when​ a/c repair specialists consistently arrive within their promised service​ window, they are demonstrating which determinant of service​ quality?

Answers

Answer 1

When a/c repair specialists consistently arrive within their promised service window, they are demonstrating the determinant of service quality known as reliability.

Service quality is the degree of superiority or deficiency of the service provided by an organization, according to the customers. It is the consumer's viewpoint of the service provided by the business that is being measured. Customers evaluate the quality of a service based on several factors such as convenience, reliability, timeliness, personalization, communication, empathy, and responsiveness.Reliability is the ability to perform the promised service dependably and precisely. This entails keeping promises, meeting deadlines, providing timely service, and delivering accurate results. An organization is reliable when it is dependable and accurate when it delivers its services or goods. It gives a consistent and dependable experience to customers.When the a/c repair specialists consistently arrive within their promised service window, they are demonstrating the determinant of service quality known as reliability.

To learn more about service quality please visit:

https://brainly.com/question/15295852

#SPJ11


Related Questions

If the value is set to equals to current entry then
a) the argument remains unchanged
b) the argument always changed
c) the argument will be deleted
d) the argument can be ignored
I will definitely mark you Brainliest for answering the correct answer!​

Answers

Answer:

this is a fallacy

a is the answer

In the 3-D impact of Information Technology Systems of a Hotel, Energy Manegement System comes which system? Please also give examples of the other two systems as well Answer:

Answers

In the 3-D impact of Information Technology Systems of a Hotel, the Energy Management System (EMS) falls under Operational Systems. Other systems include Property Management System (PMS) for hotel operations and Customer Relationship Management System (CRM) for guest relationship management.

In the 3-D impact of Information Technology Systems of a Hotel, the Energy Management System (EMS) typically falls under the Operational Systems category. It is responsible for monitoring and controlling energy consumption within the hotel to optimize efficiency and reduce costs.

The other two systems in this context are:

1. Property Management System (PMS): This system handles the day-to-day operations of the hotel, including reservation management, guest check-in/check-out, room assignment, billing, and other administrative tasks.

2. Customer Relationship Management System (CRM): This system focuses on managing and maintaining relationships with hotel guests. It stores guest information, preferences, and interaction history to personalize services, improve guest satisfaction, and foster loyalty.

Examples of other IT systems used in hotels may include Point-of-Sale (POS) systems for managing sales and transactions, Revenue Management Systems for optimizing pricing and revenue strategies, and Guest Service Systems for facilitating guest requests and communication.

To know more about Point-of-Sale , visit:

https://brainly.com/question/30624873

#SPJ11

what command can be used to flush the local dns cache on a windows computer?

Answers

The command used to flush the local DNS cache on a Windows computer is "ipconfig /flushdns". This command is entered into the command prompt, which is accessed by opening the start menu and typing "cmd" into the search box.

The DNS cache is a temporary database stored on a computer's operating system that contains information about previously visited websites. When a user visits a website, the computer stores the website's IP address in its DNS cache so that it can quickly access the website again in the future. However, sometimes the information in the DNS cache can become outdated or corrupted, which can cause problems with accessing certain websites.

To resolve these issues, the DNS cache can be cleared or "flushed". This removes all the information from the cache and forces the computer to retrieve new information the next time it accesses a website. The "ipconfig /flushdns" command is a quick and easy way to flush the DNS cache on a Windows computer.

In summary, the "ipconfig /flushdns" command can be used to clear the DNS cache on a Windows computer and force the system to retrieve new information. This command can be useful for resolving issues with accessing certain websites or troubleshooting network connectivity problems.

Learn more about local DNS: https://brainly.com/question/15230027

#SPJ11

PLEASE PLEASE PLEASEEEE HELP

Explain why quality is important (use the word accuracy in your answer)

Answers

Answer:

Quality is critical to satisfying your customers and retaining their loyalty so they continue to buy from you in the future. Quality products make an important contribution to long-term revenue and profitability.

have a nice day! (^o^)

.____ is a video format developed by Apple Computer for Windows and Apple computers.
A) MPEG
B) AVI
C) RealVideo
D) QuickTime

Answers

The video format developed by Apple Computer for both Windows and Apple computers is QuickTime.

