The ___of a process contains temporary data such s functon parameters, return addresses, and local variables.

Answers

Answer 1

The stack of a process contains temporary data such as function parameters, return addresses, and local variables.

Stack is the tool that uses the phenomena of Last In First Out(LIFO) to temporarily store the data for the time being. The stack pointer specifies the last inserted data so that it can be removed first when new data is being entered. The size of the stack is generally changeable.

There are two types of stacks called register stacks and memory stacks. The register stacks can only be used to store limited data while memory stacks have the ability to store a vast amount of data and local variables.

The stack process usually involves two steps, the first is known as push in which the temporary data is allocated at the position directed by the stack pointer depending on the size of the data, The second step is pull in which the last entered data is removed from the allotted location.

To learn more about stack, click here:

https://brainly.com/question/13152669

#SPJ4


Related Questions

Legacy mrp systems typically utilized multiple software packages and databases which caused:_____.

Answers

Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.

What is an MRP systems?

Material requirements planning (MRP) is known to be a kind of a system that is often used in the calculation of  some materials as well as the parts that is known to be needed to create or form a product.

It is one that is also known to be made up of three key steps such as taking inventory of the materials as well as the parts on hand, knowing which other ones are required and then keeping a schedule of their production or buying.

Therefore, Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.

Learn more about mrp systems from

https://brainly.com/question/13647161

#SPJ1

What do you understand by ' selecting' text​

Answers

Answer:

highlight the whole sentence

Explanation:

that is what it means

Selecting is highlighting text or picking an object.

A visual artist is programming an 8x8 LED display:
8x8 grid of squares.
8x8 grid of squares.
This is their program so far:
rowNum ← 0
REPEAT 5 TIMES
{
colNum ← 0
REPEAT (5 - rowNum) TIMES
{
fillPixel(rowNum, colNum, "red")
colNum ← colNum + 1
}
rowNum ← rowNum + 1
}
The code relies on this procedure:
fillPixel(row, column, color) : Lights up the pixel at the given row and column with the given color (specified as a string). The top row is row 0 and the left-most column is column 0.
What will the output of their program look like?

Answers

The output of the program will be an 8x8 LED display with a diagonal gradient of red squares, starting from the top left corner and gradually decreasing in intensity towards the bottom right corner.

The program initializes the variable `rowNum` as 0 and then enters a loop that repeats 5 times. Within this loop, the variable `colNum` is initialized as 0, and another loop is executed a number of times equal to `(5 - rowNum)`. In each iteration of the inner loop, the `fillPixel()` procedure is called to light up a pixel at the current `rowNum` and `colNum` coordinates with the color "red".

After each iteration, `colNum` is incremented. Finally, `rowNum` is incremented at the end of the outer loop. This pattern results in a diagonal gradient of red squares as described.

Learn more about programming at https://brainly.com/question/26134656

#SPJ11

A video card is connected to the main cpu and memory through a plug-in expansion slot or through the ____.

Answers

The main answer to fill in the blank space is BUS. EXPLANATION: A bus is a communication system that allows different components of the computer to communicate with each other.

The bus has a set of wires that carry information and address signals between the components. A video card is an essential component of a computer that is responsible for processing and rendering images on the screen. A video card is connected to the main CPU and memory through a plug-in expansion slot or through the motherboard.

A bus is the communication system that connects the video card to the motherboard. There are different types of buses that can be used to connect the video card to the motherboard, such as the PCI, AGP, and PCIe. Each of these buses has different characteristics and speeds, which affects the performance of the video card.

To know more about BUS visit:-

https://brainly.com/question/11028452

#SPJ11

A client needed a software application to be delivered with a demo of the working software at every stage of development. The project head ensured that all the team members were in the same location. The work was completed in a short duration with minimal documentation and through continuous customer interaction. Which model did the team use? A agile B. spiral C waterfall D. RAD ​

Answers

Answer:

Rapid Application Development (RAD)

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

RAD is an acronym for rapid application development and it is a model that is typically based on the concepts of prototyping and iterative development technique with minimal documentation or planning involved.

In the RAD model, more priority is given to the development of the software while minimal attention is given to documentation or planning. Therefore, it focuses on developing softwares within a short period of time and using prototypes (working modules) such as templates, codes, processes, tools, etc.

