Write a loop that reads positive integers from console input, printing out those values that are even, separating them with spaces, and that terminates when it reads an integer that is not positive. Declare any variables that are needed.

Answers

Answer 1

Hello, since you did not specify a programming language, I wrote this algorithm in C++. Good luck!

Code:

#include <iostream>

#include <vector>

std::vector<int> v;

int main(int argc, char* argv[]) {

   while(1) {

   int temp;

   std::cout << "\nEnter a number: ";std::cin>>temp;

   

   if(temp<0) {

       std::cout << "\nEven number(s) is/are:\n---------------------\n";

       for(int i=0;i<v.size();i++) {

           if(v.at(i)%2==0) std::cout << v[i] << " ";

           else continue;

       }

       std::cout << std::endl;

       break;

   }else {

       v.push_back(temp);

   }

}

   return 0;

}

Write A Loop That Reads Positive Integers From Console Input, Printing Out Those Values That Are Even,

Related Questions

coding practice 1.9 project stem

Answers

The coding practice is an illustration of file manipulation

What are file manipulations?

File manipulations are program statements used to read, write and append to files

The program in Python

The program written in Python, where comments are used to explain each line is as follows

# This opens the file in read mode

text = open("myFile.txt", "r")

# This reads each line of the file

eachLine = text.readLine()

#This iterates through the lines

while(eachLine):

# This prints the text on each line

print(eachLine)

# This reads the next line

eachLine = text.readLine()

#This closes the file

text.close()

Read more about file manipulation at:

https://brainly.com/question/16397886

___ testing may begin before the program is 100% complete in order to test particular sections of code in a reply to discreet functions or modules

A. Dynamic.

B. Static.

C. Visual.

D. Gray-box.

Answers

Gray-box testing may begin before the program is 100% complete in order to test particular sections of code in a reply to discreet functions or modules. Hence option d is correct.

What is the testing

Gray-box experiment is a type of operating system experiment where the exploratory has prejudiced information of the within operation of the system being proven.

It connects ingredients of two together vital and static experiment approaches. In silver-box experiment, the exploratory has approach to some news about the within form or law of the spreadsheet but does not have full information or perceptibility into the exercise analyses.

Read more about Gray-box. testing here:

https://brainly.com/question/29590079

#SPJ1

Laura is confused with the spelling of the word pronunciation. She types the word as pronounciation. Which feature of the Autocorrect tool should she use, so that the word processor automatically corrects it? PLS HELP!!!

Answers

The right answer is “replace”

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the following becomes even more essential to the assurance of the network? a. boundary routing b. classless inter-domain routing (cidr) c. internet protocol (ip) routing lookups d. deterministic routing

Answers

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at https://brainly.com/question/14793460.

#SPJ4.

Lisa is looking at a photograph of her parents, and it appears as if the image was covered with granules of sand. What is responsible for this effect?
O A high brightness
OB. bad lighting
O C. low exposure
O D. too much noise

Answers

Answer:

B, bad lighting.

Explanation:

The granules of sand are caused by image noise. Image noise can be defined as appearance of undesired traces and variations in the brightness or color of your image.

Image noise is caused by lighting variation.

There for, the correct answer would be: B, bad lighting.

analog data is of ......... continuous nature
plz say ans if u know

Answers

Pretty sure it is one continuous variable

Which command can be used to modify the TCP/IP routing table? O. nslookup O tracertO routeO ipconfig O netstat

Answers

The "route" command can be used to modify the TCP/IP routing table.

The "route" command allows the user to view and modify the routing table, which is used to determine the path that network data takes as it travels from one device to another.

The route command can be used to add, delete, or change entries in the routing table, as well as to display the current contents of the table. For example, the "route add" command can be used to add a new entry to the routing table, while the "route delete" command can be used to remove an existing entry. The command can also be used to modify the metric value of a route which is used to determine the best path to a destination.

