write a function called cleanup to tidy up a sentence and produce a string scalar. in the input sentence, some words are separated by more than one space. the output should produce single spaces between words. spaces should not appear at the beginning or end of the output sentence. the input sentence is a string scalar and the output sentence is a string scalar.

Answers

Answer 1

Sure, I'd be happy to help! The function you need to write is called "cleanup", and it is designed to tidy up a sentence by removing any extra spaces between words. This function will take an input sentence as a string scalar and will produce an output sentence as a string scalar.



To accomplish this task, you will need to use some string manipulation techniques. One approach is to use the "split" method to split the sentence into individual words, and then use the "join" method to reassemble the words with a single space between them. You can also use the "strip" method to remove any spaces at the beginning or end of the sentence.

Here's a sample code for the cleanup function:

```
def cleanup(sentence):
   # Split the sentence into individual words
   words = sentence.split()

   # Reassemble the words with a single space between them
   cleaned_sentence = ' '.join(words)

   # Remove any spaces at the beginning or end of the sentence
   cleaned_sentence = cleaned_sentence.strip()

   # Return the cleaned sentence
   return cleaned_sentence
```

With this function, you can now call it with any input sentence as a string scalar, and it will produce an output sentence with single spaces between words, and without any spaces at the beginning or end.

For example:
```
input_sentence = "    This   is a     sentence    with    extra     spaces.      "
output_sentence = cleanup(input_sentence)
print(output_sentence)
```

The output of this code will be:
```
"This is a sentence with extra spaces."
```

I hope this helps! Let me know if you have any further questions or concerns.

For such more question on manipulation

https://brainly.com/question/12602543

#SPJ11


Related Questions

Write two example use of relationships ICT

Answers

Answer:

Read it all before you write if this isn't what you searching for I'm sorry...:(

A relationship, in the context of databases, is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table. Relationships allow relational databases to split and store data in different tables, while linking disparate data items.

For example, in a bank database a CUSTOMER_MASTER table stores customer data with a primary key column named CUSTOMER_ID; it also stores customer data in an ACCOUNTS_MASTER table, which holds information about various bank accounts and associated customers. To link these two tables and determine customer and bank account information, a corresponding CUSTOMER_ID column must be inserted in the ACCOUNTS_MASTER table, referencing existing customer IDs from the CUSTOMER_MASTER table. In this case, the ACCOUNTS_MASTER table’s CUSTOMER_ID column is a foreign key that references a column with the same name in the CUSTOMER_MASTER table. This is an example of a relationship between the two tables.

ASAP
Choose the term that best completes each sentence.

is a general set of processes, used by companies to improve on an ongoing basis. This process can be supported by
which helps to identify patterns and trends.

Answers

Continuous improvement is a general set of processes, used by companies to improve on an ongoing basis. This process can be supported by  which helps to identify patterns and trends.

What is Continuous improvement?

Continuous improvement refers to the ongoing effort made by companies to improve their processes, products, and services. This can include identifying areas for improvement, implementing changes, and then measuring the results to see if they are effective.

It is an ongoing process that is repeated regularly, with the goal of increasing efficiency, reducing costs, and improving overall performance.

Therefore, Data analysis is a key tool that can be used to support continuous improvement efforts. By collecting data on various aspects of a business, such as production, sales, and customer feedback, companies can identify patterns and trends that can help them to identify areas for improvement.

Learn more about  improvement from

https://brainly.com/question/13381607

#SPJ1

Answer:

Continuous improvement is a general set of processes, used by companies to improve on an ongoing basis. This process can be supported by analytics which helps to identify patterns and trends.

Explanation:

You're welcome =D

Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. I’ll mark brianliest

Answers

Answer:

number = int(input('Enter number: '))  

factorial = 1

for i in range(1, number + 1):

   factorial = factorial * i

print(factorial)

You will need to input 5 when you run the code. Or you can add change the "number" to "number = 5"

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

write a statement that calls the recursive function backwards alphabet() with input starting letter. sample output with input: 'f' f e d c b a

Answers

Using the knowledge in computational language in python it is possible to write a code that write a statement that calls the recursive function backwards alphabet() with input starting letter.

Writting the code:

def backwards_alphabet(n):

 if ord(n) == 97:

   return n

 else:

   return n + backwards_alphabet(ord(n-1))

See more about python at brainly.com/question/12975450

#SPJ1

write a statement that calls the recursive function backwards alphabet() with input starting letter.

