Answer:

Use bubble sorting

Here is an example program I made:

for(int i = 0; i < length; i++){

     for(int j = 0; j < length; j++){

       if(j != length - 1){

         if(input[j] > input[j + 1]){

          storeVar = input[j];

         

          input[j] = input[j+1]; //storeVar2;

         

          input[j+1] = storeVar;

         }

       }

     }

What does "the challenge page was accidentally cached" mean? How do I fix it?

Answers

"The challenge page was accidentally cached" means that a web page was stored in a browser's cache memory.

What is cache memory?

Cache memory is a type of fast memory that is used to store frequently accessed data, instructions and objects. It is located between the CPU and main memory, and is designed to speed up the retrieval of data and instructions by the CPU. Cache memory stores recently accessed information so that when the CPU requests data, it can be retrieved quickly from the cache instead of having to access the main memory.

This can happen when a user visits a web page and their browser mistakenly stores the content of that page locally, instead of downloading a fresh version of it every time they visit.
To fix this, you need to force the browser to clear the page from its cache memory. This can usually be done by pressing the refresh button or by pressing Ctrl+F5. Additionally, you can also clear the browser's cache manually by going to the settings and deleting the cached data.

To learn more about cache memory
https://brainly.com/question/14342135
#SPJ1

SXXSSSSSSSSSZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ

Answers

Answer:

okkkk

Explanation:

MARK ME BRAINLIEST PLZZZZZZZZZZZZZZZZZZZZZZZZzzzzzzzzzzzzzzzzzzzz

All of the following can be used to design and plan a program EXCEPT: IPO chart search engine flow chart storyboard

Answers

Answer:

yes ipo chart and flow chart

all of the following are terms related to part of the boot process except ________. a) RAM b) USB c) CMOS d) ROM

Answers

The following terms are elated to part of the boot process, except for USB. The correct option is b.

What is the boot process?

An operating system is loaded during the booting phase. It is a procedure that begins when the computer is turned on (either manually or with a software command).

An industry standard known as the Universal Serial Bus (USB) defines the cables, connections, and protocols needed to connect, communicate with, power, and connect peripheral devices to computers.

Computers can communicate with external devices via a technique called USB, or universal serial bus. The boot process does not include it.

Therefore, the correct option is b) USB.

To learn more about the boot process, refer to the link:

https://brainly.com/question/15230866

#SPJ1

How would you define a cloud today?
as a non-factor
networking
server
any remote virtualized computing infrastructure

Answers

Answer:

The answer is "any remote virtualized computing infrastructure".

Explanation:

The term cloud is used as the symbol of the internet because cloud computing is some kind of internet computing, that offers various services for computers and phones in organizations via the internet.  

The virtual network allows users to share numerous system resources throughout the network system.It allows you to access the optimal productivity by sharing the resources of a single physical computer on many virtual servers.

which founding principle in object-orented programming. emphasizes communication through controlled interfaces? information hiding abstraction encapsulation o modification

Answers

The correct answer is Information concealment places a strong emphasis on interface-controlled communication.

The four guiding concepts of object-oriented programming are polymorphism, inheritance, abstraction, and encapsulation. The four basic theoretical tenets of object-oriented programming are abstraction, encapsulation, polymorphism, and inheritance. According to the abstraction principle, every complex capacity has a unique set of abstract realisation patterns. Each abstract realisation pattern outlines how to break down a difficult capability into a group of easier ones. Encapsulation is a technique for preventing direct user access to some object components, preventing users from seeing the state values for all of an object's variables. Data members and data functions or methods connected to an instantiated class or object can both be concealed via encapsulation.

To learn more about communication click the link below:

brainly.com/question/22558440

#SPJ4

Type the correct answer in the box. Spell all words correctly.
Which tool should Jules use to encourage her reader's interaction on her website?
Jules should use the_____
tool to encourage her reader's interaction on her website.

Answers

Jules should use various tools to encourage her reader's interaction on her website. One of the most effective tools for this purpose is the comments section.

By allowing readers to comment on blog posts or articles, Jules can create a space for discussions and feedback. This can also help her build a community around her website.

Another tool that Jules can use is social media integration. By adding social media sharing buttons on her website, readers can easily share content on their own social media platforms. This can help increase the reach of Jules' content and also encourage readers to engage with her website.

Jules can also consider adding polls or surveys to her website to encourage reader participation. This can provide valuable insights and feedback on her content and also help her understand her audience better.