Basically, the RAD model comprises of five (5) phases and these includes;

I. Business modeling.

II. Data modeling.

III. Process modeling.

IV. Application generation.

V. Testing and turnover.

In conclusion, the RAD model allows software application to be delivered with a demo of the working software at every stage of development for continuous customer interaction.

Answer:

Its rad ladies and gentlemen

Explanation:

A major hospital uses an agile approach to manage surgery schedules. a large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. which method is described in this scenario?

Answers

In this scenario, the Agile approach (method) that is being used and described is referred to as Kanban.

What is SDLC?

SDLC is an abbreviation for software development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages for the design, development and implementation of high quality software programs.

What is Agile software development?

In Agile software development, the software development team are more focused on producing efficiently and effectively working software programs with less effort on documentation.

In this scenario, we can infer and logically deduce that the Agile approach (method) that is being used and described is referred to as Kanban because it necessitates and facilitates real-time capacity communication among staffs, as well as complete work openness.

Read more on software development here: brainly.com/question/26324021

#SPJ1

Complete Question:

A major hospital uses an Agile approach to manage surgery schedules. A large board set up in a common office allows staff to quickly identify which procedures are scheduled, the times they are scheduled, and who is involved. Which method is described in this scenario?

A. Journey

B. Mapping

C. Waterfall

D. Kanban

E. Sprint

F. I don't know this ye

the town of mamou has two judges that hear all of the traffic violations from the previous week. each judge can only preside over one violation at any given time. the database that has been developed has a judge table and a violation table. what type of relationship exists between these tables?

Answers

In the database created for the town of Mamou, it is probable that there is one-to-many connection between the court table and the violation table.

What type of relationship exists between these tables?

In the database created for the town of Mamou, it is likely that there is a one-to-many connection between both the judge table and the violation table. This means that while a judge can preside over several infractions, only one judge can preside over a single violation. In a database, this connection would be made by means of a foreign key inside the violation column that makes use of the judge table's main key. This connection shows that each traffic infraction has a designated judge, and that the database links the information about the infraction and the judge in it.

To know more about Database visit:

brainly.com/question/25198459

#SPJ4

plz help me to do 4 number

plz help me to do 4 number

Answers

Answer:

A is an abbaccus.  B is Blaze Pascal.  C is The Jacquard Loom.  D is Charles Babbage.  E is The Manchester Baby.

Explanation:

smart tv has _____ intergrated with it

Answers

Answer:

an operating system

Explanation:

what permission must be granted for a user to run procedures within a database?

Answers

Answer:

To grant permissions on a stored procedure

From Stored Procedure Properties, select the Permissions page. To grant permissions to a user, database role, or application role, select Search. In Select Users or Roles, select Object Types to add or clear the users and roles you want.

Do all of the packets in your sent messages always follow the same path? If not, describe at least two different paths packets took.

Answers

It should be noted that all the packets in the sent messages do not always follow the same path.

It should be noted that data travels in packets across the internet. There can be about 1500 bytes in each packet. The packets have wrappers that contains information about the kind of data in the packet.

When an email is sent, the message sent will then be broken up into packets which then travel across the network. It should be noted that different packets do not take the same path.

This is required in order to help manage the traffic of the network. For example, when there's a fail in connection, an alternate route can be taken for the data to travel.

In conclusion, the packets in your sent messages do not always follow the same path.

Read related link on:

https://brainly.com/question/17882992

Explain any TWO (2) data information that shall be covered under "Safety Data Sheet" and elaborate why do you think the information is needed

Answers

Safety data sheets include details about chemical items that assist users in evaluating the risks. They outline the risks the chemical poses and include details on handling, storage, and emergency procedures in the event of an accident.

The properties of each chemical, its physical, health and environmental properties, protective measures, and precautions for handling, storage and transportation of the chemical are contained in a safety data sheet (formerly called safety data sheet).

Provides recommendations for each individual chemical on topics such as:

PPE, or personal protective equipmentfirst aid techniquescleanup procedures for spills

To learn more on Safety Data Sheets, here:

https://brainly.com/question/28244620

#SPJ4

in access sql, the ____ is used as a wildcard to represent any individual character.
a. underscore (_)
b. hash tag (#)
c. asterisks (*)
d. question mark (?)