Which are examples of tertiary sources? Check all that apply.

Answers

Answer:

Encyclopedias and dictionaries

Explanation:

Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well as a special value SUM. Your algorithm must locate a pair of values in the list N that sum to the value SUM. For example, if your list of values is 3, 8, 13, 2, 17, 18, 10, and the value of SUM is 20, then your algorithm would output either of the two values (2, 18) or (3, 17). If your algorithm cannot find any pair of values that sum to the value SUM, then it should print the message ‘Sorry, there is no such pair of values’. Schneider, G.Michael. Invitation to Computer Science (p. 88). Course Technology. Kindle Edition.

Answers

Answer:

Follows are the code to this question:

def FindPair(Values,SUM):#defining a method FindPair  

   found=False;#defining a boolean variable found

   for i in Values:#defining loop for check Value  

       for j in Values:#defining loop for check Value

           if (i+j ==SUM):#defining if block that check i+j=sum

               found=True;#assign value True in boolean variable

               x=i;#defining a variable x that holds i value

               y=j;#defining a variable x that holds j value

               break;#use break keyword

       if(found==True):#defining if block that checks found equal to True

           print("(",x,",",y,")");#print value

       else:#defining else block

           print("Sorry there is no such pair of values.");#print message

Values=[3,8,13,2,17,18,10];#defining a list and assign Values

SUM=20;#defining SUM variable

FindPair(Values,SUM);#calling a method FindPair

Output:

please find the attachment:

Explanation:

In the above python code a method, "FindPair" is defined, which accepts a "list and SUM" variable in its parameter, inside the method "found" a boolean variable is defined, that holds a value "false".

Inside the method, two for loop is defined, that holds list element value, and in if block, it checks its added value is equal to the SUM. If the condition is true, it changes the boolean variable value and defines the "x,y" variable, that holds its value. In the next if the block, it checks the boolean variable value, if the condition is true, it will print the "x,y" value, otherwise, it will print a message.  
Design and implement an algorithm that gets as input a list of k integer values N1, N2,..., Nk as well

what does a router use to determine which packet to send when several packets are queued for transmission from a single-output interface?

Answers

When several packets are queued for transmission from a single-output interface, a router uses a process called "packet scheduling" to determine which packet to send first. Packet scheduling is a technique used by routers to manage the flow of data packets through their network interfaces.


There are several types of packet scheduling algorithms that routers use to determine the order in which packets are sent. These include:
1. First-In-First-Out (FIFO): This algorithm sends the packets in the order in which they were received. It is the simplest and most common packet scheduling algorithm used by routers.
2. Priority Queuing (PQ): This algorithm assigns priority levels to different types of traffic, such as voice or video, and sends higher priority packets first.
3. Weighted Fair Queuing (WFQ): This algorithm assigns weights to different types of traffic and sends packets based on their weight. For example, if voice traffic has a higher weight than data traffic, voice packets will be sent first.
4. Random Early Detection (RED): This algorithm monitors the length of the packet queue and drops packets before the queue becomes too long. This helps to prevent congestion and ensures that packets are sent in a timely manner.
In conclusion, a router uses packet scheduling algorithms to determine which packet to send when several packets are queued for transmission from a single-output interface. These algorithms take into account factors such as packet priority, traffic type, and queue length to ensure that packets are sent in a fair and efficient manner.

Learn more about transmission here

https://brainly.com/question/14280351

#SPJ11

let us assume we have a special computer. each word is two bytes. the memory is byte addressable. the length of the memory address is 40 bits. what is the largest memory size supported by this computer?

Answers

The largest memory size supported by this computer 2^40 = 1TB.

What do you mean by memory address?

A memory address is a reference to a particular memory region that is utilized by hardware and software at different levels. Memory addresses are unsigned numbers that are often presented and handled as fixed-length digit sequences.

What is address bit?

A memory index is a major storage address. A single byte's address is represented as a 32-bit address. An address is present on 32 bus wires (there are many more bus wires for timing and control). Addresses like 0x2000, which appear to be a pattern of just 16 bits, are occasionally mentioned.

Let's considering 8 bit word size or unit size

8 bit = 2^(3) bit

2^(10)bit = 1024bit = 1kb

2^(20)bit = 1024kb = 1mb

2^(30) → 1gb

2^(40) → 1 tb

Therefore, the largest memory size is 1TB.

Learn more about memory size click here:

https://brainly.com/question/28234711

#SPJ4

How many months have 28 days?