Learn more about command, here https://brainly.com/question/27742993

#SPJ4

The route (third O option) is the command can be use to modify the TCP/IP routing table.

What is TCP?

TCP stand for Transmission Control Protocol  defines as a standard which defines how to set up and preserve a network conversation by which applications could trade data. TCP runs with the Internet Protocol (IP), that defines how computers addressed packets of data to one another. Because of TCP works cant separate from IP, they also called as TCP/IP. There are four layers of the TCP/IP Model, they are Internet Layer, Host to Host Layer, Network Access Layer, and Application Layer. This layers are using one of the this 7 protocol: DHCP, FTP, HTTP, SMTP, Telnet, SNMP and SMPP.

Learn more about TCP here

https://brainly.com/question/17387945

#SPJ4

the process of breaking a string down into smaller string components is called tokenizing. question 24 options: true false

Answers

The statement is true. Machines can comprehend and analyze natural languages with the aid of natural language processing.

NLP is a machine learning-based process that automates the process of extracting the necessary information from data. Dependency parsing, also referred to as syntactic parsing in natural language processing (NLP), is the process of giving a sentence a syntactic structure and determining its dependency parses. Understanding the relationships between the "head" words in the syntactic structure depends on this procedure.

Given that each sentence may contain multiple dependence parses, dependency parsing can be a little complicated. Ambiguities are several parse trees. These ambiguities must be cleared up for dependency parsing to successfully assign a sentence's syntactic structure.

Learn more about processing here-

https://brainly.com/question/17033890

#SPJ4

The CPU is a 8-bit computer with 16 bit address lines. You must connect 8 KB of ROM and 16KB of RAM to the CPU. 2. few constraints: a. Memory chip size for both the ROM and RAM chips is 4 KB. b. You can choose any chip select circuit that you want to use. 3. The design must look nice and have the following components: a. The ROM address has to start from 0000H. You must figure out the various address ranges and show them clearly in your design. b. The design should be legible and must clearly show all the components including CPU, memory chips, CS circuit(s), ALE signals etc. c. The design must use the least number of resources. d. Write a short memo of the various decisions that you took for the design, and why you took them

Answers

The design requires connecting an 8-bit CPU with 16-bit address lines to 8 KB of ROM and 16 KB of RAM. The memory chips are 4 KB in size, and a chip select circuit needs to be implemented.

To design the memory layout for the given constraints, we can divide the ROM and RAM chips into multiple sections to cover the required address ranges.

For the ROM, since it is 8 KB in size and each chip is 4 KB, we can use two ROM chips. The first chip can be connected to the lower address range, 0000H to 3FFFH, and the second chip can be connected to the upper address range, 4000H to 7FFFH.

For the RAM, since it is 16 KB in size and each chip is 4 KB, we can use four RAM chips. The first chip can be connected to the lower address range, 0000H to 3FFFH, and the remaining three chips can be connected to the higher address ranges, 4000H to BFFFH.

To ensure proper chip selection, a chip select circuit can be implemented using decoding logic. This circuit will generate the chip select signals based on the address lines from the CPU.

The design should be presented in a clear and organized manner, visually depicting the CPU, memory chips, chip select circuit, and address ranges. A short memo explaining the design decisions should be included, highlighting the rationale behind the choices made to meet the given requirements.

Learn more about memory design here:

https://brainly.com/question/33326330

#SPJ11

a zone id is used to distinguish which interface an ipv6 unique local ipv6 address is bound to. true or false?

Answers

The statement "a zone ID is used to distinguish which interface an IPv6 unique local IPv6 address is bound to" is true, because A zone ID is a number that is appended to the IPv6 address to indicate the interface or link that the address is associated with.

This is particularly useful for unique local IPv6 addresses, which are not globally routable and may be used on multiple interfaces within a network.

By including a zone ID, it is possible to distinguish between the same unique local IPv6 address used on different interfaces. For example, an IPv6 address with a zone ID of 1 would be associated with interface 1, while the same IPv6 address with a zone ID of 2 would be associated with interface 2.

