what are the numeric values created by an assembler that represent cpu machine instructions?

Answers

Answer 1

When a high-level programming language is translated to a low-level machine language, an assembler creates machine instructions.

These machine instructions are binary values that the CPU can read and execute. Machine instructions can be represented in different ways, but the most common representation is in hexadecimal (base 16) notation.Each instruction is typically represented by a fixed number of bytes. For example, a simple instruction to move a value from one register to another might be represented as two bytes: one byte for the opcode (the operation to be performed), and another byte for the operands (the registers that hold the values to be moved).In addition to the opcode and operands, machine instructions may include other information such as memory addresses, constants, and flags. All of this information is encoded into binary values that the CPU can interpret and execute.

To know more about assembler visit:

https://brainly.com/question/30462375

#SPJ1


Related Questions

What learning outcomes relate to the ability to design and code computer programs that meet customer requirements?

Answers

The learning outcomes that relate to the ability to design and code computer programs that meet customer requirements include proficiency in programming languages, understanding of software design principles, ability to gather and analyze customer requirements, and effective communication skills.

Proficiency in programming languages is essential to designing and coding computer programs that meet customer requirements. It is important to be knowledgeable in different programming languages such as Java, Python, and C++ and understand their syntax, structures, and functionalities to develop effective programs. Understanding software design principles is also crucial as it helps in the creation of programs that meet customer requirements. Knowledge of design patterns, architectural styles, and software development methodologies enables developers to design efficient and scalable programs.

The ability to gather and analyze customer requirements is essential in designing programs that meet their needs. Effective communication skills are also necessary to communicate with customers, understand their requirements, and provide them with solutions that meet their expectations. In summary, to design and code computer programs that meet customer requirements, developers need to be proficient in programming languages, understand software design principles, have effective communication skills, and be able to gather and analyze customer requirements. These learning outcomes are essential in developing programs that meet customer needs and provide them with a positive user experience.

Learn more about java here-

https://brainly.com/question/30354647

#SPJ11

what are the advantages of customer relationship managment​

Answers

Answer:

Enhances Better Customer Service.

Facilitates discovery of new customers.

Increases customer revenues.

Helps the sales team in closing deals faster.

Enhances effective cross and up-selling of products.

Simplifies the sales and marketing processes.

Makes call centers more efficient.

Enhances customer loyalty.

Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. A bool variable named norecall has been declared . Given an int variable modelYear write a statement that assigns true to norecall if the value of modelYear does NOT fall within the recall range and assigns false otherwise. Do not use an if statement in this exercise!

Answers

Answer:

The statement (in Python) is as follows:

recalled = modelYear >=2001 and modelYear <=2006

Explanation:

Required

A statement without an if statement to assign true or false to recalled

Using an if statement, the comparison is

if modelYear >=2001 and modelYear <=2006:

    recalled = True

else:

    recalled = False

To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.

recalled = modelYear >=2001 and modelYear <=2006

Note that, we assume that there is an input fo variable modelYear

1. It manages the computer's memory and processes, as well as all of its software and hardware.
A. Application software
C. Graphical User Interface
B. Computer Operating System
D. Micro Computer ​

Answers

Answer:

B. Computer operating system

Explanation:

the operating system (or OS) manages all of the hardware and software in the computer, and allows hardware and software to communicate.

We can also figure this out by process of elimination: Application software is just a fancy way to say apps, Graphical User Interface (or GUI) are menus that allow a user to use the computer through a visual representation (what you interact with using your mouse), and microcomputer just means a small computer like a laptop or a phone.

-- isqa 3310- homework--50 Points-- This assignment uses the tables defined for the SQL Lab #1, Employees-Assignments-Projects and related -- tables. These tables can be found on the course Canvas page under ModulesWrite SQL statements to meet the following 10 criteria. Be sure to add a semicolon at the end of each of --your SQL queries.
--.

Answers

Hi! I understand that you need help with your ISQA 3310 homework, which involves writing SQL statements for the Employees-Assignments-Projects tables. However, due to the 200-word constraint, I'll provide answers for the first 4 criteria.