Answers

Answer:

All months of the year have at least 28 days, while February is the only month that is comprised of only 28 days (except for leap years)

A library system contains information for each book that was borrowed. Each time a person borrows or returns a book from the library, the following information is recorded in a database.

Name and the unique ID number of the person who was borrowing the book

Author, title, and the unique ID number of the book that was borrowed

Date that the book was borrowed

Date that the book was due to be returned

Date that the book was returned (or 0 if the book has not been returned yet)

Which of the following CANNOT be determined from the information collected by the system?

Answers

The thing that can not be determined from the information collected by the system is the amount of information or content a student studies in the book.

What is Database?

The database may be defined as an organized collection of data stored and accessed electronically. This refers to the set of structured data that is stored in a computer system that can be easily accessed and retrieved for future and current use. There are the following types of databases are there:

Relational database.NoSQL databases.Cloud databases.Columnar databases.Wide column databases.

Therefore, the thing that can not be determined from the information collected by the system is the amount of information or content a student studies in the book.

To learn more about the Database, refer to the link:

https://brainly.com/question/6344749

#SPJ1

What is the result of the following pseudo code when used with call-by-name, and call-by-reference?
begin
array a[1..10] of integer;
integer n;
procedure p(b: integer);
begin
print(b);
n := n+1;
print(b);
b := b+5;
end;
a[1] := 10;
a[2] := 20;
a[3] := 30;
a[4] := 40;
n := 1;
p(a[n+2]);
new_line;
print(a);
end;

Answers

The result of the pseudo code when used with call-by-name and call-by-reference will be different.

When using call-by-name, the actual parameter is substituted for the formal parameter each time it is called in the procedure. This means that when the procedure p is called with a[n+2], it will substitute a[n+2] for b. Then, when b is printed, it will print the value of a[n+2], which is 30. When n is incremented and b is printed again, it will print the updated value of n, which is now 2.


When using call-by-reference, the formal parameter is a reference to the actual parameter, so any changes made to the formal parameter will affect the actual parameter.

To know more Pseudo code visit:-

https://brainly.com/question/24147543

#SPJ11

define a function findhighestvalue() with no parameters that reads integers from input until a negative integer is read. the function returns the largest of the integers read.

Answers

The FindLargestNum program serves as an example of a function because it runs whenever its name is called or invoked.

What is a program?

A series of instructions written in a programming language for a computer to follow is referred to as a computer program.

Software, which also contains documentation and other intangible components, comprises computer programs as one of its components.

The source code of a computer program is the version that can be read by humans.

The following describes the Python code for the FindLargestNum function, which makes use of comments to describe each step:

#Thie defines the FindLargestNum function

def FindLargestNum():

  #This gets the first input

  num = int(input())

  #This initializes the minimum value

  maxm = num

  #The following is repeated until the user enters a negative input

  while num >= 0:

      #This determines the largest input

      if num > maxm:

          maxm = num

      #This gets the another input

      num = int(input())

  #This prints the largest input

  print(maxm)

Therefore, the FindLargestNum program serves as an example of a function because it runs whenever its name is called or invoked.

Know more about the FindLargestNum program here:

https://brainly.com/question/24129713

#SPJ4

cd-rom discs and dvd-rom discs are optical discs that come prerecorded with commercial products. a. rewritable b. read-only c. recordable d. write-only

Answers

The correct option is (b) read only

CD-ROM (Compact Disc Read-Only Memory) and DVD-ROM (Digital Versatile Disc Read-Only Memory) discs are optical discs that come pre-recorded with commercial products. These discs are designed to be read-only, which means that the data on them cannot be changed or erased. The information on a CD-ROM or DVD-ROM disc is permanently recorded onto the disc during the manufacturing process, and once the disc is created, the data cannot be modified. This makes CD-ROM and DVD-ROM discs ideal for distributing large amounts of data, such as software applications, games, and video content, as they provide a reliable and cost-effective way to distribute and store digital information. The read-only nature of these discs also makes them more durable and resistant to wear and tear, as they cannot be damaged or erased through normal use.

To know more about compact discs visit:

https://brainly.com/question/29340792

#SPJ4

the wi-fi radio in a smartphone has failed. which of the following is a possible solution?

Answers

Answer:

Mobile Data

Explanation:

4g data

An internet article about fashion trends seen in europe was used to select inventory for a small boutique. What type of data was used in this scenario?.

