how is it possible that these classes can provide behavior when they have no code in the body of the class?

Answers

Answer 1

Therefore, while interfaces can be used to indicate the common functionality that will be shared between multiple instances without actually constructing that functionality for them, abstract classes can be used to group and share functionality. Both can, albeit in different ways, assist you in shrinking your code.

Which methods may the child class inherit?

You can use the inherited methods exactly how they are right now. You can override a superclass method by creating a new instance method in the subclass that has the same signature. To conceal it, a new static method with the same signature as the one in the superclass might be written and placed in the subclass.

What real-world instance of abstraction can you give?

A few further examples of abstraction from the real world are as follows: cake baking Abstraction is used when following a recipe to make a cake. In this case, you are merely completing the processes required to make and bake the batter.

To know more about body of class visit;

https://brainly.com/question/19924646

#SPJ4


Related Questions

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3
Group of answer choices

3

4

6

7

9

2

10

5

12

8

1

11

Answers

Note that the output of the code given above is: 5.

What is the explanation of the above analogy?

Given that the value of c is 2

2 < 12 (true statement)

print

c = c + 3

i.e, c = 2+3

Therefore, the answer is 5.

It is to be noted that in computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code). It is also the name given to the source code after it has been compiled and is ready to execute on a computer (i.e., the object code).

Learn more about codes:
https://brainly.com/question/28848004
#SPJ1

(100 POINTS!!!) Using Python, do this problem.

(100 POINTS!!!) Using Python, do this problem.

Answers

Answer:

def calculateDose(weight):

 doseList = [(5.2, 1.25), (7.9, 2.5), (10.4, 3.75), (15.9, 5.0), (21.2, 7.5), (0,10.0)]

 for dose in doseList:

   if (weight < dose[0]): return dose[1]

 return doseList[-1][1]

for weight in [8,18,25]:

 print('A child that weighs {:d} kg gets {:.2f} mL'.format(weight, calculateDose(weight)))

Explanation:

I chose not to put in lots of if...then...else statements, and solve this in a more elegant way. Since the weight ranges are contiguous, I think this is a valid approach.

def calculateDose(weight):

doseList = [(5.2, 1.25), (7.9, 2.5), (10.4, 3.75), (15.9, 5.0), (21.2, 7.5), (0,10.0)]

for dose in doseList:

if (weight < dose[0]): return dose[1]

return doseList[-1][1]

for weight in [8,18,25]:

print('A child that weighs {:d} kg gets {:.2f} mL'.format(weight, calculate Dose(weight)))

I chose not to put in lots of if...then...else statements, and solve this in a more elegant way. Since the weight ranges are contiguous, I think this is a valid approach.

The daily dose required for drug A is 146 g/Kg and drug B is 24 g/Kg, hence the amount of drug A given is more than drug B.

Amount of toxic dose of therapeutic drug A = 8 g/Kg

Body Weight = 17 g/Kg

Daily dose required to be given =

= 17 X 8

= 146 g/Kg

Learn more about weight on:

https://brainly.com/question/10069252

#SPJ2

Input an int between 0 and 100 and print the numbers between it and 100, including the number itself and the number 100. If the number is less than or equal to 0, or greater than or equal to 100 print "error". Print 20 numbers per line.

Answers

Answer:

Concept: Programming

See the solution below:

import java.util.Scanner;

import java.lang.Math;

class Lesson_24_Activity_Three {

public static void main(String[] args){

Scanner scan = new Scanner(System.in); System.out.println ("Enter a number between 0 and 100:");

int x = scan.nextInt();

if ( x <= 0 || x >= 100) { System.out.println("error");

}

else

{

for (int i = x; i <= 100; i ++)

{

System.out.print( i + " ");

}

}

}

}

Bias can be very difficult to overcome. For instance, social networks help people get jobs. While this benefits some, it means that it is harder for those outside the network. Why does this contribute to a lack of diversity in hiring?.