Answers

This can be useful for searching for variations of a word or for filtering results based on  specific patterns.

Using wildcards in Access SQL can be very powerful for searching and filtering data based on complex patterns.  it's important to use wildcards carefully and with a clear understanding of the search pattern you're trying to match, to avoid unintended matches and false positives .The question mark is used in Access SQL as a wildcard to represent any individual character.

For example, if you are searching for a word that you know starts with "b" and ends with "t" but you are unsure of the second and third letters, you can use the query "b?t" and Access will return any word that starts with "b", ends with "t", and has any single character in between.

To know more about patterns visit :-

https://brainly.com/question/28425067

#SPJ11

In phishing scams, a scam artist obtains the victim's personal information by collecting it on websites. Asking for it. Stealing it. Searching for it online.

Answers

Answer:

B. Asking for it

Explanation:

In phishing scams, a scam artist obtains the victim's personal information by Asking for it. Hence, option B is correct.

What is phishing scams?

Phishing is a sort of online scam that preys on consumers by sending them emails that appear to be from reputable companies, such as banks, mortgage lenders, or internet service providers.

Phishing can occur by text message, social media, or phone calls, although the phrase is most frequently used to refer to attacks that come in the form of emails. Phishing emails can directly reach millions of users and can blend in with the countless good emails that busy users receive.

The victim receives an email from app stating that their account has been compromised and will be canceled until they confirm their credit card information. The victim visits a phony website after clicking the link in the phishing email, where the stolen.

Thus, option B is correct.

For more information about phishing scams, click here:

https://brainly.com/question/2880574

#SPJ2

What number system do people in America use?

Answers

Answer:

Base-10 (decimal)

Explanation:

America uses the imperial system.

The majority of the rest of the world uses the metric system (base 10).

You learned about typing speed and accuracy. In this activity, you will investigate common mistakes you make that affect your typing speed and accuracy. List the mistakes and the steps you need to take to minimize errors while typing. Incorporate these measures into your typing, then calculate your typing speed as you did in the previous task.

Answers

Identify common mistakes in typing and take steps to minimize errors, such as practicing proper finger placement, improving posture, focusing on accuracy, using spell-check, and proofreading.

To improve typing speed and accuracy, it's important to identify and address common mistakes. Here are some measures to consider:

1. Proper finger placement: Practice using the correct finger placement on the keyboard to ensure efficient and accurate typing. This includes using the home row keys and utilizing all fingers for typing.

2. Posture: Maintain a proper typing posture by sitting upright, keeping your wrists straight, and aligning your body comfortably with the keyboard.

3. Accuracy over speed: Prioritize accuracy while typing. Focus on hitting the correct keys rather than typing at a rapid pace. With practice, speed will naturally improve.

4. Spell-check and proofread: Utilize the spell-check feature available in word processing software to catch and correct spelling mistakes. After typing, proofread your work to identify any errors or inconsistencies. By incorporating these measures into your typing routine, you can minimize mistakes and improve both speed and accuracy. Regular practice and conscious effort will lead to enhanced typing skills over time.

learn more about spell-check here:

https://brainly.com/question/29754839

#SPJ11

which statement about operator overloading is false? you can overload all c++ operators to be used with class objects.

Answers

The statement that "You can overload all C++ operators to be used with class objects" is false.

Not all operators can be overloaded in C++. The scope resolution operator (::) is used to define the scope of a function or variable, and the conditional operator (?:) is used for conditional expressions. These operators cannot be overloaded in C++, so it is not possible to define custom behavior for them.

While it is true that C++ allows the overloading of most of its operators to work with class objects, there are some operators that cannot be overloaded. For example, the "scope resolution operator" (::) and the "conditional operator" (?:) cannot be overloaded. Therefore, it is not possible to overload all C++ operators.

Learn more about C++ operators : https://brainly.com/question/30258800

#SPJ11

Your question is incomplete but probably the complete question is :

Which statement about operator overloading is false?

Operator overloading is the process of enabling C++;s operators to work with class objects

C++ overloads the addition operator and the subtraction operator to perform differently.