Please feel free to ask for additional assistance if needed.
1. To list all employees:
```
SELECT * FROM Employees;
```
2. To list all projects:
```

SELECT * FROM Projects;
```
3. To display the total number of employees assigned to each project:
```
SELECT p.project_id, p.project_name, COUNT(e.employee_id) AS total_employees
FROM Projects p
JOIN Assignments a ON p.project_id = a.project_id
JOIN Employees e ON a.employee_id = e.employee_id
GROUP BY p.project_id, p.project_name;
```
4. To list employees who have not been assigned to any project:
```
SELECT e.employee_id, e.employee_name
FROM Employees e
LEFT JOIN Assignments a ON e.employee_id = a.employee_id
WHERE a.assignment_id IS NULL;
```
These are the SQL queries for the first 4 criteria based on the information you provided. If you have more criteria to address, please provide additional details, and I'd be happy to help further.

Learn more about SQL here

https://brainly.com/question/25694408

#SPJ11

(1) describe how you generally use your cellphone on a daily basis (including with whom do you communicate for what purpose with what frequency); (2) read the Supplementary Reading (click here: Does the Internet Make You More or Less Connected?), and discuss how YOUR cellphone use make YOU more or less connected.

Answers

Brainly wasn't letting me answer, so here's an attachment of the answer

in what network topology are devices daisy-chained together in a single line

Answers

In a network topology, devices daisy-chained together in a single line is a linear bus topology. A bus topology is a network configuration in which all devices are attached to a central cable called a bus or backbone.

What is network topology?

Network topology is a way to organize the devices that are connected to a network. Network topology can be categorized into six basic categories. These six categories are:

Mesh topology

Star topology

Bus topology

Ring topology

Hybrid topology

Tree topology.

What is daisy-chained network topology?

A daisy-chained network topology is a type of topology in which devices are connected together in series. Each device in the network connects to two other devices. The first device connects to the second, the second device connects to the third, and so on until the last device in the chain is reached. This type of topology is also referred to as a linear topology or a bus topology.

What is a single line network topology?

A single line network topology is a type of topology in which all devices are connected to a single cable. This cable is used to transmit data between the devices. All devices in a single line network topology are connected in series. This means that data must pass through each device before it reaches its final destination.

Learn more about network topology at https://brainly.com/question/17036446

#SPJ11

Select the correct answer from each drop down menu

What computing and payment model does cloud computing follow?

Cloud computing allows users to ____ computing resources and follows the ___________ payment model


First blank choices are
1. Buy
2. Own
3. Rent
4. Sell
Second blank choices are
1. Pay as you go
2. Pay anytime anywhere
3. Pay once use multiple times

Answers

Answer:

buy and pay as you go

Explanation:

what are the uses of plotters​

Answers

Answer:

Plotters are use to produce the hard copy of schematics and other similar applications They are mainly used for CAE applications.They can print on a wide variety of flat materials

Hope it helps :)❤

Answer:

 Plotters are used to print graphical output on paper. It interprets computer commands and makes line drawings on paper using multicolored automated pens. It is capable of producing graphs, drawings....

Match these step-by-step directions in the order that you will find them in this course.
1. tab name
second step
2. group name
third step
3. tool name
first step
Please help !!

Answers

Answer:

a table with sample values

a chart with sample values

Microsoft powerpoint is a powerful presentation tool. It has several tools and can be used to present even excel files, charts and other graphical data.

When a chart is created in powerpoint, the slide of the application shows a table and a chart with sample values.

Explanation:

someone repoted my answer sorry

A CSIRT model that is effective for large organizations and for organizations with major computing resources at distant locations is the ____. a. central CSIRT
b. coordinating team
c. organizational CSIRT
d. distributed CSIRT

Answers

The distributed CSIRT model is the most suitable option for large organizations with major computing resources at distant locations. A distributed CSIRT (Computer Security Incident Response Team) model is effective for large organizations and organizations with major computing resources at distant locations.