Answers

This contributes to a lack of diversity in hiring because the people who are part of the social network tend to have similar backgrounds, experiences, and networks.

What is networks?

Networks are a collection of computers, servers, and other connected devices that are able to communicate with one another using a set of protocols and standards. A network can be as small as a personal computer connected to the internet or as large as a global network of interconnected computers and servers. Networks allow users to share information and resources such as files, data, messages, emails, and applications.

This means that they are more likely to recommend people who look and think like them, rather than reaching out to a more diverse pool of candidates. This perpetuates existing biases, as people are less likely to consider candidates who don't fit their preconceived notions of who would be a good fit. As a result, hiring pools are not as diverse as they could be, leading to a lack of diversity in hiring.

To learn more about networks
https://brainly.com/question/13105401
#SPJ4

Which one is called the Information Super Highway? a. E-mail b. Mobile phone c. Internet d. Land phone

class 6 ​

Which one is called the Information Super Highway? a. E-mail b. Mobile phone c. Internet d. Land phoneclass

Answers

Answer:

c

Explanation:

Answer C
Explanation:

One form of subnet masking uses a technique called ____ and permits a single address to be subdivided into multiple subnets, in which subnets need not all be the same size. group of answer choices

Answers

One form of subnet masking uses a technique called Variable Length Subnet Masking (VLSM) and permits a single address to be subdivided into multiple subnets, where the subnets do not need to be the same size.

Here,

VLSM allows for efficient use of IP addresses by allocating different subnet sizes based on the requirements of each subnet. This technique is commonly used in modern networks to optimize address allocation and maximize network efficiency.

With VLSM, subnet masks can have varying lengths, which means subnets can have different numbers of available addresses. This flexibility allows for better utilization of IP addresses and more efficient network management.

Therefore correct terminology is VLSM.

Know more about VLSM,

https://brainly.com/question/33446033

#SPJ4

Complete question :

One form of subnet masking uses a technique called ____ and permits a single address to be subdivided into multiple subnets, in which subnets need not all be the same size.

Group of answer choices

IP renumbering

IP gateway

constant-length subnet masking

variable-length subnet masking

what are the advantages of knowing demographics over psychographics and vice versa?

Answers

It's been said that demographics help you understand who buys your product or service, while psychographics helps you understand why they buy. Another way to put it is that demographics are things that can be observed from the outside, such as age and race, while psychographics are internal attributes or attitudes.

We mentioned in our class that large prime numbers are used in message encryption. In this worksheet, let's have a quick glance of RSA encryption, which is one of the oldest and most widely used encryption schemes. RSA encryption consists of two main stages: encryption (or scramble) and decryption (or unscramble). In brief, the encoded plain-text message is translated into a cipher using a public key during encryption, and the decryption recovers the plain-text message later on using a secret key. In this worksheet, we encode characters in plain-text messages alphabetically into 0∼25 (e.g., 0318 for "DS") and decode accordingly. Encryption Stage Take two primes p and q. (In practice, p and q are very large primes. In this worksheet, we use small number for simplicity.). Set n=pq and pick an e that is relatively prime to (p−1)(q−1). The value pair (n,e) is the public encryption key. You can give this to anyone and they can encrypt data as follows: - Take any integer 0 e
modn In this worksheet, we use p=43,q=59 and e=13. Problem 1. Show that p is prime using trial division. When justifying, show the remainders and quotients. Problem 2. We write a≡bmodn if (amodn)=(bmodn). All we're saying here is that a and b have the same remainder when divided by n. Prove that a≡bmodn if and only if a−b≡0modn if and only if n∣(a−b). (Hint: Rewrite them into quotients and remainders first using The Division Algorithm)

Answers

In RSA encryption, large prime numbers are used to generate the public and secret keys for encryption and decryption.

