Write a program that adjusts a list of values by subtracting each value from the maximum value in the list.

Answers

Answer 1

A program that adjusts a list of values by subtracting each value from the maximum value in the list can be written with the help of Python programming language.

First, we have to find the maximum value of the given list. Then, we will iterate through each element in the list and subtract each element from the maximum value found in the above step. Finally, we will store the adjusted value in a new list.

The program for the same can be written as follows:

listvalues_list = input("Enter the values of the list separated by comma: ").split(",") #Taking input as list of strings

int_values_list = list(map(int, values_list))  #Converting all the input values to integer type

maximum_value = max(int_values_list)  #Finding the maximum value in the list

adjusted_values_list = [maximum_value - x for x in int_values_list]  #Subtracting each value from the maximum value and storing it in a new list

print("Original List: ", int_values_list) # Displaying the original list

print("Adjusted List: ", adjusted_values_list) # Displaying the adjusted list

Learn more about Python programming language:

brainly.com/question/28248633

#SPJ11


Related Questions

In two to three sentences, describe some techniques you could use to save time when working with a spreadsheet.

Answers

Answer: Everything is neatly organized on a spreadsheet so that you can access information faster. You can use features like shortcuts and auto-fill for you to save time.

Explanation:

Hey, Another question. I'm sure it's possible in the future, but I wanted to ask if HIE would be possible. I'm sure it would be, I just want to hear other people's comments on this. (Beatless)

Answers

Answer:

Originally Answered: Will there ever be a band as big as the Beatles? No, there will never be a band as popular as the Beatles. For one thing they were exceptionally good in a time of great music in general.

Explanation:

please mark this answer as brainliest

Make Your Own Flowchart

Answers

Answer:

https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS5V59B3u23rfG-bXj8jNoV7rXfV62cyPnkcg&usqp=CAU

an example of a flow chart

Explanation:

CALCULATE THE PERCENTAGE OF FAT CALORIES TO TOTAL CALORIES. I got no idea how to do this in excel ;-;

CALCULATE THE PERCENTAGE OF FAT CALORIES TO TOTAL CALORIES. I got no idea how to do this in excel ;-;

Answers

Answer:

As you have the Fat Cal. in column C and the total calories in Column B, what you have to do is to divide column C by Column B.

For instance, in column E2, put the formula: =C2/B2.

Then drag the formula down so that the other formulas will be;

E3; =C3/B3

E4; =C4/B4

E5: C5/B5

E6: C6/B6

Then after that you go to the Home tab, then to the Number style section and format E2 to E5 to be percentages.

1. Select and open an appropriate software program for searching the Internet. Write the name of the program.

Answers

An appropriate software program for searching the Internet is known as Web browser.

What is the software that lets you search?

A browser is known to be any system software that gives room for a person or computer user to look for and see information on the Internet.

Note that through the use of this browser, one can easily look up information and get result immediately for any kind of project work.

Learn more about software program from

https://brainly.com/question/1538272

True/False: the machine code generated for x:=5; includes lod and sto instructions.

Answers

True


The machine code generated for x:=5; does include lod (load) and sto (store) instructions. The lod instruction is used to load the value 5 into a register, and the sto instruction is used to store the value from the register into the memory location assigned to variable x.

When a program is written in a high-level programming language such as Java or Python, it is first translated into machine code, which is a set of instructions that can be executed directly by the computer's processor. The machine code for x:=5; would involve several steps. First, the computer needs to allocate memory space for the variable x. This is typically done by the compiler or interpreter that is translating the high-level code into machine code. The memory location assigned to x would depend on the specific architecture of the computer and the programming language being used. Next, the machine code would need to load the value 5 into a register. A register is a small amount of memory that is built into the processor and is used for temporary storage of data during calculations. The lod instruction is used to load a value from memory into a register. In this case, the lod instruction would load the value 5 into a register. Finally, the machine code would need to store the value from the register into the memory location assigned to variable x. The sto instruction is used to store a value from a register into a memory location. In this case, the sto instruction would store the value from the register into the memory location assigned to variable x. Therefore, the machine code generated for x:=5; does include lod and sto instructions.

To know more about machine code visit:

https://brainly.com/question/17041216

#SPJ11

Plant Roots are strong enough to break rock.


