when PCs were first developed in the 1970s, network computing was

Answers

Answer 1

When PCs (personal computers) were first developed in the 1970s, network computing was in its early stages. During this time, the focus was on creating standalone computers for individual use, and the concept of connecting multiple PCs together to form a network for sharing resources and computing power was still emerging.

When personal computers (PCs) were first developed in the 1970s, network computing was in its infancy. At that time, most computing was done on standalone PCs, with very limited connectivity between them. However, in the early 1980s, local area networks (LANs) began to be developed, allowing multiple PCs to be connected together within a single building or campus. This made it possible for users to share data and resources, such as printers and file servers, and to communicate with each other using email and other messaging systems. In the mid-1980s, wide area networks (WANs) began to be developed, which allowed users to connect to remote sites over long distances. This enabled the development of distributed computing systems, where data and processing tasks could be distributed across multiple locations, and users could access resources and services from anywhere in the world.

Learn more about email here-

https://brainly.com/question/14311364

#SPJ11


Related Questions

Fill in the blank to make the sentence true.

The symbol
is used to indicate that a line of text is a comment.

Answers

Answer:

# is  sign you use

Explanation:

Explanation:

now days we use asterisk*

in old days it was Two ampersands&&

it is asterisk

ArrayFunction will contain the following static methods: readArray - takes in a String representing the filename and a reference to an array of Strings (the array should be allocated prior to the method call). The method will fill the array from the file. You may assume there is one state capital name per line. If there are more lines in the file than the array has the capacity to hold, only read enough to fill the array. If there are not enough state capital names in the file to fill the array, keep track of the number actually loaded into the array. This method will return the number of values added to the array. Exception handling: this method will have no throws clause - you must use exception handling to handle the following exceptions. → If the array reference is null and you attempt to access the array, a NullPointerException will be thrown. If this happens, return 0. >> If the file does not exist, return 0. writeArray - takes in a String representing the filename, an array of Strings and returns a boolean . Note: This method should write the U.S. state capitals along with the order they appear in. For example: 1: Montpelier 2: Austin 3: Hartford The return value indicates if the write was successful (true) or not (false) Exception handling: this method will have no throws clause - you must use exception handling to handle the following exceptions. → If the array reference is null and you attempt to access the array, a NullPointerException will be thrown. If this happens, return false. If any file exception occurs, return false. . selection Sort - this is the same selection sort we have used in class, with two exceptions. The method takes a second integer, n, representing the number of elements in the array, allowing support of partially full arrays. The method works on an array of Strings. binarySearch - This is a RECURSIVE implementation of binary search. Driver will contain a main method that accomplishes the following: . Prompt the user for the name of the file • Prompt the user for an integer value, representing the number of names to read from the file. Validate this number, both in type and value. If the user enters a String, your program should not crash. For example: How many U.S. state capital names would you like to search through? Twenty Twenty is not an integer. Enter a positive integer: -4 Enter a positive integer: 12 Create the array Using the method readArray in ArrayFunctions, load the specified number of state capital names into an array of strings. Note: this method returns the number of names read it (you could end up with a partially full array); if this occurs, notify the user and proceed. Using the method selectionSort in ArrayFunctions, sort the U.S. state capital names. Using the method writeArray in ArrayFunctions, write the sorted data to a new file. The name of the file should be the original filename preceded by "sorted_". For example, if the specified filename is "statecapital.txt", the new file should be "sorted_statecapital.txt". If the method writeArray is not successful, issue a message to the user ("write was unsuccessful"). Using the binarySearch method in ArrayFunctions, search the array for the user specified state capital name. Report the results. For example: Denver was 30 on the list or Denver was not in the top 10 Note: U.S. state capitals such as Salt Lake City and Santa Fe will appear in the file as Salt Lake City and SantaFe. Example File: Montgomery Phoenix Boise Helena Pierre Richmond SaltLakeCity Boston CarsonCity Madison

Answers

The class ArrayFunctions will contain several static methods that handle some particular tasks. These methods are described below:readArray: It is a static method that takes in two parameters, i.e., a String representing the filename and a reference to an array of Strings.