In this model, the CSIRT is divided into multiple teams or sub-teams that are geographically distributed across different locations. Each team is responsible for handling security incidents within their respective area of coverage. The distributed CSIRT model allows for faster response times and efficient management of incidents across multiple locations. It also enables organizations to leverage the expertise and resources available at each location, ensuring that incidents can be effectively addressed regardless of their origin.

On the other hand, the other options mentioned are as follows:

a. A central CSIRT refers to a single centralized team responsible for handling security incidents across the entire organization. It may not be as effective for large organizations with widespread computing resources.

b. A coordinating team typically works in conjunction with other teams, including a CSIRT, to coordinate incident response efforts. While it plays a role in incident response, it is not specifically designed for large organizations with major computing resources.

c. An organizational CSIRT is a general term that encompasses any CSIRT within an organization, whether it's centralized or distributed. It does not specifically refer to a model designed for large organizations with major computing resources at distant locations.

Learn more about CSIRT here:

https://brainly.com/question/32215850

#SPJ11

HELP!!!!!!!!!!!!!!!! 16 points
Which communication device uses wireless data transmission? Select 4 options.

Bluetooth headphones
Ethernet cables
smartphones
smart speakers
satellite internet providers

Answers

Answer: Smart Speakers, Satellite Internet providers, Bluetooth headphones, and Smartphones app transmit wireless data.

Answer:

-Bluetooth Headphones

-Smartphones

-Smart Speakers

-Satellite Internet Providers

Explanation:

Each of these communication devices uses wireless data transmission.(Confirmed on EDGE)

I hope this helped!

Good luck <3

What is ameritrade log on?

Answers

Ameritrade log on is the process of accessing your Ameritrade account online.

Ameritrade is an online trading and Investing platform, and logging in allows you to access your account, view your investments, and place trades.

To log in to Ameritrade, you will need to:

Go to the Ameritrade website (https://www.tdameritrade.com/home.page).Click on the "Sign In" button in the upper right-hand corner of the page.Enter your username and password in the appropriate fields.Click the "Login" button to access your account.

If you have forgotten your username or password, you can click on the "Forgot your username or password?" link to retrieve your account information.

Once you are logged in to Ameritrade, you will be able to view your account information, perform transactions and access other features of the platform. Remember to log out when you are finished to ensure the security of your account.

Lear More About Ameritrade

https://brainly.com/question/29757300

#SPJ11

In the header of a for loop, which expression should not end with a semicolon?
a. initialization expression
b. test expression
c. update expression
d. none of these

Answers

In the header of a for loop, the expression that should not end with a semicolon is:
b. test expression

The expression that should not end with a semicolon in the header of a for loop is the update expression. The initialization expression and test expression both require semicolons, but the update expression should not end with a semicolon. Therefore, the correct answer is c. update expression.The tag in HTML is used to define the header for a document or a section as it contains the information related to the title and heading of the related content. The element is intended to usually contain the section’s heading (an h1-h6 element or an element), but this is not required.Then, the element is not a landmark. The element can define a global site header, described as a banner in the accessibility tree. It usually includes a logo, company name, search feature, and possibly the global navigation or a slogan. It is generally located at the top of the page.

learn more about test expression here:

https://brainly.com/question/24906479

#SPJ11

Determine which problem matches the given inequality. c less-than 5 and one-half There are 5 and one-half fewer cups of sugar than flour. There are 5 and one-half more cups of sugar than flour. There are less than 5 and one-half cups of sugar. There are more than 5 and one-half cups of sugar.

Answers

Answer:

There are less than 5 1/2 cups of sugar.

Explanation:

Given

\(c < 5\frac{1}{2}\)

Required

Select a matching expression for the inequality

The inequality sign <,  mean less than

So: we can say that \(< 5\frac{1}{2}\) means less than \(5\frac{1}{2}\)

From the given options, only option c shows less than \(5\frac{1}{2}\)

i.e. less than \(5\frac{1}{2}\) cups of sugar

Hence, (c) answers the question

Answer:

C

Explanation:

In CSS, how would you select all the tags on a page?
Choose 1 answer:

Answers

To select all the tags on a page using CSS, you can use the universal selector (*). The universal selector matches any element type, so applying a style rule to it will affect all the elements on the page.