It is a versatile video player that supports various video and audio formats. It was first introduced in 1991 and has been continuously updated and improved ever since. QuickTime provides high-quality playback, editing, and compression of multimedia files. It also supports streaming over the internet and has a wide range of applications in digital media. QuickTime is widely used in the film and video industry and is the default media player for macOS.

learn more about Apple Computer here:

https://brainly.com/question/15875253

#SPJ11

c++ undefined reference to function in header file

Answers

The error message "undefined reference to function in header file" typically occurs when a function declaration is present in a header file but the corresponding function definition is missing or not properly linked during the compilation process.

In the first paragraph, I will provide a summary of the answer. In the second paragraph, I will explain the answer in more detail.

The error message "undefined reference to function in header file" indicates that the function definition corresponding to a function declaration in a header file is missing or not linked properly during compilation.

In C++ programming, header files are used to declare functions, classes, and other entities that are meant to be used across multiple source files. The function declarations in header files provide information about the functions' names, parameters, and return types.

To successfully compile and link a C++ program, the function definitions (the actual implementation of the functions) must be provided in source files and linked together during the compilation process. The linker is responsible for resolving references to functions and ensuring that all required functions are defined.

If you encounter the error message "undefined reference to function," it means that the linker cannot find the function definition for a function declared in a header file. This can happen if the function definition is missing or if the necessary source file containing the definition is not included in the compilation process.

To resolve this issue, make sure that the function definition is present in a source file and that the source file is included in the compilation process. Additionally, ensure that the function's name, parameters, and return type in the definition match the declaration in the header file.

learn more about program here

https://brainly.com/question/30613605

#SPJ11

RSA(M, PU) → C, or RSA(C, PR) → M (20 points)
The encryption function (note that RSA uses the same functions for both encryption and decryption) takes as input a plaintext and a public key then outputs a ciphertext. Also, it takes as input a ciphertext and a private key then outputs a plaintext.
Hint: To find a multiplicative inverse, you may use a brute-force strategy.
IN PYTHON

Answers

RSA encryption and decryption operations can be performed using Python's built-in cryptographic libraries.

The encryption function, RSA(M, PU), takes a plaintext message (M) and a public key (PU) as input, and produces a ciphertext (C). Similarly, the decryption function, RSA(C, PR), takes a ciphertext (C) and a private key (PR) as input, and produces the original plaintext message (M).

To implement RSA encryption and decryption in Python, you can utilize libraries such as `cryptography` or `rsa`. These libraries provide functions to generate RSA key pairs, encrypt messages, and decrypt ciphertexts. The specific steps involved in encryption and decryption include generating or importing the RSA keys, applying modular exponentiation with the public or private exponent, and converting between plaintext and ciphertext representations.

In terms of finding a multiplicative inverse, the brute-force strategy is generally not practical due to the large prime numbers involved in RSA. Instead, modular arithmetic and mathematical algorithms like the Extended Euclidean algorithm are commonly used to efficiently calculate the modular multiplicative inverse.

Learn more about RSA encryption here:

https://brainly.com/question/31736137

#SPJ11

Write a C Language program using printf that prints the value of pointer variable producing "Goodbye." Followed by a system call time stamp "Friday May 06, 2022 03:01:01 PM"

Answers

Here's a C language program using printf that prints the value of pointer variable producing "Goodbye" followed by a system call time stamp "Friday May 06, 2022 03:01:01 PM":


int main() {
   char *str = "Goodbye.";
   printf("Value of pointer variable: %s\n", str);
   
   time_t rawtime;
   struct tm *timeinfo;
   
   time(&rawtime);
   timeinfo = localtime(&rawtime);
   
   printf("System call time stamp: %s", asctime(timeinfo));
   
   return 0;
}

In this program, we first define a pointer variable `str` that points to the string "Goodbye.". Then we print the value of this pointer variable using `printf`.Next, we use the `time` function to get the current system time, and the `localtime` function to convert this to a `struct tm` data type that represents the time in a readable format. Finally, we use `printf` to print this time stamp in a human-readable format using the `asctime` function.I hope this helps!

Learn more about Option Trading here:

https://brainly.com/question/33366235

#SPJ11

how does having weak security on your browser represent the weakest link in a network

Answers

Answer:

1. Your location is always exposed "might not be a problem, until it is"

2. Computer Viruses as your browser allows them

3. Hackers, of course, Ransomware attacks

4. SpyWares, read terms and condition or atleast visit trusted sources

5. Phishing, intermediatte security can handle this risk, but fatal if not. as in online identity stolen, bank accounts accessed.