This method fills the array from the file. We can assume that there is one state capital name per line. If there are more lines in the file than the array has the capacity to hold, only read enough to fill the array. If there are not enough state capital names in the file to fill the array, keep track of the number actually loaded into the array. This method will return the number of values added to the array.

Exception handling: This method will have no throws clause. We must use exception handling to handle the following exceptions.→ If the array reference is null and you attempt to access the array, a NullPointerException will be thrown. If this happens, return 0

For example, if the specified filename is "statecapital.txt", the new file should be "sorted_statecapital.txt". If the method writeArray is not successful, issue a message to the user ("write was unsuccessful").Using the binarySearch method in ArrayFunctions, search the array for the user-specified state capital name. Report the results. For example, Denver was 30 on the list or Denver was not in the top 10. Note: U.S. state capitals such as Salt Lake City and Santa Fe will appear in the file as Salt Lake City and SantaFe.Example file: MontgomeryPhoenixBoiseHelenaPierreRichmondSaltLakeCityBostonCarsonCityMadison.

To know more about method visit:

https://brainly.com/question/14560322

#SPJ11

The spreadsheet below shows how much money each store raised for charity during the months of January, February, and March. A1: Blank. B1: Store 1. C1: Store 2. D1: Store 3. A2: January. B2: 170 dollars. C2: 100 dollars. D2: 150 dollars. A 3: February. B3: 235 dollars. B4: 80 dollars. D3: 240 dollars. A4: March. B4: 300 dollars. C4: 75 dollars. D4: 450 dollars. Using this information, answer the following questions. To obtain the total amount raised by Store 1, which range of cells would you use?

PLEASE HURRY I HAVE TO FINISH BY 12:00

The spreadsheet below shows how much money each store raised for charity during the months of January,

Answers

Answer:

B2:B4

Explanation:

Answer:B2:B4 ,sum ,using the sum and average functions on the range of cells

Explanation:

trust i took the test

two-wire control circuits control the operation of three-phase motors by controlling the power applied to the motor ____.

Answers

Two-wire control circuits control the operation of three-phase motors by controlling the power applied to the motor windings.

Three-phase motors typically have three sets of windings: one for each phase of the power supply. The windings are responsible for generating the electromagnetic fields that drive the motor's rotation. By controlling the power applied to these windings, the speed, direction, and other aspects of the motor's operation can be manipulated.

Two-wire control circuits, also known as basic control circuits, are commonly used to start and stop three-phase motors. These circuits typically involve a motor starter or contactor, which acts as a switch to control the flow of power to the motor. By opening or closing the contacts of the motor starter, the power supply to the motor windings can be enabled or interrupted, allowing for precise control over the motor's operation.

To know more about motor windings

brainly.com/question/32332966

#SPJ11

program that shows if it's an integer or not​

Answers

isInteger() method returns true if a value is an integer of the datatype Number. Otherwise it returns false

the windows ________ utility looks for files that can safely be deleted to free up disk space. group of answer choices
A. space manager B. error checking C. optimize drives D. disk cleanup

Answers

D. Disk Cleanup. The Windows Disk Cleanup utility is a built-in tool in the Windows operating system that helps users free up disk space on their computer by identifying and removing unnecessary files.

It scans the computer's hard drive and presents a list of files that can be safely deleted, allowing users to reclaim storage space and improve system performance.

The Disk Cleanup utility performs several tasks to identify and remove unnecessary files:

1. Temporary Files: It identifies and removes temporary files created by the system and various applications. These temporary files are typically generated during software installations, system updates, and web browsing.

2. Recycle Bin: It empties the Recycle Bin, which stores deleted files until they are permanently removed from the system. By emptying the Recycle Bin, users can recover additional disk space.

3. System Files: It includes an option to clean up system files, such as old Windows updates and installation files. This can free up a significant amount of space on the hard drive.