Learn more about zone ID

https://brainly.com/question/10397692

#SPJ11

Assignment 4: Evens and Odds
Need help on this

Assignment 4: Evens and OddsNeed help on this

Answers

Answer:

any even number plus 1 is odd

.Use the element that displays text in italic to add emphasis to the words "HTML Basics".
used HTML Basics, but didn't work, why?

Answers

To display text in italic using HTML, you can use the <em> or <i> element. Both elements are used to indicate emphasis, and will display the enclosed text in italic font by default.

If you tried using the elements but they didn't work, there may be several possible reasons why this happened. One possibility is that there is a mistake in the HTML code, such as a missing closing tag or a typo in the element name. Another possibility is that the CSS styles applied to the document may be overriding the default italic font style for the <em> or <i> elements.

To troubleshoot the issue, you can try validating the HTML code using an online validator, or using the browser's developer tools to inspect the styles applied to the element and see if there are any conflicting styles.

To learn more about HTML : https://brainly.com/question/24065854

#SPJ11

You expect the price of intel stock to be $52.20 next year. the company forecasts to pay a dividend of $2.00 next year. the stock has a beta of 1.1. the risk-free rate is 4% per year, and the return on the market portfolio is 12%. according to the capm, what is the fair price of intel stock

Answers

According to the CAPM, the fair price of Intel stock is $15.63. However, it's important to note that this is just an estimate based on certain assumptions, and the actual price may vary based on market conditions and other factors.

The Capital Asset Pricing Model (CAPM) is a popular financial model used to determine the expected return on an investment, based on the risk-free rate, market risk premium, and beta. Using the given information, we can calculate the fair price of Intel stock based on the CAPM. The formula for the CAPM is as follows:

Expected return = risk-free rate + beta x (market return - risk-free rate)

First, we need to calculate the market risk premium, which is the difference between the market return and the risk-free rate:

Market risk premium = market return - risk-free rate
Market risk premium = 12% - 4%
Market risk premium = 8%

Next, we can calculate the expected return using the CAPM formula:

Expected return = 4% + 1.1 x 8%
Expected return = 12.8%

Finally, we can use the dividend discount model (DDM) to determine the fair price of Intel stock, given the expected return and dividend payment:

Fair price = Dividend / (Expected return - Growth rate)

Since we do not have a growth rate, we will assume it to be zero. Therefore, the fair price of Intel stock can be calculated as follows:

Fair price = $2.00 / (12.8% - 0%)
Fair price = $15.63

To learn more about Capital Asset Pricing Model, visit:

https://brainly.com/question/28139160

#SPJ11

X267: Recursion Programming Exercise: Cumulative Sum For function sumtok , write the missing recursive callL. This function returns the sum of the values from 1 to k. Examples: sumtok (5) -> 15 public int sumtok( int k) { if (k <= 0) { return 0; } else {
return <> } }

Answers

Recursion programming is a technique used in computer programming where a function calls itself in order to solve a problem. In the case of the sumtok function, we want to find the sum of the values from 1 to k using recursion.

To solve this problem recursively, we need to break it down into smaller subproblems. In this case, we can start by finding the sum of the values from 1 to k-1, and then add k to this sum.

Therefore, the missing recursive call in the sumtok function should be:

return k + sumtok(k-1);

This will keep calling the sumtok function recursively until the base case is reached (when k is less than or equal to 0). Once the base case is reached, the function will start returning the values to the previous recursive call until the final sum is obtained.

In summary, the sumtok function uses recursion programming to find the sum of values from 1 to k. It breaks the problem down into smaller subproblems by calling itself recursively and returns the final sum once the base case is reached.

For more information on Recursion programming visit:

brainly.com/question/29557618

#SPJ11

ASAP in the middle of this quiz Which of the following arguments might convince a local school board of the need to train upper elementary school students in IT practices?


A As technology continues to advance rapidly, the need for IT professionals grows, providing more opportunities for employment of individuals skilled and experienced in the field of IT.

