Which of the following is a benefit of using a simulation instead of an experiment to make a prediction? Select two answers A. A simulation allows investigation of a phenomenon without the real-world limitations on time, safety, or budget B. A simulation can be used to model real-world events that are impractical for experiments. C. A simulation always produces the same output, so its results can be verified D. A simulation produces results that are more accurate than experimental results.

Answers

Answer 1

The benefits of using a simulation instead of an experiment to make a prediction are:  (B) A simulation can be used to model real-world events that are impractical for experiments an (D) A simulation produces results that are more accurate than experimental results.

A simulation allows investigation of a phenomenon without the real-world limitations on time, safety, or budget, and A simulation can be used to model real-world events that are impractical for experiments. Simulation is the process of creating a model of an actual or theoretical system and conducting experiments on it with the goal of comprehending its behavior. A simulation can be used to model real-world events that are impractical for experiments, such as the behavior of subatomic particles, natural phenomena, or the interaction of planets within a solar system. A simulation allows investigation of a phenomenon without the real-world limitations on time, safety, or budget. For instance, a simulation can be used to investigate the impact of a new drug on the human body without exposing a test subject to the medication. The use of simulations saves both time and money, and it ensures that resources are not wasted in situations where it is not necessary. A simulation produces results that are more accurate than experimental results. The accuracy of the outcome depends on the model's quality and complexity. However, the results from simulations are more accurate than experimental results since simulations can include data that are difficult to collect experimentally. Therefore, the benefits of using a simulation instead of an experiment to make a prediction are A simulation allows investigation of a phenomenon without the real-world limitations on time, safety, or budget, and A simulation can be used to model real-world events that are impractical for experiments.

Learn more about simulation here

https://brainly.com/question/15892457

#SPJ11


Related Questions

An ______ is a simplified image. (4 letters) This is for a paxton paterson

Answers

Answer:

allegory.

p.s: this is the right answer but with out the four letters you need

two's complement allows us to reuse an adder circuit for subtraction. this saves (answer)​

Answers

Answer:

I don't know I only want points

Attest engagements always have:

A) A written subject title.
B) An examination report.
C) Reasonable assurance.
D) Subject matter.

Answers

Attest engagements always have a written subject title, subject matter, and an examination report. The correct option is A) A written subject title; D) Subject matter; and B) An examination report. What is Attest Engagement? Attest engagements are audits or evaluations conducted by one party on behalf of another.

Accountants must be qualified to conduct these procedures, which are designed to assure the stakeholders of an organization that the financial statements provided by that organization are correct.What is reasonable assurance?Reasonable assurance is a type of audit that accountants conduct on behalf of organizations. The purpose of this type of audit is to ensure that an organization's financial statements are accurate and reliable.

Reasonable assurance indicates that accountants are reasonably certain that the financial statements being audited are accurate and dependable, but they cannot guarantee their accuracy.

Read more about organization here;https://brainly.com/question/19334871

#SPJ11

at what layer of the osi model does a network switch normally operate? a. layer 5 b. layer 3 c. layer 4 d. layer 2

Answers

Answer:

D. Layer 2

Explanation:

It is layer 2.

To learn more:

https://brainly.com/question/26299918?referrer=searchResults

Hope this helps!

Alex and Eva play football at the same local football pitches. Alex plays every 4
days and Eva plays every 6 days. They both played football today. After a
fortnight, how many times will they have played football on the same day?*​

Answers

12 days

Alex can only play with eva 4 days. A fortnight is 2 weeks and you can't go over

2. Write a 7-10 sentence paragraph explaining the concept of a spreadsheet. 10​

Answers

Answer:

Explanation: A spreadsheet is considered a configuration of rows and columns. It can also be called a worksheet. Spreadsheets are used for calculating and comparing numerical and financial data.

The values in the spreadsheet can be either basic or derived. Basic values are independent values and the derived values are the outcome of any function or an arithmetic expression.

Spreadsheet applications are computer programs that allow users to add and process data. One of the most widely used spreadsheet software that is used is Microsoft Excel.

A file in an excel sheet is referred to as a workbook and each workbook consists of worksheets where the data is entered for further processing.

The concept of the spreadsheet can be understood with the following terminologies, which are as follows.