Lastly, Jules can use interactive features such as quizzes, games, and contests to engage her readers. This can add a fun and interactive element to her website and also incentivize readers to participate and share with others.

Overall, there are various tools that Jules can use to encourage reader interaction on her website. By using a combination of these tools, she can create a dynamic and engaging website that encourages participation and feedback from her readers.

For more question on website

https://brainly.com/question/28431103

#SPJ11

T/F. A string variable can hold digits such as account numbers and zip codes.

Answers

True, a string variable can hold digits such as account numbers and zip codes.

In programming, a string is a data type that represents a sequence of characters. While it is commonly used to store and manipulate text, it can also hold other types of characters, including digits. Therefore, a string variable can indeed store digits such as account numbers and zip codes.

When a digit is included in a string, it is treated as a character rather than a numerical value. This means that mathematical operations cannot be directly performed on the digits stored in a string. However, the string can still hold and manipulate the digits as individual characters or as a sequence of characters.

For example, if you have an account number "123456789" stored as a string variable, you can access and manipulate each digit individually using string operations. You can concatenate, compare, or perform other string-related operations on the digits within the string variable.

Therefore, using a string variable to hold digits such as account numbers and zip codes is a common practice in programming.

Learn more about programming here:

https://brainly.com/question/14368396

#SPJ11

Pipeline Concept:
Break instruction execution ____ ____________.

Answers

Pipeline Concept:

Break instruction execution into stages.

The pipeline concept in computer architecture refers to a technique used to improve the performance of the processor by breaking down the instruction execution into several stages.

Each stage is designed to perform a specific task, and the output of one stage is passed as input to the next stage, forming a pipeline.

The stages may include fetching the instruction, decoding it, executing it, and storing the result.

However, there can be situations where the pipeline needs to be halted, such as when a branch instruction is encountered, and the next instruction to execute is not known yet.

In such cases, the pipeline is broken, and the execution of instructions is temporarily halted until the branch is resolved.

For more such questions on Pipeline Concept:

https://brainly.com/question/30089658

#SPJ11

A type of storage which holds data on a permanent basis for later use



Help please

Answers

Answer:

Permanent storage, also called persistent storage, is any computer data storage device that retains its data when the device is unpowered. A common example of permanent storage is the computer's hard drive or SSD.

Explanation:

Identify at least five different Information Technology careers that you could pursue in your home state, and choose the three that appeal to you
the most. Out of the three, write a one-page essay describing which one would be your career choice and the educational pathway that you would
have to follow in order to obtain that career. Finally, identify at least three colleges, universities, or training programs that are suited to that career
choice. You can use the following resources to help you:​

Answers

Answer:Five careers within the Information Technology cluster that would be interesting to me are video game designer, software developer, database administrator, computer science teacher, and business intelligence analyst. Of those careers, being a video game designer, software developer, or business intelligence analyst sounds the most appealing to me. Out of all those choices, I think that being a business intelligence analyst seems the most interesting.

Business intelligence analysts work with computer database information, keeping it updated at all times. They provide technical support when needed and analyze the market and customer data. At times, they need to work with customers to answer any questions that they have or fix things as needed. The part that I would find most interesting would be collecting intelligence data from reports for the company for which I work. To complete the job, I would need to have great customer service skills, communication skills, critical thinking skills, and knowledge of computers.

Before I could find work as a business intelligence analyst, I would need to complete a bachelor’s degree in computer science to learn how to do computer programming and use other applications that I would need to know for the job. Some of the schools that have a great program for computer science are the University of California at Berkeley, Georgia Institute of Technology, and California Institute of Technology. Once I have completed a bachelor’s degree, I would continue on to get a master’s degree in the field, which would help me advance in my career and get promotions.

Explanation:

write code to read a list of song durations and song names from input. for each line of input, set the duration and name of newsong. then add newsong to songslist.