Here is an example:

* {

 /* CSS styles */

}

In the above code, the asterisk (*) selects all the elements on the page, and the CSS styles within the curly braces apply to all those elements.

Keep in mind that applying styles to all elements on a page using the universal selector can have unintended consequences and potentially affect the performance of your website. It's generally better to be more specific with your selectors whenever possible

Read more about CSS here:
https://brainly.com/question/29410311
#SPJ1

c++ deprecated conversion from string constant to ‘char*’ T/F

Answers

True. If you encounter the "deprecated conversion from string constant to char*" error, it means you are trying to assign a string constant to a non-const char pointer, which is no longer allowed in modern C++.

In C++, string constants are stored as arrays of characters, and they are read-only. If you try to assign a string constant to a non-const char pointer using the equals sign (=), the compiler will issue a warning or error message. This is because C++ has deprecated the conversion from string constant to char*.
To avoid this error, you should use const char* or const char[] instead of char* to store string constants. Alternatively, you can use the std::string class to manipulate strings in a safer and more convenient way.
In conclusion, if you encounter the "deprecated conversion from string constant to char*" error, it means you are trying to assign a string constant to a non-const char pointer, which is no longer allowed in modern C++.

To know more about deprecated conversion visit :

https://brainly.com/question/32305486

#SPJ11

If you use excel regularly, do you use a documentation
page? Can you see any advantages or disadvantages to
using the documentation page?

Answers

Using a documentation page in Excel can provide advantages such as improved organization, collaboration, and future reference.

As an AI language model, I don't have personal experiences or habits like using Excel or documentation pages. However, I can provide information on the advantages and disadvantages of using a documentation page in Excel:

Advantages of using a documentation page in Excel:

Organization: A documentation page helps keep track of important details, formulas, and processes used in the spreadsheet, improving organization and ease of understanding.

Collaboration: Documentation can be shared with others, facilitating collaboration and ensuring everyone has access to essential information about the spreadsheet.

Future reference: Having a documentation page allows users to refer back to it in the future, even if they haven't worked with the spreadsheet for a while, making it easier to understand and modify the file.

Disadvantages of using a documentation page in Excel:

Maintenance: Keeping the documentation up to date can be time-consuming, especially if there are frequent changes to the spreadsheet.

Duplication: There is a possibility of duplicating information already available in Excel's built-in features like comments or cell notes, leading to redundancy.

Accessibility: If the documentation page is not properly shared or stored, it may be difficult for others to locate or access the relevant information.

However, it may require additional effort for maintenance and can lead to duplication if not managed effectively. Consider the specific needs of your Excel usage and determine if a documentation page would be beneficial in your case.

To know more about excel visit :

https://brainly.com/question/3441128

#SPJ11

A language processor converts program written in a programming language into machine language ​

Answers

Answer:

True

Explanation:

Is the question true or false? If yes, then the answer is true.

The computer/machine do not understand high level and low level languages.

These languages are often referred to as non machine languages.

So, the language processor, also known as translators, help translate programs written in these non machine languages to the equivalent in machine language.

There are 3 basic types; and they are assembler, interpreter and compiler.

A green hard drive led stays solid for long periods of time, even when it no applications are open. what is a possible reason behind this?

Answers

A green hard drive led stays solid for long periods, even when it no applications are , a possible reason behind this open Disk failure is normally indicated by a red LED.

Why is my hard drive not working?

Mostly, a hurt port, cable, or drive can cause these hard drive issues. Make sure that the machine is in working condition and the USB port is not damaged. Clean it thoroughly of any debris or dirt and reconnect the exterior hard disk to check its connection.

What causes Seagate stern drive light on but not detected?

One of the most common reasons is a bad USB port or cable. In addition, there are some other factors for the situation like improper device settings, ancient or corrupted hard drive driver, a virus, etc.