4. Windows Error Reporting: It allows users to delete error reports that are generated when certain applications or the operating system encounters errors. These reports are used for troubleshooting, but deleting them does not impact the system's functionality.

5. Optional Windows Components: It provides the option to remove additional Windows components that are not frequently used. This can be useful for users who want to remove certain features to save disk space.

The Disk Cleanup utility presents a summary of the potential disk space that can be recovered from each category and allows users to select the items they want to delete. It is a user-friendly tool that helps optimize disk space usage and maintain the performance of the Windows operating system.

To learn more about disk cleanup, click here: brainly.com/question/546174

#SPJ11

Given string stringValue on one line, string str2 on a second line, and integer choiceLen on a third line, replace the first choiceLen characters in stringValue with the contents of str 2 . Ex: If the input is: Fuzzy bear Happ 4 then the output is: Happy bear Note: Using a pre-defined string function, the solution can be just one line of code. 1 #include 2 #include 〈string〉 3 using namespace std; 5 int main(){ 6 string stringvalue; 7 string str2; 8 int choicelen; 10 getline(cin, stringvalue); 11 getline(cin, str2); 12 cin > choicelen; 13 I * Your code goes here */ 15 cout ≪< stringValue << end
3
;

Answers

Answer:

To replace the first `choiceLen` characters in `stringValue` with the contents of `str2`, we can use the `replace` function from the `<string>` library. The `replace` function takes three parameters: the starting position, the number of characters to replace, and the replacement string.

Therefore, a possible one-line solution (as indicated in the prompt) is:

```

stringvalue.replace(0, choicelen, str2);

```

This will replace the first `choicelen` characters in `stringValue` with the contents of `str2`. Then, we can output the modified string using:

```

cout << stringvalue << endl;

```

Therefore, the complete program would be:

```

#include <iostream>

#include <string>

using namespace std;

int main() {

string stringvalue;

string str2;

int choicelen;

getline(cin, stringvalue);

getline(cin, str2);

cin >> choicelen;

stringvalue.replace(0, choicelen, str2);

cout << stringvalue << endl;

return 0;

}

```

For example, if the input is:

```

Fuzzy bear

Happ

4

```

the output will be:

```

Happy bear

```

whats the task of one of the computers in network called?

a. hardware server
b. software server
c. Web server ​

Answers

The answer that’s gonna be followed is a:hardware server I’m sure

Answer:

C

Explanation:

I guess that's the answer

On the Design tab, which group allows you to select a different data set for a chart?
O Data
O Chart Legends
O Type
Chart Styles

Answers

Answer

A.Data

Trust me

Answer:

A. Data

Explanation:

got it right

32.
To give an existing document a different name
A. retype and give it another name,
B. use the save command
C. use the same as command
D. use windows explorer to copy.

Answers

Answer:

B.

Explanation:

If you are trying to save an existing document you would use the save command and you will be prompted if you want to rename it to what ever you wish

Hope this helps :)

If others have read access to your calendar, what should you do to prevent them from seeing the details of a particular event?

Mark the event as Free so they will not see the event at all.
Mark the event as Busy so they know how long you are out.
Mark the event as Tentative so they may not know where you are.
Mark the event as Private so they will only see that you are not available.

Answers

Answer: mark the event as private so they will only see that you are not available.

Explanation:

Answer:

D. Mark the event as Private so they will only see that you are not available.

Explanation:

While recording the macro, how do you add a new blank record to the end of the table?

Answers

Answer:1. Click the arrow at the right end of the Quick Access toolbar and select More Commands. The Excel Options dialog box appears with the Quick Access Toolbar options displayed in the right pane. 2.In the Choose Commands From drop-down

Explanation:

To add a new blank record to the end of the table while recording a macro, please follow these steps:

What is Macro: if you have tasks in Microsoft Excel that you do repeatedly, you can record a macro to automate those tasks. A macro is an action or a set of actions that you can run as many times as you want. ... You can create and then run a macro that quickly applies these formatting changes to the cells you select.What are the benefits of creating and using macros: The macro recorder records each step of a macro as code written in Visual Basic for Applications (VBA). These actions may involve entering text or numbers, selecting cells or menu items from the ribbon or menus, styling cells, rows, or columns, or even importing information from a different source, such as Microsoft Access.Begin recording the macro by going to the "Developer" tab on the Ribbon, then click on "Record Macro" button. Name your macro and set the desired options, then click "OK" to start recording.Navigate to the table where you want to add a new blank record. Click on the last row of the table, which is typically marked with an asterisk (*), to select it. This is the "New Record" row. Press the "Tab" key on your keyboard to create a new blank record at the end of the table. The cursor will move to the first field in the new record. Click on the "Developer" tab on the Ribbon again, and click "Stop Recording" to end the macro recording process.Now, you have successfully recorded a macro that adds a new blank record to the end of the table.

Learn More About Macro: https://brainly.com/question/29847134

#SPJ11

What are the hardware and software components of a computer

Answers

Answer: See explanation

Explanation:

Computer hardware simply refers to the part of the computer that we can see and also touch. This includes the mouse, keyboard, monitor, central processing unit, monitor etc.

The computer software simply refers to the set of instructions which are used in the operation of the computer. It includes the application programs, operating system etc.








Explain how the Fourier transform can be used to remove image noise.

Answers

The Fourier transform can be used to remove image noise by isolating the noise in the frequency domain and filtering it out. The Fourier transform allows us to analyze an image in the frequency domain by decomposing it into its component frequencies. Image noise appears as high-frequency components in the image.

By applying a low-pass filter in the frequency domain, we can remove the high-frequency noise components and preserve the low-frequency components that make up the image. Once the filtering is complete, the inverse Fourier transform is applied to convert the image back to the spatial domain. This results in an image that has been effectively denoised. The Fourier transform can be used to remove image noise by transforming the image from the spatial domain to the frequency domain, filtering out high-frequency noise, and then transforming the filtered image back to the spatial domain.

Step 1: Convert the image to the frequency domain using the Fourier transform. This process decomposes the image into its frequency components, representing various spatial frequencies present in the image. Step 2: Apply a low-pass filter to the transformed image. This filter removes high-frequency components, which are typically associated with noise, while retaining low-frequency components that represent the essential features of the image. Step 3: Convert the filtered image back to the spatial domain using the inverse Fourier transform. This step restores the image to its original form, but with the high-frequency noise components removed. By following these steps, the Fourier transform can effectively be used to remove image noise and improve image quality.

To know more about domain visit :

https://brainly.com/question/30133157

#SPJ11

What is printed as a result of executing the code segment if the code segment is the first use of a SomeClass object

Answers

Code segments are codes taken out from a more complete code or program

The result of executing the code segment would print 14

How to determine the result

To determine the result, we simply run the program as follows:

public class SomeClass{

private int x = 0;

private static int y = 0;

public SomeClass (int pX){

x = pX;y++;

}

public void incrementY (){

y++;

}

public void incrementY (int inc){

y+= inc;

}

public int getY(){

return y;

}

public static void main (String [] args){

SomeClass first = new SomeClass (10);

SomeClass second = new SomeClass (20);

SomeClass third = new SomeClass (30);

first.incrementY();

second.incrementY(10);

System.out.println(third.getY());

}

}

The result of running the above program is 14

Hence, the result of executing the code segment would print 14

Read more about code segments at:

https://brainly.com/question/25781514

Which statement best describes the qualifications for Information Technology professions?
A. Most Information Technology fields require no training for entry level positions
B. Most Information Technology fields require a certification in addition to a degree.
C. Most Information Technology fields require at least a bachelor’s degree for entry level jobs.
D. Most Information Technology fields require at least a technical certificate for entry level jobs.

Answers

Answer:

Which statement best describes the qualifications for Information Technology professions? Most Information Technology fields require at least a technical certificate for entry level jobs.