False


True

Answers

Answer:

True

Explanation:

Plants and animals can be agents of mechanical weathering. The seed of a tree may sprout in soil that has collected in a cracked rock. As the roots grow, they widen the cracks, eventually breaking the rock into pieces.

how many ones dose it take to get 9 tens

Answers

It takes 90 ones to get 9 tens
The answer would be 90:)

Explanation: there are 10 ones in one 10 so if you multiply 10 times 9 it’s 90

(53) 10 into binary ​

Answers

Answer:

10 in binary would be written as 1010

as we move up a energy pyrimad the amount of a energy avaliable to each level of consumers

Answers

Explanation:

As it progresses high around an atmosphere, the amount of power through each tropic stage reduces. Little enough as 10% including its power is passed towards the next layer at every primary producers; the remainder is essentially wasted as heat by physiological activities.

Is brainly allowed because you don't Really learn from this..?

Answers

Explanation:

I don't know it's some time good and some times bad

Answer:

i bet ur like that one kid who tells the teacher that she forgot to collect the homework even tho u aint even do it

True or False

Explanation:

Which of the following are reasons someone can be legally fired? Check all of the boxes that apply. An employee is sleeping on the job. An employee is married. An employee has been late to work seven times in a row. An employee was born in a different country.

Answers

Answer:

employee has been sleeping on the job

An employee has been late to work 7 times in a row  

Explanation:

It just it the right answer for career prep edg2021.

Answer:

employee has been sleeping on the job

n employee has been late to work 7 times in a row  

Explanation:

hope this helps

Write a program in C++ that that will perform the following
functions in a linear link list.
1. Insert
an element before a target point.
2. Delete
an element before a target point.

Answers

An example implementation of a linear linked list in C++ that includes functions to insert and delete elements before a target point:

#include <iostream>

using namespace std;

// Define the node structure for the linked list

struct Node {

   int data;

   Node* next;

};

// Function to insert a new element before a target point

void insertBefore(Node** head_ref, int target, int new_data) {

   // Create a new node with the new data

   Node* new_node = new Node();

   new_node->data = new_data;

   

   // If the list is empty or the target is at the beginning of the list,

   // set the new node as the new head of the list

   if (*head_ref == NULL || (*head_ref)->data == target) {

       new_node->next = *head_ref;

       *head_ref = new_node;

       return;

   }

   

   // Traverse the list until we find the target node

   Node* curr_node = *head_ref;

   while (curr_node->next != NULL && curr_node->next->data != target) {

       curr_node = curr_node->next;

   }

   

   // If we didn't find the target node, the new node cannot be inserted

   if (curr_node->next == NULL) {

       cout << "Target not found. Element not inserted." << endl;

       return;

   }

   

   // Insert the new node before the target node

   new_node->next = curr_node->next;

   curr_node->next = new_node;

}

// Function to delete an element before a target point

void deleteBefore(Node** head_ref, int target) {

   // If the list is empty or the target is at the beginning of the list,

   // there is no element to delete

   if (*head_ref == NULL || (*head_ref)->data == target) {

       cout << "No element to delete before target." << endl;

       return;

   }

   

   // If the target is the second element in the list, delete the first element

   if ((*head_ref)->next != NULL && (*head_ref)->next->data == target) {

       Node* temp_node = *head_ref;

       *head_ref = (*head_ref)->next;

       delete temp_node;

       return;

   }

   

   // Traverse the list until we find the node before the target node

   Node* curr_node = *head_ref;

   while (curr_node->next != NULL && curr_node->next->next != NULL && curr_node->next->next->data != target) {

       curr_node = curr_node->next;

   }

   

   // If we didn't find the node before the target node, there is no element to delete

   if (curr_node->next == NULL || curr_node->next->next == NULL) {

       cout << "No element to delete before target." << endl;

       return;

   }

   

   // Delete the node before the target node

   Node* temp_node = curr_node->next;

   curr_node->next = curr_node->next->next;

   delete temp_node;

}

// Function to print all elements of the linked list

void printList(Node* head) {

   Node* curr_node = head;

   while (curr_node != NULL) {

       cout << curr_node->data << " ";

       curr_node = curr_node->next;

   }

   cout << endl;

}

int main() {

   // Initialize an empty linked list

   Node* head = NULL;

   // Insert some elements into the list

   insertBefore(&head, 3, 4);

   insertBefore(&head, 3, 2);

   insertBefore(&head, 3, 1);

   insertBefore(&head, 4, 5);

   

   // Print the list

   cout << "List after insertions: ";

   printList(head);

   // Delete some elements from the list

   deleteBefore(&head, 4);

   deleteBefore(&head, 2);

   

   // Print the list again

   cout << "List after deletions: ";

   printList(head);

   return 0;

}

This program uses a Node struct to represent each element in the linked list. The insertBefore function takes a target value and a new value, and inserts the new value into the list before the first occurrence of the target value. If the target value is not found in the list, the function prints an error message and does not insert the new value.