Label: Text or special characters are treated as labels for rows, columns, or descriptive information. There is no way of treating the labels mathematically, i.e labels cannot be multiplied or subtracted, etc.

Formulas: Formula refers to a mathematical calculation that is performed on a set of cells. Formulas are represented with an equal sign at the start of the spreadsheet.

impacts of running the parallel algorithm on an even larger number of computers than previously

Answers

Running a parallel algorithm on an even larger number of computers than previously can have both positive and negative impacts.

On the positive side, the increased computing power can result in faster and more accurate results. The parallelization of the algorithm allows for the division of the workload among multiple computers, which can greatly decrease the time required to complete the task. Additionally, the larger number of computers can provide redundancy and fault tolerance, ensuring that the algorithm continues to run even if one or more of the computers fail.

However, there are also potential negative impacts to consider. One issue that may arise is the communication overhead between the computers. As the number of computers increases, the amount of communication required to coordinate the parallel computation may become a bottleneck and slow down the overall performance.

Learn more about parallel algorithm: https://brainly.com/question/19378730

#SPJ11

Which tab do you select to change how you see your Word document on screen?

A: Help
B: Home
C : Review
D: View

Answers

Answer:

D

Explanation:

brainliest pls

A taxi cab costs $1.25 for the first mile and $0.25 for each additional mile. Write an
equation for the total cost of a taxi ride, where x is the number of miles that you can ride for
$8.00.

Answers

Answer:

0.25x+1.25=8

Explanation:

Hope this helps

what do you think is the goal of a ping flood attack? why would someone use this type of attack vector? think about the types of hackers on the internet (authorized and unauthorized).

Answers

think about the types of hackers on the internet (authorized and unauthorized

A Ping Flood attack is an unauthorized attack vector used by malicious hackers to overwhelm a target system with ICMP echo request packets (aka ping packets).

What is unauthorized?

Unauthorized is when a person or entity acts without permission or authorization to do something, often in contravention of established rules or regulations.

The goal of the attack is to overwhelm the target system with so many packets that it becomes unable to respond to legitimate traffic, resulting in a denial of service (DoS) attack. By flooding the target with so many packets, the hacker can effectively prevent the target system from being able to communicate with other systems on the network, denying the intended user access to the system. This type of attack is often used by malicious hackers to disrupt a network or system for their own malicious purposes, such as preventing someone from connecting to a server, disrupting a website or disrupting the operations of a business.

To learn more about unauthorized
https://brainly.com/question/29037358
#SPJ4

This dialogue reflects what aspect of communication?

a.

body language

b.

good listening

c.

working together

d.

leadership


Please select the best answer from the choices provided


A
B
C
D

Answers

Answer:

B.

Explanation:

Write a function called removeconsonants which removes all the consonants in a given phrase. the upper and lower case of the remaining characters should remain unchanged. the input and output phrases are string scalars. the input string could be any length. hint: the function should work for both upper and lower case. at the start of the function, the input string scalar should be converted to a character vector, the characters should be manipulated, and the resulting character vector should be converted to a string scalar upon exiting. restrictions: loops should not be used. the internal functions char(), string(), and ismember() should be used.

Answers

When necessary to increase readability, function names should be written in lowercase and contain underscores to separate words. The same convention is used for function names and variable names. Lower Lowercase all uppercase characters.

Any lowercase letter is converted to an uppercase letter via upper. Each word's first letter is changed to uppercase if it is lowercase by Proper, and any other uppercase letters are changed to lowercase. Using the SQL UPPER function, all the letters in a string are changed to uppercase. Use the LOWER function in its place to convert a string to lowercase. When creating an object with the "new" keyword, the first character of a function's name should only be capitalized, according to the book "Javascript: the Good Parts."

Learn more about the word's first letter  from

https://brainly.com/question/14637016

#SPJ4

what will be the output for;
for i in range(1,6):
if i==3:
print('hello')
break
else:
print(i)
print('done')

Answers

The output for; for i in range(1,6): if i==3: print('hello') break else: print(i) print('done') the output for the given Python program is 001020340.

What is range () in Python?

The python range() function creates a collection of numbers on the fly, like 0, 1, 2, 3, 4. This is very useful, since the numbers can be used to index into collections such as string. The range() function can be called in a few different way.