The encryption stage involves selecting two prime numbers, p, and q, multiplying them to obtain n, and choosing a value e that is relatively prime to (p-1)(q-1) to form the public key. The plaintext message is encoded into a cipher using the public key, and the decryption stage uses the secret key to recover the original message. In this worksheet, the values p=43, q=59, and e=13 are used. Problem 1 requires demonstrating that p is prime using trial division, and Problem 2 involves proving the equivalence of congruence and divisibility in modular arithmetic. In Problem 1, trial division is used to check if p is prime by dividing it by numbers less than p and checking for any remainders other than 0. If no non-zero remainders are found, p is proven to be prime. In Problem 2, the concept of congruence (a≡body) is explained, indicating that a and b have the same remainder when divided by n. The equivalence between congruence, the difference (a-b) being congruent to 0 mod n, and n dividing (a-b) is proven using the Division Algorithm, which involves expressing a and b as quotients and remainders.

Learn more about RSA encryption here:

https://brainly.com/question/31736137

#SPJ11

Which phrase best describes a countrys monetray base?

A. Only money that cannot be easily spent

B. Only currency and coins in circulation in the economy

C. All money invested in the stock market

D. All money in circulation throughout the economy



(Economics and Finance)
Please be quick I'm doing Apex

Answers

The phrase that best describes a country's monetary base is: "Only currency and coins in circulation in the economy."

Which statement supports the benefits of computer-aided design (CAD)?
Privacy is increased.
Designers do not have to be creative.
O Businesses have more control over their designers.
Time and materials are saved.

A. privacy is increased
B. designers do not have to be creative
C. businesses have more control over their designs
D. Time and materials are saved

Answers

Answer:

The correct statement that supports the benefits of computer-aided design (CAD) is "time and materials are saved."

Explanation:

CAD allows designers to create and modify designs quickly and easily using a computer, rather than having to create physical prototypes or drawings. This can significantly reduce the time and materials needed to create and revise designs, as changes can be made digitally rather than having to create new physical models or drawings.

Option A ("privacy is increased") is not a benefit of CAD.

Option B ("designers do not have to be creative") is incorrect because CAD does not replace the need for creativity and design skills.

Option C ("businesses have more control over their designs") is a potential benefit of CAD, but it is not the primary benefit of the technology.

When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f

Answers

In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.

What is an interview?

An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.

When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.

Therefore, the given statement is false.

Learn more about interview, here:

https://brainly.com/question/13073622

#SPJ1

Huffman encoding uses variable length binary strings to represent particular characters. Group of answer choices False True

Answers

The answer is true.

Powerful IT security systems are needed to defend against what appears to be authorized access to a network or application. Select one: True False

Answers

Answer:false

Explanation: why would you need a powerful it security system, if they already have authorized access?

AFL comprises of 18 teams and over 22 weeks a large number of games are played among these teams. There can be more than one game between two teams. Choose a database backend for storing information about teams and games in AFL. Relational DBMS like Oracle A Document-based database like MongoDB A graph-based database like Neo4j A key-value pairs database like Redis A wide-column-based database like Cassandra

Answers

The database backend for storing information about teams and games in AFL would be a relational DBMS like Oracle. A relational database management system is a type of database management system (DBMS) that stores data in a tabular form of rows and columns.

Relational database management systems provide the ability to manage large amounts of data effectively and efficiently. They provide support for structured query language (SQL) for accessing and manipulating data in the database. The structure of the AFL data with teams, games, and other information can be represented using tables in a relational database.

For example, there can be a table for teams with columns for team names, locations, and other information. Another table can be created for games with columns for game ID, home team, away team, and game date. Relational databases are well-suited for applications that require complex querying and data manipulation, such as generating reports or statistical analysis.

They also offer support for transactions, concurrency control, and backup and recovery. Relational DBMS like Oracle is the best choice for storing information about teams and games in AFL.