Answers

Since the internet article about fashion trends seen in Europe was used to select inventory for a small boutique, the type of data that was used in this scenario is quantitative data.

Which is an quantitative data?

Data that can be measured or quantified in numerical terms is referred to as quantitative data. Discrete data and continuous data are the two basic categories of quantitative data.

An Examples of quantifiable data are height in feet, age in years, and weight in pounds. Data that is descriptive but not numerically expressed is considered qualitative data.

The goal of quantitative research is to quantify the data collection and processing process. It is derived from a deductive method that emphasizes the validation of theory and is influenced by the empiricist and positivist schools of thought.

Therefore, Numerical variables are the subject of quantitative data (e.g. how many; how much; or how often). Measures of "types" are said to be  known as qualitative data, which can be expressed using a name, symbol, or the use of numerical code.

Learn more about quantitative data from

https://brainly.com/question/96076
#SPJ1

how to create a variable that stores floating point number

Answers

To create a variable that stores a floating point number, you can use the float data type.

In many programming languages, including Python, Java, C++, and others, you can use the float data type to create a variable that stores a floating-point number. In Python, for example, you can create a float variable by assigning a number with a decimal point to a variable name, like so:

```
my_float = 3.14
```
Alternatively, you can use the float() function to convert a number or string to a float:

```
my_float = float(3)
my_float2 = float("3.14")
```
Both of these methods will create a variable that stores a floating point number.

Learn more about floating point number:https://brainly.com/question/30645321

#SPJ11

Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT

Answers

Answer:

C. The energy used to create and maintain technology

#Carry on learning po

Which best explains why it is important to avoid sharing photos online?

Answers

Answer

To keep your privacy away from bad people, to keep your self safe whilst on the internet. Also if you could link the answer choices it would help greatly!

Explanation:

Answer:

C: Strangers will know what you look like

Explanation:

Took the test and got it right

Explain the major difference between the least effective hierarchy of controls and the other four controls. Why is it the least effective? Be specific in your response, and include examples of your work environment.
Your response must be at least 200 words in length.

Answers

Hierarchy of controls refers to the systematic elimination of workplace hazards to reduce or eliminate risks associated with these hazards.

The hierarchy of control measures follows a systematic approach of identifying, assessing, and controlling workplace hazards to promote safety in the workplace. There are five main types of the hierarchy of controls, including elimination, substitution, engineering controls, administrative controls, and personal protective equipment (PPE).

The elimination of hazards is the most effective control measure, while the least effective control measure is PPE. PPE is the last line of defense in the hierarchy of control measures, as it is not designed to eliminate or minimize workplace hazards. Instead, PPE is designed to protect workers from workplace hazards once all other control measures have been implemented and have failed to reduce the risk of exposure.

To know more about systematic visit :

https://brainly.com/question/28609441

#SPJ11

Can someone please explain this issue to me..?

I signed into brainly today to start asking and answering questions, but it's not loading new questions. It's loading question from 2 weeks ago all the way back to questions from 2018.. I tried logging out and back in but that still didn't work. And when I reload it's the exact same questions. Can someone help me please??

Answers

Answer:

try going to your settings and clear the data of the app,that might help but it if it doesn't, try deleting it and then download it again

I haven’t been able to ask any questions in a few days, maybe there’s something wrong with the app

What is the purpose of the Lookup Wizard?

to create a yes/no field quickly
to reference data from another table
to combine more than one field in a table
to generate a random number automatically

Answers

Answer:

The answer is B. To reference data from another table

Explanation:

I just got it right in Edg

et p denote the number of producers, c the number of consumers, and n the buffer size in units of items. for each of the following scenarios, indicate whether the mutex semaphore in sbuf insert and sbuf remove is necessary or not. [15 points]

Answers

I have answered this question with the following scenario below:

A. p=1, c=1,2, n> 1

B. p=1, c=1, n=1

C. p>1, c>1, n=1

Answer

for A.p=1,c=1,n>1 : YES,the mutex semaphore is necessary as both the consumers and producers can concurrently access the buffer

for B. p=1,c=1,n=1 : NO,the mutex semaphore is not necessary .When a buffer contains an item the producer is blocked when the buffer is empty the consumer is blocked.So,only a single one can access the buffer at a time,so there is mutual exclusion which means mutex semaphore is not necessary.

for C. p>1,c>1,n=1 : No, here also mutex semaphore is not necessary as only a single one can access the buffer at a time in the same way as scenario B.so,due to mutual exclusion is already there there is no need for mutex semaphore.