B Brain research shows that elementary students are better able to understand complex procedures; therefore, upper elementary students are more likely to understand the principles of IT than high school or college students.

C School computers break down often because of student use; therefore, the students should be responsible for fixing them.

D Computers are the wave of the future; therefore, elementary students should have a complete understanding of how they function.

Answers

Answer:

A.

Explanation:

Answer D seems too simplistic, and the question specifically mentions IT practices.

Question B doesn't seem right - college and high school students would likely be able to understand the principles as much.

Question C wouldn't be a good argument for a school board, and there's not a lot of evidence that backs it up.

Therefore, A seems to be the best choice here.

Hope this helps!

Jason works for a restaurant that serves only organic, local produce. What
trend is this business following?

digital marketing
green business
e commerce
diversity

Answers

Answer:

green buisness

Explanation:

green business because it’s all natural and it’s organic

important of internet​

Answers

Answer

The Internet connects computers and businesses, people, government schemes, lives and stories worldwide

Which of the following are signatures for constructors in the Rectangle class?

----Choose all options that apply.-----


A. Rectangle(double len1, double len2, double len3, double len4)

B. Rectangle(double len)

C. Rectangle(int len)

D. Rectangle(int len, int wid)

E. Rectangle()

F. Rectangle(double len, double wid)

Answers

Answer to this answer is B because

constructor is a special method that's also called once memory is allocated for a freshly constructed object to initialize it, and further  discussion can be defined as follows:

It has the same identity as the class or struct, so it normally sets up the new object's data members.In the Rectangle class if it calculates the area. so, it takes two parameters that are "length, width", that is equal to "Rectangle(int len, int wid)".

Therefore, the final answer "Option D".

Learn more:

brainly.com/question/14239397

What property of virtualization allows entire virtual machines to be saved as file that can moved or copied like any other file?
Question 2 options:
Isolation
Hardware Independence
Partitioning
Encapsulation

Answers

The property of virtualization that allows entire virtual machines to be saved as a file, which can be moved or copied like any other file, is known as Encapsulation. Correct answer: letter D.

This is because the entire virtual machine is encapsulated in a single file. This single file can be moved or copied like any other file, allowing for greater flexibility in the use of virtual machines. With this property, entire virtual machines can be backed up and moved to different dates or even to different computer systems.

What are virtualization properties?

Are the characteristics of virtualization that allow for efficient use of hardware and software resources. Examples of virtualization properties include:

EncapsulationVirtual machinesVirtual networksCloud computingVirtual storage

These properties allow for increased flexibility, scalability, and cost savings when using virtualized resources. They also allow for better security, by allowing for the separation of resources and allowing for multiple layers of security. Virtualization properties also allow for greater performance, by allowing for more efficient use of hardware resources.

Learn more about virtualization properties:

https://brainly.com/question/12972001

#SPJ4

Ben is writing web page content on a newly launched gaming gadget. He has to use hyperlinks to help visitors navigate to web pages that deal with other types of electronic gadgets. Where should he place the hyperlinks in the web page?

Answers

Answer:

at the bottom of the web page

Explanation:

Ben is creating a web page content for the gaming gadget that  has been newly launched. He uses hyperlinks so that the visitors can navigate the web pages properly which deals with some other electronic gadgets also. So Ben should place the hyperlinks at the bottom of the web page as it will provide anyone viewing the web pages easily.

2 - explain why we do not need to consider the case where the right child of a node r is an internal node and its left child is a leaf node, when implementing the down heap operation in a heap data structure?

Answers

In this situation, we do not need to consider the case where the right child of a node r is an internal node since we want to keep an almost complete binary tree.

How to illustrate the information?

In a down heap operation, we basically want to re heapify the heap to make it work like either a min heap or a max heap, depending on what we want to create, so we start from the root node and traverse from top to bottom, considering each node that violates a heap property and swapping nodes with children nodes of the minimum value in the case of a min heap and the maximum value node in the case of a max heap.