You can overload all C++ operators to be used with class objects.

Which situation is the best choice for using telehealth?

Your leg is broken.

You have a rash on your cheek that is itchy and want some relief.

My aunt is having a baby and is in labor.

Your friend is having chest pains.

Answers

You have a rash on your cheek that is itchy and want some relief.

The situation that is the best choice for using telehealth is you have a rash on your cheek that is itchy and want some relief.

What is the meaning of telehealth?

The word telehealth is known to be a kind of electronic information and telecommunications technologies that is made to aid long-distance clinical health care, patient and others.

Note that The situation that is the best choice for using telehealth is you have a rash on your cheek that is itchy and want some relief.

Learn more about rash from

https://brainly.com/question/13081953

#SPJ1

what was apple's (apple computer, inc) slogan between 1997 and 2002?

Answers

Apple's slogan between 1997 and 2002 was "Think Different."

From 1997 to 2002, Apple Computer, Inc. used the slogan "Think Different" as part of its marketing and advertising campaign. The slogan was introduced soon after Steve Jobs returned to Apple and aimed to emphasize Apple's unique approach to innovation and creativity. The "Think Different" campaign celebrated iconic figures from various fields who challenged the status quo and brought about significant changes in the world. It reflected Apple's commitment to fostering a culture of innovation, encouraging users to think outside the box and embrace Apple's distinctive products and design philosophy. The slogan became synonymous with Apple's brand identity during that period.

Learn more about the "Think Different" campaign here:

https://brainly.com/question/30998930

#SPJ11

this network layer device uses one or more routing metrics to determine the optimal path along which network traffic is forwarded. true or false

Answers

Network layer devices, such as routers, utilize one or more routing metrics to determine the optimal path for forwarding network traffic.

These metrics help determine the most efficient and reliable route for data transmission. Routing metrics are criteria or values used by routers to make decisions about the best path to direct data packets. They can include factors like hop count, bandwidth, delay, reliability, and cost. By evaluating these metrics, routers can select the most suitable path for forwarding network traffic, considering factors such as speed, reliability, and congestion.

Learn more about routing metrics here:

https://brainly.com/question/32138053

#SPJ11

With the Internet Transport Protocol UDP (User Datagram Protocol): i UDP is a connection-oriented protocol ii UDP transmits segments consisting of an 8-byte header followed by the payload; the two ports in the header serve to identify the end-points on each machine; so when a UPD packet arrives its payload is handed to the process attached to the destination port iii UDP does not do flow control, congestion control, or retransmission upon receipt of a bad segment iv one area where UDP is especially useful is client-server applications (as clients send a short request and expect a short reply from the server)

Answers

UDP (User Datagram Protocol) is a connectionless transport protocol, which means it does not establish a connection before transmitting data. Instead, UDP transmits segments consisting of an 8-byte header followed by the payload. The two ports in the header serve to identify the end-points on each machine, so when a UDP packet arrives, its payload is handed to the process attached to the destination port.

Unlike TCP, UDP does not do flow control, congestion control, or retransmission upon receipt of a bad segment. This can make UDP faster and more efficient, but it also means that data may be lost or corrupted during transmission.One area where UDP is especially useful is in client-server applications. In these applications, clients send a short request and expect a short reply from the server. UDP can be used to transmit these requests and replies quickly and efficiently, without the overhead of establishing a connection or managing flow and congestion control. However, it is important to note that UDP is not suitable for all types of applications, as the lack of reliability can be a problem in some cases.

Learn More About User Datagram Protocol: https://brainly.com/question/20038618

#SPJ11

Write a program that reads the content of a text file. the program should create a dictionary in which the keys are individual words found in the file and the values are the amount of times the word appears in the file. For example, if the word 'the' appears in the file 128 times, the dictionary would contain an element with the key as 'the' and the value as 128. Write in Python

Answers

This software opens the file filename.txt, reads the text inside, and then uses the split() method to separate the text into individual words. After that, it loops and produces a new empty dictionary called freq dict.

How can I construct a Python program to count the number of times a word appears in a text file?