Learn moer about Mutex semaphore at brainly: https://brainly.com/question/28145328

#SPJ4

Digital content management is one application of technology
O private cloud
O blockchain
O nano O AI

Answers

The correct answer to the given question about Digital Content Management is option B) Blockchain.

Businesses can streamline the creation, allocation, and distribution of digital material by using a set of procedures called "digital content management" (DCM). Consider DCM to be your digital capital's super-librarian, managing and safeguarding it. These days, there are two general categories of digital content management systems: asset management (DAM) systems, and content management systems (CMS). To create effective corporate operations, internal digital content needs to be categorized and indexed. Security is also necessary. For structuring digital materials for public distribution, whether now or in the future, CMSs are particularly effective. The majority of CMS content consists of digital items for marketing, sales, and customer service. The public-facing digital content that is often found in a CMS.

To learn more about digital content management click here

brainly.com/question/14697909

#SPJ4

is it possible build a real time machine?

Answers

Answer:

An Iranian scientist has claimed to have invented a 'time machine' that can predict the future of any individual with a 98 percent accuracy. Serial inventor Ali Razeghi registered "The Aryayek Time Traveling Machine" with Iran's state-run Centre for Strategic Inventions, The Telegraph reported.

Explanation:

How can you tell if a website is credible?
a. Anything on the web is automatically credible
b. You must review aspects of the site such as the author’s credibility
c. If it has a top-level domain of .com, it is credible
d. All of the above

Answers

Answer:

b

Explanation:

you must review everything, creditability , certificates, domains, etc

You can tell a website is credible by reviewing its aspects overall, the answer is b.

in the event of a duplicate mac address shared by two hosts on a switched network, what statement is accurate?

Answers

The hosts will still send and receive traffic, but traffic may not always reach the correct destination.

What is Ibgp route reflection?One way to get rid of the full-mesh of IBGP peers in your network is by using route reflectors (RR). BGP confederations are the alternative strategy.This greatly simplifies our IBGP arrangement, but there is a drawback as well. The route reflector can malfunction. When it comes to IBGP peerings, there is a single point of failure. We can have numerous route reflectors in our network as a solution, of course.

Three types of peerings are possible for the route reflector:

neighbouring EBGPIBGP neighbour clientNon-client IBGP neighbour

You must inform the router if the other IBGP router is a client or non-client when configuring a route reflector.

To learn more about Ibgp route, refer to

https://brainly.com/question/6783973

#SPJ4

Help please this is my last assignment of the year

Help please this is my last assignment of the year

Answers

Answer:

the answer is in the website that are there

Which printer permission would you assign to a user so that they can pause the printer?
a. Manage this printer
b. Printer properties
c. Advanced
d. Print server properties.

Answers

The printer permission you would assign to a user so that they can pause the printer is Manage this printer (A)

Manage this printer permission allows the user to pause and resume the printer, as well as manage the printer queue and properties. The user will have the ability to configure settings directly on the printer if they are granted this access. Users who have this access can essentially alter specific settings on the printer, configure permissions, delete, rename, or share the printer. The other options, such as "Printer properties," "Advanced," and "Print server properties," do not specifically grant the ability to pause the printer. Therefore, the correct answer is "Manage this printer" for the user to have the ability to pause the printer.

To learn more about printer permission, click here:

https://brainly.com/question/14136300

#SPJ11

___________________ is the act of protecting information and the systems that store and process it.

Answers

Information systems security is the act of protecting information and the systems that store and process it.

What do you mean by information systems?

A formal, sociotechnical, organizational structure called an information system is created to gather, process, store, and distribute information. Four elements make up information systems from a sociotechnical standpoint: task, people, structure, and technology.

In the field of information systems, issues affecting businesses, governments, and society are resolved through the efficient design, delivery, and use of information and communications technology. The four phases of planning, analysis, design and implementation must be completed by all information systems projects.