We don't have a case where the right child is an internal node and the left child is a leaf node because, in any heap, we want to keep an almost complete binary tree and fill the tree only level by level, from left to right. As a result, no node in the heap can have the right child be an internal node and the left child be the leaf.

Learn more about node on:

https://brainly.com/question/29433753

#SPJ1

Which is an example of a table style option?

O banded columns
O shading
O borders
O pen color

Taking the unit test please help ASAP

Answers

Answer:

a. banded columns

Explanation:

A table style is a collection of attributes that are used to format tables. With table styles, formatting such as borders, row strokes and column strokes can be applied to the table.

There are six options in the table style option in Microsoft word. They are;

i. Banded rows: shows banded rows in which odd rows are formatted differently from even rows.

ii. Banded columns: shows banded columns in which odd columns are formatted differently from even columns.

iii. First column: shows special formatting for the first column of the table.

iv. Last column: shows special formatting for the last column of the table.

v. Header row: shows special formatting for the first row of the table.

vi. Total row: shows special formatting for the last row of the table.

To show these options;

i. First insert a table in the document

ii. Click anywhere on the table and a 'Table tools' option will appear at the top of the menu bar.

iii. Click on the 'design tab' of the 'Table tools' and the table style option ribbon will appear at the top left of the page. A figure showing this has been attached to this response.

Which is an example of a table style option?O banded columnsO shadingO bordersO pen colorTaking the unit

how to construct binary trees from inorder and preorder traversals

Answers

The steps listed below can be used to create a binary tree from its inorder and preorder traversals: Create a new node with the value of the first element you selected from the preorder traversal.

The left child and the right child are the only two children that each node may have in a binary tree, which is a type of tree data structure. When it comes to searching, sorting, and data compression, binary trees are frequently employed in computer science. Each node in a binary search tree has a key or value, with the left child having a value that is less than its parent and the right child having a value that is greater. Binary search trees are a useful tool for quickly locating values in a collection because of this characteristic. Hierarchical structures like file systems or family trees can also be represented using binary trees.

Learn more about binary tree here:

https://brainly.com/question/13152677

#SPJ4

Which web design concept is most closely related to elements that symbolize the real world? A. node B. landmark c.metaphor IN D. way finding​

Answers

Answer:

landmark

Explanation:

You are required to write a program which will convert a date range consisting of two
dates formatted as DD-MM-YYYY into a more readable format. The friendly format should
use the actual month names instead of numbers (eg. February instead of 02) and ordinal
dates instead of cardinal (eg. 3rd instead of 03). For example 12-11-2020 to 12-11-2022
would read: 12th of November 2020 to 12th of November 2022.
Do not display information that is redundant or that could be easily inferred by the
user: if the date range ends in less than a year from when it begins, then it is not
necessary to display the ending year.
Also, if the date range begins in the current year (i.e. it is currently the year 2022) and
ends within one year, then it is not necesary to display the year at the beginning of the
friendly range. If the range ends in the same month that it begins, then do not display
the ending year or month.

Rules:
1. Your program should be able to handle errors such as incomplete data ranges, date
ranges in incorrect order, invalid dates (eg. 13 for month value), or empty values
2. Dates must be readable as how they were entered

Answers

The program which will convert a date range consisting of two dates formatted as DD-MM-YYYY into a more readable format will be:

from datetime import datetime

def convert_date_range(start_date, end_date):

   start_date = datetime.strptime(start_date, '%d-%m-%Y')

   end_date = datetime.strptime(end_date, '%d-%m-%Y')

   return f"{start_date.strftime('%B %d, %Y')} - {end_date.strftime('%B %d, %Y')}"

# Example usage:

start_date = '01-04-2022'

end_date = '30-04-2022'

print(convert_date_range(start_date, end_date))  # Output: April 01, 2022 - April 30, 2022

How to explain the program

In this code example, we first import the datetime module, which provides useful functions for working with dates and times in Python. Then, we define a function called convert_date_range that takes in two arguments, start_date and end_date, which represent the start and end dates of a range.