The given program is as:i =0while i < 5print(i)i +=1if i==3 :breakelse:print(0)It will give the following as result 001020340Hence, the answer is 001020340.

Read more bout the python :

https://brainly.com/question/26497128

#SPJ1

he wants to customize the operating system to meet his needs. what types of tools should he use, and what can he do with each?

Answers

Answer:

remastering iso image

Explanation:

you  can add the gui, default installed program, etc

Please answer in Java
Sale! During a special sale at a store, a 10% discount is taken off of purchases over $10.00.
Create an application that prompts the user for the dollar amount of purchases and then
returns the discounted price, if any. The program should neatly display the subtotal before
the discount, the amount of money discounted (if any), the HST applied to the subtotal and
finally the total. The program should be able to handle negative numbers and give an
appropriate message.
Sample Run #1:
Enter the purchase amount: 9.45
No discount applied.
Subtotal: $9.45
HST: $1.23
Total: $10.68
Sample Run #2
Enter the purchase amount: 15.00
10% discount applied.
Subtotal: $15.00
Discount: - $1.50
HST: S1.76
Total: $15.26

Answers

Answer:

Scanner keyboard = new Scanner(System.in);

   

       

       

        double discount = 0;

        double productPrice;

        double subTotal;

        double salesTax;

        double saleTotal;

       

       

       System.out.printf("Enter the purchase amount:");

       productPrice = keyboard.nextDouble();

       

       if (productPrice > 10) {

          discount = 10;

}

       System.out.println( + discount + "% discount applied.");

       

       subTotal = (productPrice);

       salesTax = (subTotal * 0.14);

       saleTotal = (subTotal + salesTax - discount );

       System.out.printf("Subtotal: $%5.2f\n", subTotal);

       System.out.printf("Discount; -$%5.2f\n", productPrice - discount);

       System.out.printf("HST: $%5.2f\n", salesTax);

       System.out.printf("Total: $%5.2f\n", saleTotal + salesTax);

}

}

Explanation:

How to Fix The ""Trust Relationship Between This Workstation And The Primary Domain Failed"" Error

Answers

Answer:

The "Trust Relationship Between This Workstation and the Primary Domain Failed" error can be caused by a number of issues, but some common steps to fix it include:

Check the network connection: Make sure that the workstation is properly connected to the network and that there are no issues with the network that might be causing the trust relationship to fail.

Check the DNS settings: Ensure that the DNS settings on the workstation are correct, and that the workstation can communicate with the domain controller.

Check the date and time on the workstation: Make sure that the date and time on the workstation are correct, as an incorrect time can cause the trust relationship to fail.

Check the group policy settings: Ensure that the group policy settings on the workstation are correct, and that the workstation is receiving the correct group policy settings from the domain controller.

Check the computer name: Confirm that the computer name is correct and that it is not duplicating with another computer on the network.

Re-join the computer to the domain: If all else fails, one of the most common solutions is to remove the workstation from the domain and then re-join it. This can be done by opening the System Properties on the workstation, and under the Computer Name tab, click on "Change". Then click on "More" and click on "Delete". Now re-join the computer to the domain by clicking on "Change" again and select "Computer Domain" and enter the domain name, then click on OK.

It is important to note that these steps are not exhaustive, and the specific solution to the error may vary

Explanation:

Select three of the five best practices for designing media for the web that are outlined in the lesson. experiment with color experiment with color make sure to format properly make sure to format properly keep it simple keep it simple be careful with fonts be careful with fonts design with one specific browser in mind design with one specific browser in mind

Answers

The best practices for designing media for the web that are outlined in the lesson.

Format properly, design with a particular browser in mind, Be cautious with fonts.What impact does font have on a website's design?

In both print and digital text, many font types are utilized. Although typographic font styles have unique spacing and designs, once chosen, this style will be used for punctuation as well as lowercase and uppercase characters.

Therefore, your visitors' reactions may be significantly affected by the font combination you select. Your website's typography has a big impact on how visitors see it. It can assist in creating a visual hierarchy on the webpage that will direct users' attention to the key elements in the order you want them to look.

Learn more about designing media  from

https://brainly.com/question/26338970
#SPJ1

choose what is the correct to create a function from the following
1.use def keywords
2.use empty function
3.python don,t have function

please i want answer i have ict test

Answers

In python, we use the def keyword to create functions.