6...... ALWAYS STAY SECURED

YOU WERE NEVER THE TARGET, JUST THE VICTIM

you can create s specific type of charts only. true or false​

Answers

Answer:

you can create s specific type of charts only.

false

A sum of money is shared between 2 friends in the ratio 2 : 3. If the larger

share is $450. What is the total sum shared?

Answers

300! Is the answer for this problem. 450 is the bigger sum, and that’s the 3 part of the ratio. So when we divide 450 by 3 it gives us 150. 150 is what one point on the ratio stands for. We’re looking for what 2 points on the ratio is, so 150*2 which gives us 300 … hope this helps

use the help button at the bottom of your screen to find the idla technical support phone number. the phone number is:

Answers

The phone number to connect technical support is:  1-800-927-8158.

Workers in technical support assist in managing, maintaining, and fixing IT systems. The job also include identifying hardware or software errors and resolving problems over the phone or in person. handling client technical assistance requests sent by phone and email. adding technical advice and brief publications to the firm website.

Professionals in technical support assist in managing, maintaining, and fixing IT systems. The job also include identifying software and hardware issues and finding solutions over the phone or face-to-face.

Learn more about technical support : https://brainly.com/question/27366294

#SPJ4

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

Lexicographic Comparison • Using the same name from the previous problem, tell the user whether their name comes before or after your name in the dictionary. Indexes • Test whether or not the name contains the letter ‘e’ in the first 3 letters

I have the project in a downloadable pdf.
I can't seem to be able to do "Lexicographic Comparison", with no clue how.
And "Starts With…", I am only able to print if their input is that 1 letter, not the first letter in a word.

Answers

You can also find this code on the repl.it platform. Due to Brainly's policy I can't copy it, I've attached it as a photo and file and you can check it in the comments. Good luck!

Lexicographic Comparison Using the same name from the previous problem, tell the user whether their name

How can you make the drawing tools contextual tab appear

Answers

Answer:

C. place the insertion point in any text in the text box.

Typically, the Ribbon contains the Draw tab. Here's how to add it, though, if you can't see it on yours. Customize the ribbon by selecting it with the right mouse click. Click OK after selecting the checkbox next to draw. Thus, option C is correct.

What make the drawing tools contextual tab appear?

If your Draw Tools are hidden, you can reveal them by bringing up the View menu, selecting Toolbars, and then selecting Drawing. Look at the Draw Tools' features for a bit.

When you click outside these objects, the tools in the contextual tabs are put away, giving you the options and resources you need to deal with them.

Clicking on the item causes the tab to reappear, and you can get them back. Your workspace remains uncluttered as a result.

Therefore, place the insertion point in any text in the text box.

Learn more contextual tab about  here:

https://brainly.com/question/14139335

#SPJ2

Discuss and elaborate the impact of technology advancement in
seaport wayfinding to community

Answers

Answer:

international technology

Technologies are becoming increasingly complicated and increasingly interconnected. Cars, airplanes, medical devices, financial transactions, and electricity systems all rely on more computer software than they ever have before, making them seem both harder to understand and, in some cases, harder to control. Government and corporate surveillance of individuals and information processing relies largely on digital technologies and artificial intelligence, and therefore involves less human-to-human contact than ever before and more opportunities for biases to be embedded and codified in our technological systems in ways we may not even be able to identify or recognize. Bioengineering advances are opening up new terrain for challenging philosophical, political, and economic questions regarding human-natural relations. Additionally, the management of these large and small devices and systems is increasingly done through the cloud, so that control over them is both very remote and removed from direct human or social control. The study of how to make technologies like artificial intelligence or the Internet of Things “explainable” has become its own area of research because it is so difficult to understand how they work or what is at fault when something goes wrong

Explanation:

Name 2 ways that body temperature can be taken.​

Answers

Answer:

Under the armpit, which is called the axillary method, and also through mouth, which is called the oral method.