To learn more about green hard drive, refer

https://brainly.com/question/1558359

#SPJ4

The police department in the city of Computopia has made all streets one-way. The mayor contends that, for any intersection i,j, there exist a way to drive legally from intersection i to intersection j or from intersection j to intersection i. A computer program is needed to determine whether the mayor is right. For each case design an efficient algorithm and derive the runtime. • Add the restriction that there is no loop. • Assume that there is no restriction.

Answers

To determine whether the mayor's contention is correct, we need to check if there is a legal route between any two intersections in the city. Let's consider the two scenarios separately: one with the restriction of no loops and the other without any restrictions.

With no loops:

In this scenario, we can use a Depth-First Search (DFS) algorithm to check if there is a legal route between any two intersections. We start at one intersection and traverse the graph, visiting all reachable intersections. If we encounter an intersection that we have already visited, it means there is a loop, and we stop the traversal. If we can visit all intersections without encountering a loop, then the mayor's contention is correct.

The runtime complexity of the DFS algorithm is O(V + E), where V is the number of intersections (vertices) and E is the number of streets (edges) connecting them. This is because we need to visit each intersection once and explore all connected streets.

Without any restrictions:

In this scenario, we can use a modified version of the DFS algorithm to check if there is a legal route between any two intersections. We start at one intersection and traverse the graph, visiting all reachable intersections. Unlike the previous scenario, we don't stop if we encounter a loop. Instead, we continue the traversal and mark the visited intersections. Once we have visited all intersections, we check if there is any unmarked intersection. If there is, it means there is at least one pair of intersections for which there is no legal route, and the mayor's contention is incorrect.

The runtime complexity of this modified DFS algorithm is also O(V + E), as we still need to visit each intersection and explore all connected streets.

In both cases, the runtime complexity is determined by the number of intersections (V) and the number of streets (E) in the city. The algorithm's efficiency will depend on the specific implementation and data structure used to represent the city's road network.

Learn more about intersections  here

https://brainly.com/question/12089275

#SPJ11

what is computer?explain any five characteristic in short.​

Answers

Answer:

A programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed and display the results of these operations. Mainframes, desktop and laptop computers, tablets, and smartphones are some of the different types of computers.

Characteristics of Computer System:

= Speed. A computer works with much higher speed and accuracy compared to humans while performing mathematical calculations. ...

= Accuracy. Computers perform calculations with 100% accuracy. ...

= Diligence. A computer can perform millions of tasks or calculations with the same consistency and accuracy. ...

= Versatility. ...

=Reliability. ...

= Memory.

In most object-based languages, the reserved word private is provided to support which of the following?
Question 7 options:
Inheritance
Encapsulation
Polymorphism
Information hiding

Answers

The reserved word "private" in most object-based languages is provided to support information hiding.

Information hiding is a principle of object-oriented programming that emphasizes encapsulation and restricts direct access to internal data and implementation details of an object. By declaring certain members or attributes as private, they are hidden from external access, making them inaccessible to other parts of the program. The "private" keyword allows the class to control access to its internal state and implementation details, ensuring that they can only be accessed or modified through defined methods or functions. This promotes encapsulation by providing a clear interface to interact with the object while hiding its internal complexities. By using the "private" access modifier, developers can enforce data abstraction, protect sensitive information, and maintain the integrity and consistency of the object's state. It helps prevent unauthorized modifications or access to internal data, enhancing the security and maintainability of the code.

learn more about information hiding here:

https://brainly.com/question/30503654

#SPJ11

write a loop that reads positive integers from standard input, printing out those values that are greater than 100, each followed by a space, and that terminates when it reads an integer that is not positive. declare any variables that are needed. assume the availability of a variable, stdin, that references a scanner object associated with standard input.

Answers

The code below is in Java.

It uses a do-while loop to get the inputs from the user, checks if they are greater than 100 using if-else structure, and appends them to the result String along with a space

Comments are used to explain the each line.

The output can be seen in the attachment.