Help me, I'll mark brainiest

Help me, I'll mark brainiest

Answers

Answer:

i believe the answers that you are looking for are c and c

Explanation:

again im not 100% sure that is right but i hope they are!

Weaknesses about ICT Technician

Answers

Potential weaknesses of an ICT Technician can work towards improving their performance and increasing their value within an organization.

1. Limited Technical Knowledge: An ICT Technician may not have expertise in all areas of information and communication technology. This could result in difficulty troubleshooting and resolving specific issues.

2. Poor Time Management: Balancing multiple tasks and deadlines may be challenging for some ICT Technicians, leading to delayed work and lower productivity.

3. Communication Skills: ICT Technicians may struggle with effectively explaining technical concepts to non-technical colleagues or clients, causing misunderstandings or frustration.

4. Adaptability: Rapid changes in technology require ICT Technicians to continuously learn and adapt. Some technicians may find it difficult to keep up with the latest developments and apply them in their work.

5. Stress Management: The high-pressure nature of the job, including dealing with urgent issues and tight deadlines, can lead to increased stress levels, potentially affecting job performance and overall well-being.

6. Problem-Solving: Some ICT Technicians may lack strong analytical and critical thinking skills, hindering their ability to efficiently identify and resolve complex technical issues.

7. Teamwork: Collaboration is crucial in an ICT environment, and technicians who struggle with teamwork may negatively impact the overall performance of the team.

By addressing these potential weaknesses, an ICT Technician can work towards improving their performance and increasing their value within an organization.

To Learn More About  ICT Technician

https://brainly.com/question/30363719

#SPJ11

please help will give brainliest

please help will give brainliest

Answers

Answer:

waterfall- google search

Explanation:







5. As a graphic designer, you want to create balance through contrast. To achieve this, you would use A. intellectual unity. B. visual unity. C. Symmetry. D. asymmetry. Mark for review (Will be highli

Answers

As a graphic designer, to create balance through contrast, you would use option D. asymmetry.

This involves placing different elements of varying sizes, shapes, or colors in a way that creates visual interest and balance. By intentionally breaking symmetry, you can create a dynamic composition that grabs attention and keeps the viewer engaged. Intellectual unity, visual unity, and symmetry are also important concepts in design, but they are not specifically related to achieving balance through contrast.

Intellectual unity refers to the cohesion of ideas or concepts in a design, while visual unity refers to the overall coherence and harmony of visual elements. Symmetry is the balanced arrangement of elements on either side of a central axis.

To know more about graphic designer visit :

https://brainly.com/question/11299456

#SPJ11

use a slicer to filter the data in this table to show only rows where the category value is coffee

Answers

Slicers are simply used for filtering data stored in tables. They are very efficient when used on data in pivot tables. The process involves ; Design > Tools > Insert Slicer > Category checkbox > Coffee

From the Design tab, Navigate to Tools which is where the option to insert a slicer would be found.

Select insert slicer, which then sets the different columns as categories.

Check coffee in the category list, and only rows where the category value is coffee will be displayed.

Learn more :https://brainly.com/question/25647517

1. Identify about two to four different buine application in your organization (e. G. E-mail, order fulfillment, cutomer ervice, e-procurement, telehealth etc. ). Decribe which buine application are more amenable to cloud computing and why. If you already implemented cloud functionality for ome of the application, preent the reaon why you decided to move to the cloud. Identify which platform (e. G. Amazon AWS or Microoft Cloud) you would ue for cloud implementation

Answers

Four different buine application in your organization are MicsoSoft office 365 (Saas) for Email services, Oracle Netsuite (saas) for order fuifilment, Zen desk for customer service, vitro commerce

let us consider there is an organization That organization Consists of 100 employees.

It require Some business application like,

MicroSoft office 365 (Saas) for Email services

Oracle Netsuite (saas) for order fuifilment

Zen desk for customer service.

vitro commerce e-procurement solution for E - procurement and Aws (paas) for hardware and software solution.

All these business applications are amenable to cloud computing for the organization because of Cost-effectiveness,

steam line the flows of work and services

Time saving

unlimited storage

backup and Mobility.