The deleteBefore function also takes a target value, but deletes the element immediately before the first occurrence of the target value. If the target value is not found or there is no element before the target value, the function prints an error message and does

Learn more about linear linked list  here:

https://brainly.com/question/13898701

#SPJ11

The purpose of this assignment is to demonstrate knowledge of the basic syntax of a SQL query. Specifically, you will be asked to demonstrate: - use of the SELECT clause to specify which fields you want to query. - use of the FROM clause to specify which tables you want to query, and - use of the WHERE clause to specify which conditions the query will use to query rows in a table. These are the basic commands that will make up your foundational knowledge of SQL. There are other clauses besides SELECT, FROM, and WHERE, but by building up your knowledge of these basic clauses, you will have constructed a foundation upon which to base your knowledge of SQL. Tasks 1. Design the following queries, using the lyrics.sql schema: 1. List the Title, UPC and Genre of all CD titles. (Titles table) 2. List all of the information of CD(s) produced by the artist whose ArtistlD is 2. (Titles table) 3. List the First Name, Last Name, HomePhone and Email address of all members. (Members table) 4. List the Member ID of all male members. (Members table) 5. List the Member ID and Country of all members in Canada. (Members table)

Answers

The basic syntax of a SQL query involves using various clauses in order to specify what information you want to retrieve from a database. There are three fundamental clauses: SELECT, FROM, and WHERE. The SELECT clause specifies which fields you want to query.

The FROM clause specifies which tables you want to query. The WHERE clause specifies which conditions the query will use to query rows in a table. In order to demonstrate your knowledge of these basic clauses, you have been given five tasks to complete using the lyrics. sql schema. Task 1: List the Title, UPC and Genre of all CD titles. (Titles table)The query for this task is as follows: SELECT Title, UPC, Genre FROM Titles; This query specifies the SELECT and FROM clauses. We are selecting the Title, UPC, and Genre fields from the Titles table. Task 2: List all of the information of CD(s) produced by the artist whose Artist lD is 2. (Titles table)The query for this task is as follows:SELECT *FROM TitlesWHERE ArtistID = 2;This query specifies the SELECT, FROM, and WHERE clauses. '

We are selecting all fields from the Titles table where the ArtistID is equal to 2.Task 3: List the First Name, Last Name, HomePhone and Email address of all members. (Members table)The query for this task is as follows:SELECT FirstName, LastName, HomePhone, EmailFROM Members;This query specifies the SELECT and FROM clauses. We are selecting the FirstName, LastName, HomePhone, and Email fields from the Members table.Task 4: List the Member ID of all male members. (Members table)The query for this task is as follows:SELECT MemberIDFROM MembersWHERE Gender = 'M';This query specifies the SELECT, FROM, and WHERE clauses. We are selecting the MemberID field from the Members table where the Gender is equal to 'M'.

To know more about database visit:

https://brainly.com/question/30163202

#SPJ11

Write a calculator program that will allow only addition, subtraction, multiplication & division. Have the
user enter two numbers, and choose the operation. Use if, elif statements to do the right operation based
on user input.

Answers

num1 = float(input("Enter the first number: "))

num2 = float(input("Enter the second number: "))

operation = input("Which operation are you performing? (a/s/m/d) ")

if operation == "a":

   print("{} + {} = {}".format(num1, num2, num1+num2))

elif operation == "s":

   print("{} - {} = {}".format(num1, num2, num1-num2))

elif operation == "m":

   print("{} * {} = {}".format(num1, num2, num1*num2))

elif operation == "d":

   print("{} / {} = {}".format(num1, num2, num1/num2))

I hope this helps!

_______, is often referred to as short-term memory or volatile memory because its contents largely disappear when the computer is powered down.

Answers

Volatile memory, also known as short-term memory, is a type of computer memory that loses its contents when the computer is turned off.

Volatile memory, such as Random Access Memory (RAM), is a temporary form of computer memory that is used to store data and instructions that are actively being accessed by the computer's processor. It is called "volatile" because its contents are not retained when the computer's power supply is interrupted or turned off.