//Main.java

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    //Scanner object to be able to get input from the user

    Scanner input = new Scanner(System.in);

   

    // Declaring the variables

    int number;

    String result = "";

   

    //Creating a do-while loop that iterates while number is greater than 0

    //Inside loop, get the number and check if it is greater than 100

    //  If it is, append the number to the result String along with a space

    do{

        number = input.nextInt();

        if(number > 100)

            result += number + " ";

    }while(number > 0);

   

    //Print the result

 System.out.println(result);

}

}

You may check a similar one at:

https://brainly.com/question/15020260

write a loop that reads positive integers from standard input, printing out those values that are greater

a data analyst is working with the penguins data. the analyst wants to sort the data by flipper length m from longest to shortest. what code chunk will allow them to sort the data in the desired order?

Answers

Assuming the penguin data is stored in a pandas DataFrame named df, the following code chunk can be used to sort the data by flipper length m from longest to shortest:

df.sort_values('flipper_length_mm', ascending=False, inplace=True)

What is the explanation for the above response?

This code uses the sort_values() method of the DataFrame to sort the rows by the 'flipper_length_mm' column in descending order (from longest to shortest).

The ascending=False argument specifies the sorting order, and the inplace=True argument makes the sorting permanent by modifying the original DataFrame.

The code chunk sorts the penguins data by the 'flipper_length_mm' column in descending order, which means from longest to shortest. The 'sort_values()' method is used to sort the data by a specific column, and the 'ascending=False' parameter is used to sort in descending order.

Learn more about Chunk of code at:

https://brainly.com/question/30295616

#SPJ1

what is true about the process of converting analog data into digital data?

Answers

Answer:

The process of converting analog data into digital data involves measuring the continuous analog signal and dividing it into discreet numerical values. The digitized data is then stored in binary format, allowing it to be processed by digital devices. This process results in a more precise and accurate representation of the original analog signal, but also results in the loss of some information during the quantization process.

The Monte Carlo method uses ___________ for computer simulations

Answers

Answer: repeated random sampling

Explanation:

What does this mean?

What does this mean?

Answers

Answer:

The network that the platform is running on is down. Wait about 30min, and then try again. You can also restart your device.

Explanation:

This used to happen to me all the time during school, but when I restarted my computer it always fixed it!

3. Describe at least THREE different kinds of networks present in your house or school and what devices are connected through each network. Which network do you personally use the most, and why? Should you be concerned about cybersecurity for that network?

Answers

Answer:

There are various networks in a typical house or school, including wired, wireless, and internet networks. Wired networks are used to connect devices such as desktop computers, printers, and servers using Ethernet cables. The wireless network connects devices such as laptops, smartphones, and tablets through a Wi-Fi signal. The internet network is used to connect to the internet, allowing devices to communicate and exchange data over the World Wide Web. I personally use the wireless network the most as it is the most convenient for my smartphone and laptop. Cybersecurity is a concern for all networks, especially for wireless networks as they are susceptible to hacking and unauthorized access. Therefore, it is crucial to use strong passwords, update software regularly, and limit access to the network to ensure cybersecurity.

write a python code that defines a function named total, which takes two integers as arguments (num1, num2), and returns the total of the numbers within the range of these two numbers (num1, num2). for example, if the function received the numbers 1 and 4, it should return the total of the numbers in between, 1 2 3 4, which is 10.

Answers

An example of the line of code needed to define the function is:

def total(x, y):

   total_sum = 0

   for num in range(x, y):

       total_sum += num

   return total_sum

How to write the python code?

Here we want to find a function tat takes two integers as inputs, and returns the total of the numbers within the range of these two numbers (num1, num2).