To calculate the frequency of each word in a sentence, create a Python program. In Python: counts = dict in def word count(str) () split() for word in words with words = str: If a word is counted, then counts[word] += 1. and if counts[word] = 1 then return counts The swift brown fox leaps over the slothful hound, print(word count('.

# Use the command open('filename.txt', 'r') as file to open and read the file's contents:

file.read content ()

# Separate the text into its component words.

Language is content.

split()

# Construct a blank dictionary by changing freq dict to.

# Determine the frequency of every word in words:

If word appears in freq dict, then freq dict[word] +=

if not, freq dict[word] =

# Use the freq dict.items() function to display the frequency count for each word individually:

print(word, count) (word, count)

To know more about software visit:-

https://brainly.com/question/985406

#SPJ1

Why is computer called information processing maching???​

Answers

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).

HOPE IT HELPS ❣️

Answer:

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.

Explanation:

At least 3 facts I learned about our Amazon Volunteer or their career experience:

Answers

Answer:

Amazon's Global Month of Volunteering includes hundreds of partners. Tens of thousands of employees around the world are coming together to support over 400 organizations in their local communities.

Closed ports respond to a NULL scan with what type of packet?
A) RST
B) SYN
C) Ping
D) ACK

Answers

Closed ports respond to a NULL scan with an A) RST (Reset) packet. Therefore, the correct option is A) RST

A NULL scan is a type of port scanning technique where the scanner sends a packet with no TCP flags set (NULL flag). This scan is used to determine the state of a port by observing the response received.

When a NULL scan is sent to a closed port, the closed port will respond with an RST (Reset) packet. The RST packet is used to indicate that there is no active service or application listening on that particular port. It essentially resets the connection attempt and signifies that the port is closed and not accepting any incoming connections.

In contrast, if the port were open, it would not respond with an RST packet. Instead, it would either respond with no packet (indicating no response) or with a different type of packet depending on the specific port scanning technique being used, such as an SYN/ACK packet in response to an SYN scan.

Therefore, the correct option is A) RST

To learn more about “RST packet” refer to the https://brainly.com/question/31924966

#SPJ11

describe your experience using a computer. include any skills or shortcuts you have used to increase your speed or functionality?

Answers

This essay requires that you explain your experience - good or bad - when using a computer. You should also include functions that helped you use the computer with more efficiency.

Experience with the computer

You should talk about:

If you found the computer useful.If you were able to accomplish your tasks on time. If the computer allowed you to be more efficient in your tasks. Whether you would use a computer again if offered.

Skills or Shortcuts to improve speed

Here you talk about anything that made your usage of the computer more efficient such as:

Having an internet connection. Using multiple tabs. Using specialized programs that helped you accomplish tasks faster.

Writing an essay for you would be academic dishonesty but I hope that the guidelines provided above will be of help.

Find out more on essay writing at https://brainly.com/question/329730.

Which special network area is used to provide added protection by isolating publicly accessible servers?

Answers

A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers.

The most crucial action to take to stop console access to the router is which of the following?One needs to keep a router in a locked, secure area if they want to prevent outsiders from accessing its console and taking control of it. The router's console can only be accessed by those who have been given permission.A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet.A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers.        

To learn more about network refer to:

https://brainly.com/question/1326000

#SPJ4

Which of the following is NOT a semantic reason for using header tags
A. They establish a hierarchy of information
B. They serve as headlines to new sections or subsections of content
C. They convey a search engines that they contain important information
D. They make text larger and bold

Answers

Answer:

The correct option is;

C. They make text larger and bold

Explanation:

The semantic reasons for using header tags which are the benefits users derive from including header tags in content published on the web includes;

1) They give structure to the writing included in the document

2) Header tabs allow text to be broken into sections with different content in focus

3) Header tags are used to add key words to a page

4) To boost search engine optimization SEO

5) To improve visibility.

what is used to identify the location of another web page that your web page links to?

Answers

You would use a hyperlink to identify the location of another web page that your web page links to. A hyperlink is an HTML element that allows you to create a clickable link to another web page or resource.