You can learn more about relational databases at: brainly.com/question/13262352

#SPJ11

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

the four levels of FBLA membership

Answers

Answer:

Future Business Leaders of America (FBLA) for high school students; FBLA-Middle Level for junior high, middle, and intermediate school students; Phi Beta Lambda (PBL) for post secondary students; and Professional Division for those not enrolled in school or post secondary school

Explanation:

The memory address that is saved by the system when a method is called and is the location to which the system should return after a method ends is known as the ________.

Answers

Answer:

Return point

Explanation:

In neighbourhood A, there is only one SPA center called JBI SPA. JBI provides a SPA service to their customers where most of whom are living in this neighbourhood and have been contacting with JBI SPA for many years. JBI's demand curve is: P = 30 - Q, and JBI's marginal cost of service is: MC = 4Q. JBI charges a single price for a unit of service.
At profit maximization level, calculate the following:
a) Price Level:_____
b) Output level:_____
c) Consumer surplus: _____
d) If JBI enforces first-degree price discrimination, the lowest priced charged is: ____ and the output level is: _____
e) Ignoring any fixed costs and under perfect price discrimination, JBI's total profit is:_____

Answers

At profit maximization level, the price level, output level and consumer surplus is given as follows:a) Price Level:The profit maximization condition of JBI Spa is given by MR = MC.Substitute the value of MR in terms of P, we have;P/2 = surplus:Consumer surplus (CS) is the difference between what the customers are willing to pay for a good or service and the actual price they pay for it.

The formula for consumer surplus is given as;CS = 0.5 * (Pmax - P) * Q, where Pmax = 30.Substitute the values of P, Pmax, and Q in the above formula, we get;CS = 0.5 * (30 - 8Q*) * Q*CS = 0.5 * (30 - 8(3.33)) * 3.33CS = $37.17d) If JBI enforces first-degree price discrimination, the lowest priced charged is and the output level is:The lowest price charged under first-degree price discrimination is the reservation price, which is equal to the maximum amount of money each customer is willing to pay for the service.

Since most of JBI's customers have been contacting with JBI Spa for many years, we can assume that their maximum willingness to pay is not too different from the price they are currently paying.So, the reservation price under first-degree price discrimination is equal to the current price level, which is P* = 8Q*.The output level under first-degree under perfect price discrimination, JBI's total profit is:Under perfect price discrimination, JBI can extract all the consumer surplus from its customers, which means P = MC = 4Q*.Substitute Q* = 3.33 in the above equation, we have;P = 4(3.33) = $13.33JBI's total profit under perfect price discrimination is equal to the total revenue which is given as;Total revenue = P * Q* = 13.33 * 3.33Total revenue = $44.45Thus, ignoring any fixed costs and under perfect price discrimination, JBI's total profit is $44.45.

To know more about maximization visit:

brainly.com/question/33009813

#SPJ11

based on our in-class discussion, which of the following could not be considered a workplace technology: a. electronic mail b. pens (the writing implement) c. telephones d. policy and procedure manuals e. all of the above are technologies f. none of the above are technologies

Answers

Answer:

None of the above are technologies.

Explanation:

While electronic mail, telephones, and policy/procedure manuals are all examples of workplace technologies, pens are not typically considered a workplace technology. Pens are a basic writing instrument that has been used for centuries and do not require any special technology to function. Therefore, none of the options presented can be classified as "not considered a workplace technology" except for option f.

What is the acronym of COMPUTER​

Answers

Answer:

See Explanation

Explanation:

Computer is not an acronym, it is a word derived from a word "compute" which means to calculate. So, in simple words you can say that computer is an electronic device which is used for fast calculation.

Universal containers (uc) is concerned that data is being corrupted daily either through negligence or maliciousness. they want to implement a backup strategy to help recover any corrupted data or data mistakenly changed or even deleted. what should the data architect consider when designing a field -level audit and recovery plan?

a. reduce data storage by purging old data.
b. implement an appexchange package.
c. review projected data storage needs.
d. schedule a weekly export file.