The line of code is something like:

def total(x, y):

   total_sum = 0

   for num in range(x, y):

       total_sum += num

   return total_sum

Learn more about Python at:

https://brainly.com/question/26497128

#SPJ4

Other Questions
Examples from around the world of what nativism is not? children with avoidant/restrictive food intake are commonly known as what? someone pls help me asap How is this pandemic a threat to democracy ? Hello is due today This question has two parts. First, aanswer Part A. Then, answer Part B. Part A: Find the Error Rectangle ABCD has vertices A(2, 1), B(2, 7), C(10, 7), and D(10, 1). A classmate possibly made a mistake when they stated that the perimeter of the rectangle is 16 units. What should they do to correct it?(A)Nothing; the classmate did not make a mistake (B)The classmate should of subtracted 7 - 1 and 10 - 2 to find lengths 6 and 8(C)The classmate should have added 7 + 1 and 10 + 2 to find lengths 8 and 12(D)The classmate should have subtracted 10 - 2 and 10 - 2 to find lengths 8 and 8part Bwhat is the actual perimeter of the rectangle?_______units How does a table of contents help readers understand informational texts?It helps readers by making information easy to locate.It assists readers by eliminating the need to read the entire text.It shares other resources that readers could access for more information.It helps readers create a visual image of what the author is explaining. sustainable success in business usually: is required by the federal government. assures business profitability. benefits society along with the company. improves the environment. sort these molecules into the appropriate bin according to their polarity. HBr. CO2. BF3. H2. CH4. NH3 The length of time Y necessary to complete a key operation in the construction of houses has an exponential distribution with mean 10 hours. The formula C = 100 + 40Y + 3Y 2 relates the cost C of completing this operation to the square of the time to completion. Find the mean and variance of C. Plz help For her cellular phone service, Kinsley pays $40plus $15 per gb of data. Write an expression torepresent the amount of money Kinsleyspends for g gb of data. Find the zeros of each functions by using a graph and a table. F(x)=2x^2+2x-24Tables for y and x has to be 0-10 Javier prefiere no _____ hasta muy tarde en la noche porque le gusta ver peliculas. * O dormirse O levantarse O despertarse O arreglarse One of the most important uses of sales promotion techniques is to encourage consumers to try a new product or service. True or False Review the final paragraph, which begins onpage 4 and ends on page 5. Why does theauthor refer to the "British Crown" instead of theBritish government? Which one of the presidents roles is being fulfilled when he/she serves as the nations spokesperson to the rest of the world and develops foreign policy?. Which conclusion is best supported by the data?The particles in substance W have a greater average kinetic energy than the particles in substance Z.The particles in substance X have a greater average kinetic energy than the particles in substance Z.The particles in substance W have a lower average kinetic energy than the particles in substance X.The particles in substance Z have a lower average kinetic energy than the particles in substance Y. You are the Manager of "Best Leing Center," a tutoring and mentoring school whichyou put up a year agp in Manila, in paine-ship with two lady friends, Hope and Lorie. Theyare both government scholars and have graduated last year with a Bachelor of Sciencedegree in Education, major in PhysicsBefore you formed the learning center, you developed a one-year financial plan for thelearning center. The initial one yen test run of the business has elapsed and you decidedto spend a one day business retreat with them. Since you will be taking the lead role, youthought that the best way to do it is to apply the "Measuring Results" process.information about the thultssfiht,eansopetationadvaneedthefollomingencouragingFrom Lorie, the cor-pany treasurer - revenues for the year totaled P360,000 (90%of the annual target); money on hand and in bank is P160,000.From Hope, the operations manager - about 40 student mentees registered formentoring during the year and she has been continuously receiving inquiries.While you were preparing the agenda, it occurred to you that perhaps the ariginalfinancial plan format to guide the business for the next three to five years. So you decidedto expand the meeting agenda to include discusson on the non- financial or the operationalaspects of the business, How would then your agenda look like? Which of these would earn the same interest as a $150 principal at 4% annual interest for 2 years? Select all that apply. A.$300 at 2% for 2 yearsB.$150 at 6% for 18 monthsC.$400 at 3% for 1 yearD.$100 at 1% for 8 yearsE.$50 at 48% for 6 months kanye south entered ut dallas as an accounting major. his first semester was fall 2018, so he is on the 2018 academic catalog. in fall 2019, he decided to change his major to finance. his new major will also be on the 2018 catalog. true or false? How does social control work between confrmity and deviance?