You are creating a story map about Mexico. After configuring the web app template, you launch the app to test it. When the app opens, the map is zoomed to the whole world, instead of to Mexico. What actions will fix the problem

Answers

Nbdjsksjsidjdjwkwejd

Consider Emily's balance statement:

a) Emily's supervisor asked her to revise the balance statement. What does she need to revise? Why?

Consider Emily's balance statement:a) Emily's supervisor asked her to revise the balance statement. What

Answers

Answer: The purpose of a balance sheet is to give interested parties an idea of the company's financial position, in addition to displaying what the company owns and owes.

Explanation:

A Floppy Disk is an example of:
a) Primary Storage Device
b) Secondary Storage Device
c) Software Device
d) All the above

Answers

Answer:

B I think-

Explanation:

Its either Primary or Secondary :) pretty sure its secondary tho

Answer: Answer is B Heart if this was helpful

Explanation: Alternatively referred to as a floppy or floppy disk, a floppy diskette is a storage medium capable of holding electronic data, like a computer file.

which of these is a way to help prevent brute-force attacks? check all that apply.

Answers

Use complex passwords and limit login attempts.

How can brute-force attacks be prevented? (Check applicable methods)

Here are some ways to help prevent brute-force attacks:

Implement account lockout policies: After a certain number of failed login attempts, the account is locked and cannot be accessed until an administrator unlocks it.Implement CAPTCHA or reCAPTCHA: These are tools that help distinguish humans from automated scripts, making it more difficult for attackers to automate brute-force attacks.Implement multi-factor authentication: This requires the user to provide additional authentication factors beyond just a username and password, making it more difficult for an attacker to gain access to the account.Use strong passwords: Strong passwords are harder to guess or crack through brute-force attacks.Implement rate-limiting: This involves limiting the number of login attempts from a given IP address or user account within a specified time period, making it harder for an attacker to launch a brute-force attack.

So, the answer would be 1, 2, 3, 4, and 5.

Learn more about brute-force attacks

brainly.com/question/28119068

#SPJ11

Joann wants to save the building block she created for the title of her company.

In which file does she save this building block?

Answers

Answer:

Building Blocks.dotx

Explanation:

Just did it on Edge2020

1 point


If F = 4.0 N and m = 2.0 kg, what is the magnitude a of the acceleration for


the block shown below? The surface is frictionless. *


a.


F


F


40°


5.3 m/s^2


4.4 m/s^2


3.5 m/s^2


6.2 m/s^2


8.4 m/s^2

Answers

Answer:

2.0 m/sec^2

Explanation:

I don't see a block, but will assume the force is oriented in a horizonal direction and there is no friction.

F = ma

1 Newton is 1 kg*m*s^2

4.0 kg*m*s^2 = (2.0kg)(a)

2.0 m/sec^2

The options don't match, so I will assume the force is not parallel to the block.  Since all off the options are higher than 2.0 m/sec^2, it appears that the block is moving downward, and the force of gravity needs to be considered, and added.  The two vectors are the 4.0N force (at an angle) and the force of gravity (directed down).  The resultant vector, the combination of these two forces, will provide the correct answer.

What are digital computers? Where are they used?​

Answers

Digital computers are electronic devices that process information using binary digits (bits) in the form of zeros and ones.

How are they used?

They perform calculations, store and retrieve data, and execute instructions using digital logic circuits.

Digital computers are used in various fields and industries, including business, education, healthcare, entertainment, scientific research, and engineering.

They are employed for tasks such as data analysis, simulation, modeling, communication, automation, and controlling complex systems.

Learn more about digital computers at:

https://brainly.com/question/31462153

#SPJ1

Switch on your light make sure it is shining onto the wall hold your largest plastic shopping bag square between the light and the wall

Answers

Explanation:

As light travels through matter, different amounts of that light penetrate through the matter. Transparent objects allow nearly all the light shined on it to pass through the object. Glass, air, and clear plastic are transparent objects.

anybody know any educational game sites unblocced in school besides funbrain and pb skids

Answers

Answer:

cool math games is the best

Explanation:

In the Metropolitan City of Deep State there are 5 hospitals (DS1 to DS5)
DS1’s revenue is $1 billion
DS2’s revenue is $2 billion
DS3’s revenue is $4 billion
DS4’s share is 2X the share of DS5.
Total revenue of all 5 hospitals in Deep State is $25 billion
Compute the HH Index.