Answers

Here's the Python code to read a list of song durations and song names from input and then add them to a songslist:```python songslist = [] while True:  try: duration, name = input().split()  newsong = {"duration": duration, "name": name} songslist.append(newsong except: break


```In this code, we first create an empty `songslist` list to store the songs. Then, we use a `while` loop to repeatedly read lines of input until there is no more input left (`while True` is an infinite loop, but we break out of it when there is an error reading input).For each line of input, we split it into the duration and name using `input().split()`.

Then, we create a dictionary `newsong` with two keys `"duration"` and `"name"`, and set their values to the duration and name respectively.Finally, we add `newsong` to the `songslist` using the `append()` method.I hope this helps! Let me know if you have any further questions.

To know more about durations visit:

https://brainly.com/question/13567541

#SPJ11

help
pls need quickly

helppls need quickly

Answers

Answer:

Themes

Explanation:

In the slide thumbnail pane on the left, select a slide.On the Design tab, in the Themes group, click the More button (illustrated below) to open the entire gallery of themes:Point the mouse at the theme you want to apply. Right-click it, and then select Apply to All Slides.

if the user types in the characters 10, and your program reads them into an integer variable, what is the value stored into that integer?

Answers

The integer variable would store the integer value of 10 if the user types in the characters 10, and your program reads them into an integer variable.

When the program encounters characters, it reads and converts them into the corresponding integer. So, the number 10 is converted from character data to integer data and then stored in the integer variable.

The value stored in the integer variable when the characters "10" are read into it is 10. Here's a step-by-step explanation:

1. The student question inputs the characters "10".
2. The program reads these characters into an integer variable.
3. The program converts the character "10" to the integer value 10.
4. The integer variable now stores the value 10.

You can learn more about integer variables at: brainly.com/question/27855584

#SPJ11

Other Questions
henry scored 85, 76, 84, and 69 on four exams. what must he make on the fifth exam to have an average of 80? Question 54.5 ptsNumber of lons and Formula Units (lonic Compounds)Part 1: Consider a sample that contains 0.32 mol Na2SO4 dissolved in water. Howmany sodium ions are there in the solution? Enter the answer with correctsignificant figures:Nations.Part 2: Given that the molar mass of NaSO4 is 142.05 g/mol, what is the mass of0.32 mol Na2SO4 dissolved in the solution? Enter the answer with correctsignificant figures: a company's current assets are $17,980, its quick assets are $11,468 and its current liabilities are $12,200. its quick ratio is closest to: how many solutions exist for the given equation?1/2 (x + 12)= 4x - 1zero onetwoinfinitely many when demonstrating 2022 altimas parking assistance features, what features should you explain help detect large stationary objects when backing up? at a certain time a particle had a speed of 16.0 m/s in the positive x direction, and 4.200 s later its speed was 27.0 m/s in the opposite direction. what is the average acceleration in m/s of the particle during this 4.200 s interval? growth factor hormones, such as insulin, bind to which type of receptor? Joe's annual income has been increasing each year by the same dollar amount. The first year his income was $19,800, and the 8th year his income was $25,400. In which year was his income $30,200?His income was $30,200 in the ___th year. A 250g packet of iodized salt costs #15, A 20kg sack of saltncost #1040. calculate the savibg per kg by buying the 20kg sack of salt For the next five questions, consider a scenario based on theAghion and Tirole (1997) model. There is a Principal and an agent,and the principal needs to decide on which project to implement. Ifthe principals preferred project is implemented the agent gets b = 40 and the principal gets surplus of B = 120. If the agents preferred project is implemented the agent gets b = 90 and the principal gets a return of B = 80. Ex ante all projects look alike; assume that if the principal is uninformed she will follow the recommendation of the agent. The principal can expend effort E to become informed. The principal can either expend effort E = 0, which will give her a zero probability of becoming informed. Alternatively, she can expend effort E = c at the cost of c, which will mean that she is informed with probability (that is, she is informed with probability if effort cost is c). On the other hand, the agent can become informed at zero cost, so we can assume that he will always be informed. The principal has a choice she can retain formal authority to make the decision for herself (P-formal authority), or she can delegate the formal decision making rights to the agent (delegation).11. If the principal has P-formal authority she will try to be informed (expend effort E = c). With delegation she will not bother putting in effort (E = 0). Ignoring her ex ante effort costs E, the principals expected return Up from P-formal authority and from delegation Upd are:a. Up = 115; Upd = 80b. Up = 150; Upd = 80c. Up = 90; Upd = 100d. Up = 100; Upd = 80 - ANSWERe. None of the above.12. What is the highest value of effort cost c such that the principal will choose to retain formal authority?a. 50b. 70c. 30d. 35e. 