The on -demand Self-service with advanced online

The term "use" refers to the advantages derived from an item or service. The "application" refers to the usage of the service or product to achieve the advantage in several domains.

Learn more about Application here:

https://brainly.com/question/28650148

#SPJ4

n administration needs to store the id of record type of later use in a flow. which kind of variable should the administrator use?

Answers

The best option for an administrator to store the ID of a record type for later use in a flow is to use an ID variable. Option B is correct.

ID variables can store the unique identifier of a record, which is a 15- or 18-character string that Salesforce generates to uniquely identify each record. The ID variable can later be used to reference the record in different operations, such as creating, updating, or deleting the record.

Boolean variables can only store true or false values and are not appropriate for storing record IDs. Record variables can store an entire record, not just the ID, and are typically used when passing data between different parts of a flow.

Text variables can store text strings, but they are not optimal for storing record IDs since they do not provide the built-in data type validation and functionality of ID variables.

Therefore, the correct answer is B.

An administrator needs to store the ID of a recordtype for later use in a flow.

Which kind of variable should the administrator use?

A. Boolean variable

B. ID variable

C. Record variable

D. Text variable

Learn more about record types https://brainly.com/question/30848232

#SPJ11

Think back on the Font Tester App. Can you think of an example of another app or feature of an app which would use a loop to control different elements on a screen?

Answers

Answer:

The search bars in search engines to find the most reliable information.  

Explanation:

Loops are very powerful concept in programming as they allow the performance of complex and repetitive task without having to repeat lines of code each time the task is to be performed. An example of an application which uses a loop to control elements on a screen is a shopping application.

Shopping applications are built to allow customers shop conveniently using their smart devices, pay and make decisions on retrieval of the selected items.

Using a for loop, all selected items can be appended to a list which is called cart. This displays the number of selected items which is the number of items in the customer's cart.

Using a loop, the cart is iterated and the total sum of the goods are displayed.

If bonuses are available or discount for a certain product or groups, a loop can be used to effect the discount on the shopper's fee.

Therefore, most applications require the use of loops in other to avoid writing bulky and efficient programs.

Learn more :https://brainly.com/question/15727806

If an 8-bit binary number is used to represent an analog value in the range from 010 to 10010, what does the binary value 010011102 represent?

Answers

Converting the binary number 01001110 to decimal, we get 78. Therefore, the analog value represented by the binary number 01001110 is 78 within the given range.

To determine the analog value represented by the binary number 01001110, we need to understand the range and precision of the binary representation.

Given that the 8-bit binary number represents an analog value in the range from 010 to 10010, we can deduce the following:

The smallest analog value represented is 010, which corresponds to the binary number 00000010.

The largest analog value represented is 10010, which corresponds to the binary number 10010010.

To find the analog value represented by the binary number 01001110, we need to map it within the range. Since the binary number is 8 bits, it corresponds to an 8-bit binary representation.

Know more about binary number here;

https://brainly.com/question/28222245

#SPJ11

______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.

Answers

Safety stock inventory management  refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.

What is Safety stock inventory?

Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.

Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.

Learn more about Safety stock inventory form

https://brainly.com/question/26954616

How do they disguise the cameras placed around the secret cove?

Answers

Answer:

Portions were filmed secretly in 2007 using underwater microphones and high-definition cameras disguised as rocks.

Portions were filmed secretly using underwater microphones and high-definition cameras disguised as rocks.

1. What pricing strategy is used by local electric
distributors/retailers in charging us monthly electric bills?

Answers

Local electric distributors/retailers are the ones that distribute and sell electricity to the consumers.

They need to have a pricing strategy to charge the consumers a fair price for their services. There are different pricing strategies used by these companies to charge the monthly electric bills.One of the most common pricing strategies used by local electric distributors/retailers is the Cost-plus pricing strategy. This strategy involves adding a markup to the total cost of providing the service. The markup is added to cover the expenses and generate a profit for the company. This pricing strategy is commonly used by regulated utilities as the markup is reviewed and approved by the regulatory commission.

The second pricing strategy is the value-based pricing strategy. This strategy involves charging the customers based on the value they receive from the service. For example, a customer who consumes more electricity will be charged more. This pricing strategy is common in competitive markets where different electric distributors/retailers are competing to win customers.The third pricing strategy is the demand-based pricing strategy. This strategy involves charging the customers based on the demand for electricity.