RAM is designed to provide fast and temporary storage for data that the computer needs to access quickly. When a computer is powered on, the operating system and other software programs are loaded into RAM, allowing the processor to quickly retrieve and manipulate the necessary information. However, as soon as the computer is powered down, the contents of RAM are lost.

This volatile nature of RAM is different from non-volatile memory, such as hard drives or solid-state drives, which retain their contents even when the power is turned off. Non-volatile memory is used for long-term storage, allowing the computer to save data and programs that can be accessed again after a power cycle.

In summary, volatile memory, often referred to as short-term or temporary memory, loses its contents when the computer is powered down. It provides fast access to data and instructions but is not suitable for long-term storage. Non-volatile memory, on the other hand, retains its contents even when the power is turned off, making it suitable for long-term storage purposes.

Learn more about Random Access Memory (RAM) here:

https://brainly.com/question/31946586

#SPJ11

Question 1
A town has 10,000 registered voters, of whom 6,000 are voting for the Democratic party. A survey organization is taking a sample of 100 registered voters (assume sampling with replacement). The percentage of Democratic voters in the sample will be around _____, give or take ____. (You may use the fact that the standard deviation of 6,000 1s and 4,000 0s is about 0. 5)

Answers

The percentage of Democratic voters in the sample can be estimated using the sample proportion, which is the number of Democratic voters in the sample divided by the sample size.

The expected value of the sample proportion is equal to the population proportion, which is 6,000/10,000 = 0.6.The standard deviation of the sample proportion is given by the formula:sqrt(p*(1-p)/n) where p is the population proportion and n is the sample size. Plugging in the values, we get:sqrt(0.6*(1-0.6)/100) = 0.049 So the percentage of Democratic voters in the sample will be around 60%, give or take 4.9%. This means we can be 95% confident that the true percentage of Democratic voters in the population is within the range of 55.1% to 64.9% (i.e., the sample proportion plus or minus 1.96 times the standard deviation).

To learn more about sample click on the link below:

brainly.com/question/29972475

#SPJ4

You are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Answers

Answer:

hYou are designing an exciting new adventure game and you want to attempt to explain where items that are carried by the player are being kept. What inventory system should you use to this? O visual grid approach hyperspace arsenal weighted inventory pseudo-realistic​

Explanation:

Tricia is managing tasks that have been assigned to her. She needs to enter mileage information in relation to a
project. Which command must she use to access this option?

-Task
-Details
-Assign Task
-Send Status Report

Answers

Answer:

send status report

Explanation:

edge nov 2022

She must use the command "Task"  to access this option. The correct answer would be an option (A).

What is a task manager?

Task Manager displays which programs are running on your Windows computer and provides limited control over those processes.

Tricia can use the "Task > Details" command to access the option to enter mileage information related to a project. This option provides a space for Tricia to enter additional information about a task, such as the mileage information she needs to record.

The "Task > Details" option can typically be found within the task management software or tool that Tricia is using. By accessing this option, Tricia can enter the necessary information to accurately track the mileage information for a project.

The "Assign Task" and "Send Status Report" commands are not directly related to entering mileage information for a task.

Thus, the correct answer would be an option (A).

Learn more about the task manager here:

https://brainly.com/question/29103180

#SPJ6

Look in the nec® index and find uses permitted for ac cable. the code reference for this is ___.

Answers

If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.

Where is the index located in the NEC?

The index is known to be one that is seen or located in the back of the NEC and this is known to be one that is said to be organized in alphabetical order ranging from keywords seen within the electrical code.

Note that The index is seen to be the best reference for knowing multiple occurrences of a particular words and phases inside  a lot of  articles and sections of code.

Hence, If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.

Learn more about code reference from

https://brainly.com/question/25817628

#SPJ1

What can we do to positive interaction online?

Answers

Answer:

We can help eachother out with things.

Explanation:

Eg. Schoolwork and homework because our stress level will decrease.

We can help eachother and always be nice to people. Some people call me too nice but it’s just me being a positive person. Try to stay away from anyone who’s toxic as well

Please tell answer fast​

Please tell answer fast

Answers

Answer:

a sonos wireless speakers

What is the name for the base-2 system used by computers to represent
data?
O A. Unicode
O B. Binary code
C. Hexadecimal code
D. Decimal code

Answers

Answer:

B. Binary Code

Explanation:

Binary code is the base-2 system used by computers to represent data. Binary code consists of 0's and 1's which can be used to represent states such as on or off; go or no-go and more.

the main work area of the computer is the

Answers

Answer:

Desktop

Explanation:

The desktop is the main work area of your computer, and will likely be the most visited area of your computer. Your desktop appears every time you log into your account, and contains icons and shortcuts to your most used programs and files.

in c#, dates and times are actually stored as the number of

Answers

In C#, dates and times are stored as the number of ticks. A tick represents 100 nanoseconds, and it is the unit used to measure time in the .NET framework.