The URL (Uniform Resource Locator) of the page or resource to which you want to link is usually included in the hyperlink. The URL is a unique address that identifies the page or resource's location on the internet. HTML is a markup language that is used to create web pages and other documents that can be viewed in a web browser. HTML defines the structure, content, and layout of a web page using a set of tags and attributes.

learn more about HTML here:

https://brainly.com/question/17959015

#SPJ4

Which xxx completes the code to read every integer from file "data. txt"? fileinputstream inputstream = null; scanner infs = null; int total = 0; inputstream = new fileinputstream("data. txt"); infs = new scanner(filebytestream); while(xxx){ total = total + infs. nextint(); } system. out. println("total: " + total); group of answer choices inputstream. hasnextint( ) total != 0 infs. hasnextint( ) infs. eof( ) == false

Answers

Answer:

total+ infs . nex (xxx){total}

Explanation:

this is correct theres nothing wrong

Other Questions
Do the sub fields of African American Studies include History, politics, religion, social organization, economics, creative production, psychology, anthropology, sociology and other academic fields A straw is placed inside a rectangular box that is 6 inches by 2 inches by 4 inches, as shown. If the straw fits exactly into the box diagonally from the bottom left corner to the top right back corner, how long is the straw? Leave your answer in simplest radical form. Revenue is determined by price p (in dollars) multiplied by quantity q also called the demand function. The demand function is a function of the price. Suppose that a particular product has a demand function of a(p)=70-0.63p. What price will maximize the revenue? (round-off the price to the nearest cent.) Slove for xShow all work That bleakly memorable morning i hated the unbelievable streets and the negroes and whites who had, equally, made them that way. but i knew that it was folly, as my father would have said, this bitterness was folly. what emerging solution to his problem does baldwin recognize? the riots were necessary. memory serves an important purpose. feeling hatred is unproductive. his father was right to be bitter. Can someone help me please A person who sees beyond authority, laws, and norms and follows his own self-chosen ethical principles is most likely to be in the _____ stage of Kohlberg's model of cognitive moral development.A. utilitarianB. conventionalC. principledD. preconventionalE. intermediate This table indicates the historical level of the Consumer Price Index (CPI) for the United States for 2006, 2007, and 2008.Complete the table by (1) selecting the inflation rates for 2007 and 2008, and (2) indicating for each year whether there has been inflation, deflation, or hyperinflation.Year CPI Inflation Rate Change in Price Level2006 201.6 2007 207.3 2008 215.3 What rates of inflation for 2009 would be consistent with disinflation between 2008 and 2009? Check all that apply.a) 53.9%b) 3.9%c) 3.8%d) 13.9%What rates of inflation for 2009 would be consistent with hyperinflation? Check all that apply.a) -3.9%b) 15.0%c) 120.0% The standard form of a quadratic function is given below. Select ALLstatements which MUST be true about its graph.f (x) = ax? + bx + cA. The y-intercept of the graph is at (0,c).B. The graph has an x-intercept at (c,0).C. When "a" is positive, the graph opens up.D. The graph always has two distinct x-intercepts, Mathematical Statistics, Fisher Information Find I(a) for logistic distribution L(a, b) x-a ja(x)=-- x-a of the four metrics for product-related tactical success, __________ is the only one not expressed in percentage terms. choose two corrects answers.why were the jehovah's witnesses persecuteda. jehovahs witnesses conspired with the soviet union against germanyb. hitler believed that jehovahs witnesses played a role in germanys WWI defeatc. jehovahs witnesses were against military action and ward. jehovahs witnesses did not pay taxes and were a burden on the economye. jehovahs witnesses refused to swear allegiance to hitler only answer if u can do it 15 mins after posting pls;)- range of motion activity for principles and allied health sem 1 How will a closer analysis of the author's claim in the writing structure help you to learn more about your selected reading What was one source of division among the woman who were involved in the abolition movement what is the meaning of hypothesis your uncle is going to give you $1,500 at the end of each month for the next 5 years. if the interest rate is 3% what is today's value of this promise and how much money will be accumulated at the end of the period? Explain why not all living things on earth are yet well understood List three ways Crusoe's life changes when he finds Friday in Robinson crusoe In a class of 35 students, 5 are freshmen, 8 are sophomores, 9 are juniors and 13 are seniors. If 1 student is randomly selected, what is the probability the student is a junior