Explanation:

Lab6B: Pick a number between 1 and 1000 For this lab, make sure to please use a while loop. Many programming languages have a library for a Random Number Generator (RNG). Whenever this RNG is used it will output one "random number back to the user. Applications of such a generator can including something like the lottery. Please keep in mind that the RNG will generate a random floating-point value between 0.0 and 1.0 and to adjust the range of the random numbers you need to either multiply or add to the result For example, if want the range to be from 0.0 to 50.0 we would multiply the result by 50. If wanted to move the range to 2.0 to 52.0 we would add 2 to the result. Re-read this passage and try to think about this a bit more deeply, it will click and make sense. In this lab exercise, please write a program that asks the user to pick an integer number between 1 and 1000; please use a while loop to verify that what was entered by the user is between the range specified earlier. If the input is within range, please have an RNG (please ask your lab instructor for details on how to create one some details shown below) that should keep randomly generating numbers until it generates one matching the number entered by the user. Also, please make sure that the program keeps track of how many guesses it takes. Have the program displays each guess and after than display the total guess count. Please refer to the sample output below. Disclaimer: When using the RNG you are going to have to store the generated number as a double or a float. Please make sure to round up the generated number to the nearest ones digit in order to avoid an infinite loop. Remember, the class name should be Lab6B The user input is indicated in bold. Java import java.util. Random public class generate Random public static void main(String args) Random rand - new Random(); // Generate random Integers in range o to 9 int rand_intl - rand.nextInt (10) ;)) C# public class generateRandom public static void main(String args[]) Random Ind-new Random() Generate random Integer in Tanto int example rnd. Next (10) ) ) Sample output: 1 Enter a number between 1 and 1000: 42 My guess was 56 My guess was 198 My guess was 239 My guess was 2 My guess was 5 My guess was 920 My guess was 42 I guessed the number was 42 and it only took me 231 guesses

Answers

Here is an example of a Java program that implements the functionality described in the prompt:

import java.util.Random;

import java.util.Scanner;

public class Lab6B {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       Random rand = new Random();

       int userNum, guessCount = 0;

       // Ask user for a number between 1 and 1000

       System.out.print("Enter a number between 1 and 1000: ");

       userNum = scanner.nextInt();

       // Verify that the user input is within range

       while (userNum < 1 || userNum > 1000) {

           System.out.println("Invalid input. Please enter a number between 1 and 1000: ");

           userNum = scanner.nextInt();

       }

       // Keep generating random numbers until a match is found

       int randNum = rand.nextInt(1000) + 1;

       while (randNum != userNum) {

           guessCount++;

           System.out.println("My guess was " + randNum);

           randNum = rand.nextInt(1000) + 1;

       }

       // Display the total number of guesses

       System.out.println("I guessed the number " + userNum + " and it only took me " + guessCount + " guesses.");

   }

}

In this program, I use a Scanner to get input from the user and a Random object to generate random numbers. I use a while loop to verify that the user input is within the range of 1 to 1000. Then I keep generating random numbers using the nextInt(1000) + 1 method until a match is found with the user input. I also keep track of the number of guesses using the guessCount variable and display it after the match is found.

Learn more about code, here https://brainly.com/question/497311

#SPJ4

Lab6B: Pick a number between 1 and 1000 For this lab, make sure to please use a while loop. Many programming
Lab6B: Pick a number between 1 and 1000 For this lab, make sure to please use a while loop. Many programming

Please fill in I give 50 points!!

# Heading (name, date, and short description) feel free to use multiple lines

def main():

# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5

name = input("Hello! What is your name?")

# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.

userGuess = int(input("Guess a number between 1 and 20: "))

numGuesses = numGuesses + 1

if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")

if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")

# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took

main()

Answers

Answer:

* explains the whole paragraph what ever that is * there

compare and discuss between electromechanical and electronic era of computer​

Answers

Answer:

The difference between electromechanical and electronic era of computer​ is that electomaechanical era was between the date of 1840 and 1940.These are the beginnings of telecommunication.While electronic era of computer​ was The electronic age is wha we currently live in. It can be defined as the time between 1940 and right now. The ENIAC was the first high-speed, digital computer capable of being reprogrammed to solve a full range of computing problems.

how many times the following loop repeats (answer by a number or enter forever)
MOV (0.AX): WHILE LAX -51 ADD (2.x): ENDWHILE:

Answers

It is impossible to determine how many times the loop will repeat without knowing the initial values of LAX and x.

The loop will repeat until LAX is equal to or less than -51, at which point it will exit the loop.

This is an example of a while loop, where the code within the loop will repeat as long as the condition specified (LAX -51) is true. Each repetition of the loop is called an iteration. If the initial value of LAX is greater than -51, then the loop will repeat a certain number of times before exiting. If the initial value of LAX is already less than or equal to -51, then the loop will not run at all. If the loop condition is never met, the loop will continue to run forever, resulting in an infinite loop.