Answers

The thing that the data architect need to consider when designing a field -level audit and recovery plan is option a. reduce data storage by purging old data.

What is a data architect?

Data architects are known to be people who are said to be IT professionals.

They are known to be people who leverage their computer science and design skills to be able to examine and analyze the data infrastructure of any kind of organization.

They are able to plan future databases, as well as implement solutions to save and handle data for firms and their users.

Therefore, based on the above, one can say that the thing that the data architect need to consider when designing a field -level audit and recovery plan is option a. reduce data storage by purging old data.

Learn more about data architect from

https://brainly.com/question/25385643

#SPJ1

What do you understand by ' selecting' text​

Answers

Answer:

highlight the whole sentence

Explanation:

that is what it means

Selecting is highlighting text or picking an object.

Write a python program to display the cube of a number upto given integer

Answers

Answer:

def display_cube(n):

   for i in range(1, n+1):

       print("Number is : {} and cube of the number is : {}".format(i, i**3))

# Test the function

display_cube(5)

Explanation:

This program defines a function display_cube(n) that takes an integer n as an argument and prints out the cube of the numbers from 1 to n. The range() function is used to generate a sequence of numbers from 1 to n, and the print() function is used to display the number and its cube. The ** operator is used to calculate the cube of a number. You can test the function by calling it and passing in an integer value as an argument.

i should down-edit my email replies by

Answers

Answer:

Removing everything not necessary to the ongoing conversation.

Explanation:

Down-editing your email by removing everything except the content that is necessary to the ongoing conversation, and then responding point-by-point, helps to maintain clarity in your ongoing conversations.

You're welcome, make sure to follow me! <3

Write the algorithm which hould calculate the total of a retail ale. The program hould ak the uer for the following: the retail price of the item being purchaed and the ale tax rate. Once the information ha been entered the program hould calculate and diplay the following: the ale tax for the purchae and the total ale

Answers

Sales tax is calculated using the following equation: Sales Tax Amount = Net Price x (Sales Tax Percentage / 100), according to the guys at Calculator Soup.

What is the sales tax formula?

Sales tax percent divided by 100 is the sales tax rate.

List price x sales tax rate equals sales tax.

Schedule 1 for "above the line" deductions and additional income. For extra taxes, see Schedule 2. For additional credits and payments, see Schedule 3.

Int main() double amount, salesTax, total, salesTaxAmount; /reading amount till user gives positive value do

Enter the amount:"; cin>>amount; while(amount0);

By dividing the value by the entire value and multiplying the result by 100, one may determine the percentage. The percentage calculation formula is (value/total value)100%.

Profit Margin is critically dependent on Sales Revenue. Start with sales revenue to determine gross profit, then deduct direct costs to determine profit margin. After that, you multiply that figure by the initial Sales Revenue figure to arrive at.

To learn more about sales tax formula refer to:

https://brainly.com/question/1700984

#SPJ1

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

please can someone help me with this?

please can someone help me with this?

Answers

Explanation:

there fore 36:4 = m¤

46:6

20:16

#von5

Which character is used in a search before a command?
(A) A pipe (|)
(B) A backtick (`)
(C) A tilde (~)
(D) A quotation mark (")

Answers

Backtick (') characters must surround search literals.

The ideal answer is B.

What character is used in a Splunk search before a command?

The structure of a Splunk search is referred to as the "search pipeline," and it involves chaining together successive instructions with the pipe symbol "|."

What does Splunk's search command accomplish?

Arranges search results according to the chosen fields. offers a simple method for separating fields from XML and JSON, two formats for structured data. provide statistics, optionally grouped by fields. In the Splunk Enterprise Search Reference, look up Stats, Chart, and Timechart Functions.

To know more about Splunk search visit:-

https://brainly.com/question/10041782

#SPJ4

what feature does windows 8 use to takes advantage of modern widescreen monitors?

Answers

Windows 8 utilizes the Snap feature to take advantage of modern widescreen monitors.