During peak hours, when the demand is high, the price of electricity is high. During off-peak hours, when the demand is low, the price of electricity is low. This pricing strategy is used to encourage the customers to use electricity during off-peak hours and reduce the load during peak hours.In conclusion, local electric distributors/retailers use different pricing strategies to charge the consumers monthly electric bills. The choice of pricing strategy depends on various factors such as the regulatory environment, market competition, and customer demand.

Learn more about customer :

https://brainly.com/question/13472502

#SPJ11

Other Questions
What system of equations would you use to solve the problem below?The admission fee for an amusement park is $12 for adults and $6.50 forchildren. One weekend, 2904 people paid admission for the amusement park,and the park made $27,126. How many adults and how many children paid togo to the amusement park that weekend?O A. a+c= 18,512a + 6.5c = 27,126O B. a+c= 290412a + 6.5c = 27,126O C. a+c= 27,12612a + 6.5c = 2904O D. a:c= 290412a: 6.5c = 27,126 Julie filed a valid extension for her 2020 tax return, giving her until October 15, 2021, to file her return. She filed her return on November 1 and paid $2,000 of tax due. For what period of time will Julie be subject to interest Book value is the same asA. retained earnings.B. fixed assets minus long- term debt.C. Net worth.D. Current Which of the following is NOT a correct match between endocrine gland and hormone?o ovaries------------estrogentestes---testosteronepancreas-------insulinpineal ------------norepinephrine Can someone please help me with this? The product of 7 and a number is greater than 42. If the number is a whole number less than 10 , what could the number be? HELP ME!!! Find the surface area of the prism Apparel designers and merchandisers research color trends one to two years in advance of the season by? What are utopian beliefs? Which sentence best conveys the author's message in the story?A HelpingLily had forgotten all about her English project until the weekend before it wasgood grade. Lily decided to call Kim, her best friend, to cancel their plans go tolooking forward to watching the movie and spending time together.Lily and Kim had been in school together since first grade. A year ago, Lily's pardifferent schools, Kim and Lily didn't get to meet every day anymore.When Lily called her to cancel their plans, Kim came up with a perfect solution. Sso they wouldn't have to miss the movie.Lily's class was doing a presentation on poets and writers. Lily had chosen her faneeded to be done. They had to download information from the InternetHelp corn is a typical c4 plant, associated with open grasslands. (True or False) The deepest stage of sleep is A. Stage I. B. Stage III. C. Stage II. D. REM sleep. the main enzyme of glycogen catabolism is _____, which catalyzes a _____ reaction. While doing the necessary detective work can be tedious and time-consuming studying the strategies? A perfectly spherical orange is split into four equal sections. if the radius of the orange is 4 centimeters, what is the total surface area of one slice? 16 cm2 32 cm2 24 cm2 64 cm2 Why do we not usually get the same exact illness twice?(1 Point)A. Memory cells are produced as a result of specific immune repsonseB. Cytotoxic T cells live forever in the bodyC. Antiobodies last foreverD. Additional infections always trigger an inflammatory response. A client is administered succinylcholine and propofol for induction of anesthesia. One hour after administration, the client demonstrates muscle rigidity with a heart rate of 180. What should the nurse do first Agree Or Disagree: Light can travel through materials that you cannot see through, like wood or aluminum foil. A church has a brick planter at the base of their sign. The planter is in the shape of a right triangle. The legs of the triangle measure ten feet. If the planter has a height of two feet, find its volume. Assume that the following data relative to Kane Company for 2021 is available: Net Income $2,100,000 Transactions in Common Shares Change Cumulative Jan. 1, 2021, Beginning number 700,000 Mar. 1, 2021, Purchase of treasury shares (60,000) 640,000 June 1, 2021, Stock split 2-1 640,000 1,280,000 Nov. 1, 2021, Issuance of shares 240,000 1,520,000 6% Cumulative Convertible Preferred Stock Sold at par, convertible into 200,000 shares of common $1,000,000Stock Options Exercisable at the option price of $25 per share. Average market price in 2021. $30 (market price and option price adjusted for split). 90,000 sharesRequired:a. Compute the basic earnings per share for 2021. b. Compute the diluted earnings per share for 2021.