To know more about while loop, visit:

https://brainly.com/question/30494342

#SPJ11

Explain the applications software that you use everyday

Answers

Answer:

Game software e.g PES, Star wars

Pictures in the _____ gallery give the appearance of a physical object, such as water drops or sand, that can give your presentation a unique look.

Answers

Answer:peanut

Explanation:

What is the greatest common
factor of the following three
numbers?
12, 18, 32​

Answers

Answer: 2

Explanation:

If there is more than one way to solve a problem or code a program, how do you know which way is correct? For example, do you think every student in your class modified the code in the same way?

Answers

If there is more than one way to solve a problem or code a program, the methods to know which way is correct are:

Understand the  two problem.Then Devise a plan to solve it.Then Carry out the plan.Lastly Look back and see which one works.

No, I think every student in my class, student modified the code in the differently.

How does a typical programming challenge start to be solved?

Typically, a problem statement is where a programming challenge is started to be solved. I need to be able to use the green screen technique or whatever else you decide to do to mix a foreground image and a background image. and comes to an end after you have functional code that fixes your issue.

The act of writing computer programs using programming languages is referred to as coding.

Some other ways to deal with code issues are:

Dissect the issue.Create a UML diagram or a flowchart for the current issue.Separate the issue into smaller issues or parts.Address the underlying issues.Call the solutions to each subproblem in the correct order or as necessary to connect them.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

devices that become e-waste. 2indication that a product was built using energy-efficient standards. 3do this with devices you don't want, rather than discarding them. 4electronic trash is often shipped overseas. 5

Answers

In regards to the devices that become e-waste is image 1, the indication that a product was built using energy-efficient standards is image 2.

What exactly does e-waste mean?

Electronic products is seen as one that is nearing the end of their "useful life" are referred to as "e-waste" informally. Electronic products that are frequently used include computers, televisions, VCRs, stereos, copiers, and fax machines. Many of these items are recyclable, reusable, or can be repaired.

Therefore, Energy-efficiency standards are seen as a set of guidelines and rules that specify the energy performance of manufactured goods and, in some cases, forbid the sale of those that are less efficient than a minimum standard.

Learn more about energy-efficient standards  from

https://brainly.com/question/1282744
#SPJ1

devices that become e-waste. 2indication that a product was built using energy-efficient standards. 3do

what is the range of values used whe setting velocity?

A. 0% to 100%

B. -100% to 100%

C. 0% to 200%

D. -100% to 200%

Answers

Answer:

A. 0% to 100%

Explanation:

Velocity can be defined as the rate of change in displacement (distance) with time. Velocity is a vector quantity and as such it has both magnitude and direction.

Mathematically, velocity is given by the equation;

\( Velocity = \frac{distance}{time} \)

The range of values used when setting velocity is 0% to 100%.

Hence, when working on a virtual reality (VR) robot, you should use a range of 0% to 100% to the set the value of velocity. This range of values are used to denote the rate at which the robot moves i.e its forward and backward motion (movement).

to sum all the elements of a two-dimensional array, you can use a pair of nested if statements to add the contents of each element to the accumulator. question 93 options: true false

Answers

The sum of each element in the 2D array can be calculated by looping through the matrix and adding up the elements.

Reference elements are set to null, and the default values for members of numeric arrays are set to zero. Because a jagged array is an array of arrays, its elements are reference types and have null initialization. A n-element array's index ranges from 0 to n-1 and starts at zero. A type for a 2D array is one with two pairs of square brackets, like int[][] or String. Both the number of rows and the number of columns are specified using the new operator for 2D arrays. The components of a 2D array are arranged in rows and columns.

Learn more about array here-

https://brainly.com/question/19570024

#SPJ4

Amazon.com purchases flat screen computer monitors from HP for $275.59 and sells them for $449.99. What is the amount of markup?

Answers

Answer: 82%

Explanation:

$ 449.99- $ 275.59= % 224.40

$ 224.40/ $ 275.59*100= 81.4253057078

what is the location in the base interface of the link to
create a table using wizard?
pls Answer me.
I'll make as BRIANLIST. ​

Answers

Answer:

Hey mate, here is your answer. Hope it helps you.

Explanation:

Before you can create objects such as tables and forms, you must first create the database file in which they will be stored.