Inside the function, we use the datetime.strptime() method to parse the input dates into datetime objects, using the %d-%m-%Y format string to specify the expected date format. Then, we use the strftime() method to format the datetime objects into a more readable string format, using the %B %d, %Y format string to produce a string like "April 01, 2022".

Learn more about program on:

https://brainly.com/question/1538272

#SPJ1

Early computer storage in the 1950's used___
thumb drives
CDs
punch cards

Answers

Answer:

punch cards is the answer of this question

Answer:

it's answer is

punch cards

Write a program to display "HELLO WORLD" ​

Answers

Explanation:

Here's a simple "Hello, World!" program written in Python:

```python

print("HELLO WORLD")

```

To execute this program, you need to have Python installed on your computer. Save the code above to a file named `hello_world.py` and then run it using the command `python hello_world.py` in the terminal or command prompt.

After visiting (reading) the oracle outputstream class link at the end of chapter 9 of the zybook, identify which method of the outputstream class should be called to force any buffered output bytes to be written?

Answers

Flush. This output stream is flushed, requiring any output bytes that were buffered to be written out. following accessing (reading) the link for the Oracle OutputStream Class at the conclusion of Chapter 9 of the zy-book.

This output stream is flushed, requiring any output bytes that were buffered to be written out. The general agreement with flush is that invoking it indicates that any previously written bytes that have been buffered by the output stream implementation should be promptly sent to their appropriate destination.

Flushing the stream only ensures that previously written bytes are passed to the operating system for writing; it does not ensure that they are actually written to a physical device like a disc drive if the intended destination of this stream is an abstraction provided by the underlying operating system, such as a file.

Nothing is done by OutputStream's flush function.

Learn more about Flush here:

https://brainly.com/question/15877268

#SPJ4

What term is defined as software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development? open well open well open use open use open pit open pit open source

Answers

A terminology which is defined as software that allows users to use and adapt it for any purpose, often allowing the public to participate in further development is: open source.

The types of software license.

In Computer technology, there are four (4) main types of software programs based on usage rights and these include the following:

Freeware softwarePurchased licenseShareware softwareOpen source software

What is an open source software?

In Computer technology, an open source software can be defined as a terminology which is used to describe a type of software that all end users can use and adapt it for any purpose or modify it for free without paying any license fee (money).

Read more on software here: brainly.com/question/25703767

#SPJ1

which fields in the contact form is used to control the order in which contacts are displayed in the current view?

Answers

Answer:

The answer is "File As"

Explanation:

The file is a data collection, that is processed either by filename in a single system. It could be a text, an image, a sound or a streaming server, a software collection, an and app, and other data collection. In this, the File As the field is used to order in connections that are displayed in the original understanding was controlled by using the contact-form sector.