Answers

The HH Index for Deep State is 0.28, which indicates a high level of market concentration in the healthcare industry. The top 3 hospitals control 28% of the market share.

Here is the HH Index for Deep State:

HH Index = (DS1 + DS2 + DS3) / (Total Revenue) = (1 + 2 + 4) / 25 = 0.28

This means that the top 3 hospitals in Deep State control 28% of the market share. This is considered to be a high HH Index, which suggests that there is a high level of market concentration in the healthcare industry in Deep State.

The HH Index for Deep State is 0.28, which indicates a high level of market concentration in the healthcare industry. The top 3 hospitals control 28% of the market share.

Read more about market share here:

https://brainly.com/question/15530466

#SPJ4

ProjectStem 7.5 practice

Use the function written in the last lesson to calculate the gold medalists’ average award money for all of their gold medals. Define another function in your program to calculate the average.

Your program should then output the average award money, including the decimal place. Your program should use a total of two functions. You may assume that the user will provide valid inputs.

Sample Run
Enter Gold Medals Won: 3
How many dollars were you sponsored in total?: 20000
Your prize money is: 245000
Your average award money per gold medal was 81666.6666667

Answers

Below is Python program that calculates the average award money per gold medal using two functions:

python

def calculate_average_award(total_award_money, gold_medals):

   """Calculates the average award money per gold medal"""

   return total_award_money / gold_medals

def main():

   """Main function to get user input and output the result"""

   gold_medals = int(input("Enter Gold Medals Won: "))

   total_award_money = float(input("How many dollars were you sponsored in total?: "))

   prize_money = float(input("Your prize money is: "))

   

   average_award_money = calculate_average_award(prize_money + total_award_money, gold_medals)

   

   print("Your average award money per gold medal was", round(average_award_money, 10))

if __name__ == "__main__":

   main()

Sample run:

yaml

Enter Gold Medals Won: 3

How many dollars were you sponsored in total?: 20000

Your prize money is: 245000

Your average award money per gold medal was 81666.6666666667

What is the Python program about?

The calculate_average_award function takes two arguments, the total award money and the number of gold medals, and returns the average award money per gold medal.

The main function gets the user input for the number of gold medals, the total award money, and the prize money. It then calculates the total award money for all gold medals by adding the total award money and the prize money, and passes the values to the calculate_average_award function to get the average award money per gold medal.

Therefore, The program then outputs the result using the print function, rounding the value to 10 decimal places using the round function.

Learn more about Python program from

https://brainly.com/question/27996357

#SPJ1

What does D'Artagnan discover about Milady? d. That she has the mark of a criminal, the fleur- c. That she is secretly working for the queen. de-lis. b. That she is the wife of the Count of Rochefort. d. That she stole the diamonds from the queen.bl​

Answers

the answers is b .....

Answer:

prolly b

srry need tha points

Explanation:

when computing the hyt date for active duty sailors e1 through e-4

Answers

When computing the HYT (High Year Tenure) date for active duty sailors E1 through E4, it is important to consider the specific requirements and guidelines for each pay grade.

The HYT date is the maximum amount of time a sailor can serve in a particular pay grade before they must either be promoted or separated from the Navy. For E1 through E4 sailors, the HYT date is typically calculated based on the amount of time they have served in their current pay grade and their date of enlistment. Additionally, there may be other factors that can affect the HYT date, such as waivers or extensions. It is important for active duty sailors to be aware of their HYT date and to work towards promotion in order to continue their service in the Navy.

Learn more about military personnel management here:https://brainly.com/question/13754822

#SPJ11

which cisco ios command can be used to display which vlans are supported over a specific configured switch trunk?

Answers

"show interfaces trunk" or "show interfaces interface switchport" are the cisco-ios command that can be used to display the VLANs that are allowed over a trunk.