The Snap feature in Windows 8 allows users to multitask and make efficient use of their widescreen monitors. With the Snap feature, users can "snap" or dock two applications side by side on the screen, making it easier to view and interact with multiple applications simultaneously.

By taking advantage of modern widescreen monitors, the Snap feature allows users to have a split-screen view, with each application occupying a portion of the screen. This feature is particularly useful for tasks that require referencing or comparing information from multiple applications or windows.

Learn more about Windows 8 here;

https://brainly.com/question/29534381

#SPJ11

Look in the nec® index and find uses permitted for ac cable. the code reference for this is ___.

Answers

If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.

Where is the index located in the NEC?

The index is known to be one that is seen or located in the back of the NEC and this is known to be one that is said to be organized in alphabetical order ranging from keywords seen within the electrical code.

Note that The index is seen to be the best reference for knowing multiple occurrences of a particular words and phases inside  a lot of  articles and sections of code.

Hence, If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.

Learn more about code reference from

https://brainly.com/question/25817628

#SPJ1

Other Questions
In which two ways does the third paragraph contribute to the development of ideas in the passage? The sum of six and a number is equal to the number squared. Which of the following describes the characteristics of a solid? The state of Minnesota covers an area of 51 million acres, while the state of Vermont covers 6 million acres. How many times larger is the state of Minnesota as compared to Vermont Can someone plzz help me with these two answers? Suppose that the total revenue received by a company selling basketballs is $840 when the price is set at $15 per basketball and $840 when the price is set at $10 per basketball. Without using the midpoint formula, can you tell whether demand is elastic, inelastic, or unit-elastic over this price range? a certain reaction has an enthalpy of =34 kj and an activation energy of a=66 kj. what is the activation energy of the reverse reaction? What is the expected return on a portfolio? How can the expected return on a portfolio be manipulated to minimize the risk on that portfolio? Justify your answer. How many solutions does quadratic equation 2x 7x 5 0 have? President Biden claims he can use the 2003 HEROES Act to forgive Federal student loans because the pandemic created similar economic conditions to 9/11. Is he right or is this action an improper expansion of presidential powers? Explain. Which of the animals studied in this exercise have a rib cage? a diaphragm? what is the importance of these structures to gas exchange? write an abstract about data encryption standard Dan, Patricia and Jan decide to form Crane Corporation. Dan transfers land (fair market value (FMV) of $200,000, basis of $60,000) for 50% of the stock in Crane. Patricia transfer machinery (FMV of $150,000, adjusted basis of $30,000) for 35% and Jan performs services worth $20,000 for the remaining 15% of the stock. Required: Assume that after formation Dan sells half of his interest in the company for $150,000. What is Dans recognized gain or loss on that sale? balance the following equation in basic solution: cro42-(aq) cu(s) cr(oh)3(s) cu(oh)2(s) what is the coefficient of water? john merryman was being held in 1861 by union troops on charges that he ______. Was John Brown a martyr (hero) or a murderer (villain)? Why? A character that profits from experience and undergoes a change or development is called.:______. Examine the view that the Resource Based View of the firm gives only an inadequate explanation of the performance of modern firms given the importance of firms dependence on other firms in Global Value Chains.750 wordsIf you can help either with written or bullet points with things to include etc. Elasticity - End of Chapter Problem In the United States, 2018 was a bad year for growing wheat. As the wheat supply decreased, the price of wheat rose dramatically, leading to a lower quantity demanded (a movement along the demand curve). The accompanying table describes what happened to prices and the quantity of wheat demanded. 2017 2018 Quantity demanded (bushels) 2.2 billion 2.0 billion Average price (per bushel) $3.42 $4.26 a. Using the midpoint method, calculate the price elasticity of demand for winter wheat. Record your answer as an absolute value. b. What was the total revenue for U.S. wheat farmers in 2017, to two decimal places? sound travels at about 330 m/s in air How long would it take sound to travel 80 m.