20 - ANSWERNow assume that this is an infinite horizon game in that there are an infinite number of periods, and in each period a project can be chosen to be implemented with the same potential payoffs as outlined above. All parties have a discount factor of , where 0 1. Further, now assume that the principal cannot formally delegate authority to the agent, but would like to commit to not intervene using the following trigger strategy: In the first period choose to remain uninformed about the potential project but pay the agent $30. Then ask the agent for a recommendation and implement the agents recommendation. In any subsequent period, if the agent cheated and did not recommended the principals preferred project in any previous period, she will expend effort E = c (that is, try to become informed, implement her preferred project if she can but follow the agents recommendation in that period otherwise). If the agent recommended the principals preferred project in every previous period, she will remain uninformed (E = 0), pay the agent $30 and follow the agents recommendation.13. What is the agents expected payoff Ua if he cooperates and recommends the principals preferred project in every period?a. Ua = 70/(1 )b. Ua = 90c. Ua = 80/(1 )d. Ua = 75/(1 + )e. Ua = 65/(1 - )14. What is the agents expected payoff Uach if he cheats and recommends his own preferred project?a. Uach = 120b. Uach = 120 + .65/(1 )c. Uach = 120 + .40/(1 )d. Uach = 100 + 80/(1 )e. Uach = 100 + 90/(1 )15. For what value of will this trigger strategy be able to sustain cooperation (in which the agent truthfully recommends the principals preferred project in every period, despite the principal being uninformed and the agent having real authority)?a. 1/5b. 4/5c. 5/8d. 3/4e. 10/11Can I please have help with Q13-15 with intuition and answers? Consider function g(x) = 6x - 8 sin(x) on interval [0, pi/2].Use an (x, y) table with interval endpoints and critical numbers as 0-values to find the absoluteextrema.The absolute minimum value of the function isThe absolute maximum value of the function is what is the best way (order of steps) to customize cookie settings? A mantra is a :________. a. sacred painting. b. form of meditation. c. breath exercise. d. short chant. Bonjour, can you please do my French homeworks task 3(Photo)Merci. The rhetorical appeal found in this excerpt of the speech is Researchers at PPG Industries spent considerable time, effort, and money developing a bluish windshield that would let in filtered sunlight but block out the heat. Little market research was done, but the scientists were convinced this new product would be significantly better than existing windshields even though it was more expensive and of a different color than the current models on the market. This scenario suggests PPG most likely has a(n)________ orientation a. exchange b. production c. sales d. promotion e. customer if I have a 94% in art class and I dont do one of my assignments and get a 68 what will my grade drop down to? What type of amino acids would you expect to see in the DNA-binding regions of such proteins?Match the terms in the left column to the appropriate blanks in the sentences on the right. Not all terms will be used.DNA -binding regions of the proteins of the study would likely contain D N A-binding regions of the proteins of the study would likely contain blank charged amino acids, such as blank, blank. Electrically charged, blank side chains of these amino acids would bind to D N A, which is blank charged, due to the blank content. charged amino acids, such as D N A-binding regions of the proteins of the study would likely contain blank charged amino acids, such as blank, blank. Electrically charged, blank side chains of these amino acids would bind to D N A, which is blank charged, due to the blank content., D N A-binding regions of the proteins of the study would likely contain blank charged amino acids, such as blank, blank. Electrically charged, blank side chains of these amino acids would bind to D N A, which is blank charged, due to the blank content.. Electrically charged, D N A-binding regions of the proteins of the study would likely contain blank charged amino acids, such as blank, blank. Electrically charged, blank side chains of these amino acids would bind to D N A, which is blank charged, due to the blank content. side chains of these amino acids would bind to DNA, which is D N A-binding regions of the proteins of the study would likely contain blank charged amino acids, such as blank, blank. Electrically charged, blank side chains of these amino acids would bind to D N A, which is blank charged, due to the blank content. charged, due to the D N A-binding regions of the proteins of the study would likely contain blank charged amino acids, such as blank, blank. Electrically charged, blank side chains of these amino acids would bind to D N A, which is blank charged, due to the blank content. content. You bought 6 bars of home made soap from eBay, and weighed them on an electronic scale. They weighed 4.003, 4.006, 4.012, 4.008, 4.004, and 4.009 ounces. What is the average weight of the bars? *DON'T ROUND*1. 4.010 ounces.2. 4.007 ounces.3. 24.042 ounces. Martha Rose decides to investigate a flag height/width =3/5 There are 7 red stripes and 6 white stripes, all of which have the same height, the hoist. The height of the blue field equals the height of seven stripes.height of the blue field/width of the blue field = 2/3The height of one stripe is what fraction of the height of the entire flag? The height of the blue field is what fraction of the height of the flag?