What are VLANs?

A virtual local area network (VLAN) is a virtualized link that unites various network nodes and devices from the several LANs into a single logical network.

A virtual LAN serves as a useful layer of intercommunication between LANs and related devices. Switch ports, which help aggregate many devices from several LANs.

VLAN has a number of benefits, including easier administration, better performance, more flexibility, and more.

To know more about VLAN, visit: https://brainly.com/question/25867685

#SPJ4

Other Questions
answedrop-down meRead paragraph 11 from the story.(11) At this time a rich man whom Tama's parents deemed a suitable match for their daughter presented his proposals, andTama was suddenly told that they approved of the marriage and that she must prepare for the bridal.What is the meaning of the word proposals as it is used in the paragraph?As used in paragraph 11, proposals means,handsVOWSsuggestionsgifts what would happen to seed germination if the seed was sitting in water saturated soils will give brainliest Confirmation and reflectionkaggle's datasets and data explorer allow you to do which tasks? 1. Find the inverse Laplace transform of the given function. (a) F(s) = 6/s^2+4 (b) F(s) = 5/(s - 1) 3 (c) F(s) = 3/ s + 3s - 4(d) F(s) = 3s+/s^2+2s+5(e) F(s) = 2s+1/s^2-4 (f) F(s) = 8s^2-6s+12/s(s^2+4)(g) 3-2s/s + 4s + 5 Arrivals at a telephone booth are considered to be Poisson, with an average time of 10 minutes between successive arrivals. The length of a phone call is distributed exponentially with mean 3 minutes. The probability that an arrival does not have to wait before service is A0.3B0.7C0.5D0.9 Do you keep a diary or journal of your own? Do you think it was good for her diary to be published? Why or why not? Please write 7 sentences. One particular lightbulb has a 0.22-meter length of the tungsten wire used as its filament. This tungsten wire filament has a resistance of 19 ohms at a temperature of 20C. The tungsten wire filament has a resistance of 240 ohms when this bulb is operated at a potential difference of 120 volts.Calculate the cross-sectional area of this tungsten wire filament. [Show all work, including the equation and substitution with units.] Calculate the power of this lightbulb when it is being operated at a potential difference of 120 volts. [Show all work, including the equation and substitution with units.] 2. Using example of catalase or calmodulin of appropriate length, do secondary structure prediction using GOR4, JPred 4, PSIpred and SOPMA. Explain your results using the table When calculating the present value of multiple cash flows using a spreadsheet, you must:________ The difference between the supplement of an angle and twice its complement is 28, find the measure of the supplement of the angle. when a loop counter is set to its first value, it is said to be __________. The area of a square is 225 square feet. Find the side length of the square. 7.Mrs. Brown has been working in a factory for 28 years. She is preparing to retire. Her pension is calculated onthe average of her last 3 years' salaries, when she earned $38,592; $37,590; and $37,010. Her employer willgive her 1.8% of that average for each year she worked. Calculate her pension. List and describe the major bond market securities. What determines the yields (interest rates) on various bond market securities The mean collection period for accounts receivable at Ephemeral Products is 16.3 days with a standard deviation of 4.8 days. (a) What is the standardized z-score for an account that is paid in 30 days Next we are going to look more closely at the cell phone log and match it up with the map. Wewill be looking at the calls that I highlighted for you: 27, 25, 22, 20, 14, 8, and 5. Chart thesecalls on the map. How do these calls support Jay's story? define a function calcpyramidvolume with double data type parameters baselength, basewidth, and pyramidheight, that returns as a double the volume of a pyramid with a rectangular base. relevant geometry equations: volume 4. Which of the following was the original reason for manuscripts?A. FarmingB. ReligionC. GovernmentD. Children's stories Trice is a fellow student who heard about your business idea and put you in contact with his brother-in-law who might have similar interests. What is the role that Trice is playing which of the following factors most influences optimal patient nutritional outcomes? a. body-mass index b. oxygenation c. metabolic needs d. acid-base balance