Other Questions
You are the manager of a firm that receives revenues of $40,000 per year from product X and $70,000 per year from product Y. The own price elasticity of demand for product X is -1.5, and the cross-price elasticity of demand between product Y and X is 1.6. How much will your firm's total revenues (revenues from both products) change if you increase the price of good X by 1 percent? Instructions: Enter your response rounded to the nearest dollar. From his comments in Act 1, it can be inferred that Parriss concern for his daughter is primarily based on his:A. Anxiety about his reputation B. Fear for the fate of her soulC. Great love for his only childD. Terror of the devil Water is put into a pot and then heated on a stove. It is then removed and allowed to cool to room temperature someone help me thank you More than ________ percent of Australia's exports now go to Asia; only ________ percent are shipped to Europe. the nurse is explaining vasovagal syncope to a client. what does the nurse associate the temporary loss of consciousness with for the client? Dew forms when the air temperature is low enough for water in the air to condense on outdoor surfaces. At what time would you expect to see dew, according to the graph? Explain your answer: (claim, evidence, reasoning)State your claim!Provide evidence to your claim.State the reasoning behind your claim.Report on one other person's post.State whether or not you agree or disagree with the person's claim, evidence and reasoning.State why you agree or disagree and provide reasoning why you agree or disagree. Which of these is not a habitat a mountain,a desert,the world ,or a rainforest ERD can be drawn by hand. However, it must be scanned and uploaded to a digital file (Words, PPT, PDF, or JPEG only). FedEx wants to develop a company-wide information system. Shipped items are the heart of the FedEx product tracking information system. Shipped items can be characterized by item number, weight, dimensions, insurance amount, destination city, and final delivery date. Shipped items are received into the FedEx system at a single retail center. There are multiple retail centers in big cities such as LA NY, etc. Each of the retail centers has one of the four types: FedEx office, FedEx Ship Center, Otfice Depot, and FedEx Authorized Ship Center. Shipped items make their way to their destination via one or more standard UPS transportation events (ex. Flights, ships, truck deliveries). These transportation events are characterized by schedule, a type (eg. flight, truck, ship), and a delivery route. 1. Please create an Entity-Relationship diagram that captures this information about the FedEx system. - Please identify primary keys, foreign keys, and cardinality constraints. - Please solve many-to-many relationship problems if you have any here. - If you have any assumptions, please identify those assumptions (User-defined constraints). HINT To do this homework, you should have AT LEAST three entities: Retail Center, Shipped Items, and Transportation Event. Please think carefully As I described above, one shipped item belongs to only one retail center. However, the shipped item can have many transportation events Think about the real situation. In the case of international carga the cargo travels across the continent using ships or airplanes and then the cargo travels by ground transportation) 2. After you finish your ERD, please create ER Data Model with ten records in each of the all entities (Be careful, some of the information has been provided already in the text - eg, retail center type: FedEx office. FedEx Ship Center, Othce Depot, and Fed Ex Authorized Ship Center). 3. Create a Relational Schema for this ERD. 4. If FedEx wants to track the total insurance amount, destination, type of the retailer center, and location of the retailer center where the destination city is LA, how will you as an employee in FedEx write the SQL code? figure p16.8 shows a smooth vertical wall retaining a sandy backfill underlain by clay. assuming that the entire soil is in the active state, determine the magnitude and location of the resultant active force on the wall. 4.0 cm north + 3.5 cm west In building economic models , economists assume peoplebehave A. rationally B. greedily C. instinctively D.irrationally Which of the following does not have the force and effect of "law?" A Revenue Ruling. A final administrative regulation. A Tax Court decision A section of the Internal Revenue Code. All of the above have the force and effect of law. Metcalfe and Wiebe (1987) studied whether people could anticipate how close they were to solving algebra problems and the cheap necklace problem (an insight problem - also known as the chain problem). What was their main finding Company ABC issued a 5-year bond 1 year ago with a face value of $1000 and a coupon rate of 8% per annum. The bond pays interest semi-annually, if the yield to maturity based on market pricing on this bond is 9%, what is the price of the bond? Is this bond trading at a premium, par or discount? Why? What is an example of a water reservoir? A free market is one where decisions regarding what and how much to produce are made by the market itself. This market is made up of buyers and sellers negotiating prices for goods and services. It is generally accepted that there are four degrees of competition within a free-market system. These include perfect competition, monopolistic competition, oligopoly, and monopoly. One benefit of the free market is that it allows open competition among companies. Businesses must provide customers with high-quality products at fair prices with good service. If they don't, they lose customers to businesses that do. Select the degree of competition that best describes each listed industry or business based on the description. 1. Automotive Industry: In this industry, there are a few sellers that tend to dominate the market. the parts of the brain that enable consciousness and our ability to communicate that awareness are located in the: what do you see in the picture? specifically pls This introduces an applicant and the applicants rsum to a potential employer:a.Personal Goal Statementb.Cover Letterc.Job Applicationd.Reference