1. On the File tab select New.

2. Click on Blank database.

3. In the File Name box, type a name for your database.

4. Click on the browse button to the right of the File name box to browse for a location for your

database.

5. Click on Create.

A new database will be created with a new default Table.

6. Click on Design View to start working with this Table.

You can use forms to control access to data, such as which fields of data are. Then open the table or query upon which you want to base the form. 2. To create a form on which all fields from the underlying table or query are placed. Then to be more selective about which fields appear on your form, you can use the Form Wizard.

Other Questions
Which statements about scientific explanations are true? I. Scientific explanations must prove that a hypothesis is true. II. Scientific explanations should be based on evidence or data. III. Scientific explanations must have logical and consistent arguments. IV. Scientific explanations should use scientific principles, models, and theories. A. I, II, III and IV B. I, II and III only C. II, III and IV only D. II and III only Why does Katniss vow to never have children? PLEASE HELP FAST. pls hurry2. INTEREST Marty invested $2000 in an account that pays at least 4% annual interest. He wants to see how much money he will have over the next few years. Graph the inequality y 2000 (1 + 0.04) ^ to show his potential earnings. Test the vector field F to determine if it is conservative. F = xy i + yj + z k Hint: Find the Curl and see if it is (0,0,0) O Conservative Not conservative 1)Timmy has 5000 ice creams how long will it take him to get diabetes (he eats them all)2) you are crazy how much time will it take to pass your math exam3)Jimmy has 5 million professors how much is his IQ boi4) William your boi has 5 billion Ferrari how long will it take him to crash the on your face(I'm sure it will be 5 second but just asking and by the way did you know that an average human body contains 8 octillion atoms )5)bye bye how much external financing is needed for a 25% increase in sales if stansfield corporation is currently operating at full capacity? assume only costs and total assets increase with sales, with no new current liabilities, debt, or stock needed. use exhibit ii. What mass of sodium nitrate will dissolve in 100 grams of water at 20 C? When a company buys equipment for $150,000 and pays for one third in cash and the other two thirds is financed by a note payable, which of the following is one of the effects on the fundamental accounting equation?cash decreases by $50,000.total assets increase by $200,000.liabilities increase by $150,000.equipment increases by $100,000. Average and Total CostsThe Accounting Club wants to have a party for its members. The cost of renting space is $1,500, and the cost of refreshments will be $15 per person.1. What is the total cost if 100 people attend? What is the average cost?2. What is the total cost if 200 people attend? What is the average cost?3. Explain why the average total cost differs with changes in total attendance.COMPUTATION OF AVERAGE AND TOTAL COST FOR CONDUCTING A PARTY FOR ITS MEMBERSInsert context explanation here...}]Total cost indicates the full expense to be incurred in a specific activity while average cost refers to the cost incurred per person basis. 5 questions in imperfect tense about a famous person . Samuel read 8 books in 10 months. What was his rate of reading in books per month? In 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year Question 2 of 5What simple thing did Irena do to trick the new Nazi government? A thick walled cylinder is rigidly constrained at both ends and has an initial inner radius of 100 mm. A pressure is applied to the cylinder which makes the cylinder partially plastic. The elastic-plastic interface forms at a radius of 180 mm in the un-deformed geometry and this radius increases by 85 microns due to the applied pressure. Assuming that the Tresca yield criterion applies and the material is elastic, perfectly plastic, determine the change in the inner radius of the cylinder Give your answer in microns. A pyramid-shaped arrangement of what people need to feel safe, belonging, and valued is the?? Q.2 - What is the value of y in the equation 3(4y - 12) = 0 ? Show your work. CVPincome statement show contribution margin instead of the grossincomeEI CVP Income Statement muestra el contribution margin en lugar del ingreso bruto. True False a rock with the mass of 10 kg sits at the top of a hill 20 m high. what is the potential energy whether the following relation represents a function. Use pencil and paper.Explain your reasoning.{(-4,4), (-2,2), (-1,1), (-7,7), (-8,6), (-3,5)}Does the relation represent a function? o Yes Select the asymptotic worst-case time complexity of the following algorithm:Algorithm Input: a1, a2, ..., an,a sequence of numbers n,the length of the sequence y, a numberOutput: ?? For k = 1 to n-1 For j = k+1 to n If (|ak - aj| > 0) Return( "True" ) End-for End-for Return( "False" )a.(1)b.(n)c.(n^2)d.(n^3)