To learn more about information systems, use the link given
https://brainly.com/question/20367065
#SPJ1

Other Questions
THIS IS URGENT PLS HELP Write the equation of the line through (2,15) and (-4,9) Which of the following shows the process of creating something new?a. Business model b. modeling c. Creative flexibilityd. Innovation What is the slope of a line that passes through the point (-2,-5) and (18,-5)? Read this excerpt from "Harriet Tubman aka Moses" bySamuel AllenIn these lines, Allen uses nonstandard English tohighlightGet on up nowThat's it, no need a gettin wearyThere is a glory there!the way Tubman motivates people to keep movingtoward freedom.Tubman's fear in the face of dangerouscircumstances.Tubman's reluctance to push the members of hergroup too hard.the way Tubman expresses anger toward people whodo not follow directions. Please answer the question how do we solve this please suppose you wanted to make domestic industries more competitive but did not want to alter aggregate income. Assuming now a fixed exchange rate, what policy or combination of policies should you pursue, according to the Mundell-Fleming model? a. Revaluation; b. Contractionary fiscal; c. Contractionary monetary; d. Devaluation; e. Expansionary fiscal; f. Expansionary monetary Question 1Two packs of toilet rolls are available in thesupermarket 9 toilet rolls for 3.15 4 toilet rolls for 1.36Work out which pack offers the best value for money. dose this sound good and should i make any CorrectionsWe decided to establish this business as a way to profit and help the environment, we donate to help the environment by 2% of all sales will be donated to help provide clean drinking water for impoverished families. we decided to set up our business in Mexico because it is super hot we set up shop on the beach because of the heat. find the average value fave of the function f on the given interval. f(x) = x , [0, 16] One-third of the seventh garde class bought tickets for the seventh grade dance. Then, 32 students bought tickets at the door. If there were 158 students at the dance, how many total students are there in seventh grade? #4 How much money can you borrow at 6.5% interest compoundedquarterly if you will repay the loan in 7 years making quarterlypayments of $300? Jared has an average of 86% in his math class before the final exam. The final exam is 20% of his total grade. There are 55 points possible on the final exam and partial points are not given. If Jared wants to get an average of at least 88% in the class, what is the least number of points he needs to earn on the final exam What is the relationship between dipole moment and the distance between the charges?. Two flat plates, separated by a space of 4 mm, are moving relative to each other at a velocity of 5 m/sec. The space between them is occupied by a fluid of unknown viscosity. The motion of the plates is resisted by a shear stress of 10 Pa due to the viscosity of the fluid. Assuming that the velocity gradient of the fluid is constant, determine the coefficient of viscosity of the fluid. congress may tax activities and property that it might not be authorized to regulate under any of the enumerated regulated powers. a. What was the original annual rate of return needed to reach Prof. ME's goal when he started the fund 2 years ago? b. Now with only $120,000 in the fund and 8 years remaining until his first child starts college, what APR would the fund have to earn to reach Prof. ME's $440,000 goal if he adds nothing to the account? c. Shocked by his experience of the past 2 years, Prof. ME feels the college mutual fund has invested too much in stocks. He wants a low-risk fund in order to ensure he has the necessary $440,000 in 8 years, and he is willing to make end-of-the-month deposits to the fund as well. He later finds a fund that promises to pay a guaranteed APR of 5 percent compounded monthly. Prof. ME decides to transfer the $120,000 to this new fund and make the necessary monthly deposits. How large of a monthly deposit must Prof. ME make into this new fund to meet his $440,000 goal? d. Now Prof. ME gets sticker shock from the necessary monthly deposit he has to make into the guaranteed fund in the preceding question. He decides to invest the $120,000 today and $350 at the end of each month for the next 8 years into a fund consisting of 50 percent stock and 50 percent bonds, and hope for the best. What APR would the fund have to earn for Prof. ME to reach his $440,000 goal? a. If Prof. ME invested $140,000 into a fund 2 years ago and hoped to have $440,000 available 10 years later when his first child started college, what was the original APR needed to reach his goal? \% (Round to two decimal places.) b. Now with only $120,000 in the fund and 8 years remaining until his first child starts college, what APR would the fund have to earn to reach Prof. ME's $440,000 goal if he adds nothing to the account? \% (Round to two decimal places.) c. If Prof. ME decides to transfer the $120,000 to a new fund that promises to pay a guaranteed APR of 5 percent compounded monthly and makes the necessary end-of-the-month deposits, how large of a monthly deposit must he make into this new fund to meet his $440,000 goal in 8 years? (Round to the nearest cent) When a particle is located a distance x meters from the origin, a force of cos (pi(x)/3 newtons acts on it. How much work is done (in J) in moving the particle from x = 1 to x = 2? Pilar wanted to use estimation to solve a decimal addition problem. She correctly used estimation to rewrite the problem as 12 + 3 + 5 + 6. What could her original problem have been? Also it is written in decimals.