The DateTime structure in C# internally stores date and time values as a 64-bit signed integer, where the value represents the number of ticks since January 1, 0001 at 12:00:00 midnight.

The maximum and minimum date and time values that can be represented are January 1, 0001, 00:00:00.0000000 and December 31, 9999, 23:59:59.9999999, respectively, that represent a range of 7.9 billion years.

This allows for precise calculations and comparisons of dates and times. By using the ticks representation, C# can accurately handle a wide range of dates and times, from ancient dates to far into the future, with high precision.

To learnmore about C#: https://brainly.com/question/28184944

#SPJ11

what steps can teens take to be more deliberate cosumers to socail media​

Answers

Answer:

obviously avoid going to School

they can stay on their phones all day

Social media platform can provide valuable opportunities for teenager for developing their skils and their knowladge. Have a look on many benifits that a teenager get from social media.

                                                                              Teenagers can learn diffrent perspectives and build their knowladge on a various subjects. there are many apps on social media that will help to genarate earnings .  

2 Essential steps that  will help a teenager  to creating a wonerfull carrer :-

1. Identify goals 2. Choose the best platfrorm.

10. A loop statement is given as:
for(i=10;i<10;i++)
{
Statement
}
For how many times will the given loop statement be executed:
(a) none
(b) 1 time
(c) 10 times (d) infinite​

Answers

Answer: a. None

Explanation:

The loop will not run as the condition always returns false.

i=10 and the condition given: i<10 which is false always. So, the loop will not run.

A technician wishes to update the nic driver for a computer. What is the best location for finding new drivers for the nic? select one:.

Answers

The best place to find new drivers for the NIC is the website for the manufacturer of NIC. So the answer is C.

NIC is stand for A network interface controller. NIC, also called as a network interface card, network adapter, LAN adapter or physical network interface, and by similar terms can be described as a computer hardware element that associated a computer to a computer network. Compared to the wireless network card, NIC recognizes a secure, faster, and more reliable connection. NIC lets us to share bulk data among many users. NIC can helps us to link peripheral devices using many ports of NIC.

The question is not complete. The complete question can be seen below:

What is the best location for finding new drivers for the NIC? Group of answer choices

A. Windows Update the installation media that came with the NIC

B. the installation media for Windows

C. the website for the manufacturer of the NIC

D. the website for Microsoft.

Learn more about NIC at https://brainly.com/question/17060244

#SPJ4

could anyone tell me how to solve this? ty

could anyone tell me how to solve this? ty

Answers

Based on the information, the output of the program is 54314 because the string S is "1279". The correct option is A.

How to explain the information

The first line initializes the variables ans and S. ans is a string that will store the output of the program, and S is the string that we will be processing.

The second line starts the outer loop. The outer loop iterates over the characters in S from right to left, in steps of 3. For example, if S is "1279", then the outer loop will iterate over the characters "9", "7", and "1".

In this case, the output of the program is 54314 because the string S is "1279". The first substring is "9", the second substring is "79", and the third substring is "1279". The values of these substrings are 9, 133, and 2207, respectively. When these values are added together, the result is 54314.

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

a computer on a network that is not the server​

Answers

Answer:

A peer-to-peer network is one in which two or more PCs share files and access to devices such as printers without requiring a separate server computer or server software. ... A P2P network can be an ad hoc connection—a couple of computers connected via a Universal Serial Bus to transfer files.

Other Questions
what is the role of the keyboard accompaniment? comment on technical considerations arrangers of elementary/secondary school music must consider and list the basic styles of accompaniment discussed in your textbook. 9.56 x 10^5 cg is how many grams? PLEASE HELP ME!!!!I recently got a new phone. It's awesome but there's one problem I can't fix for the life of me. I have downloaded like 10 apps for reminders and none of the reminders for anything are showing up. I rely heavily on reminders because I just can't count on myself to remember stuff. I have all my notifications on and nothing is blocked from notifications. What do I need to do? This is beyond frustrating. Explain the effect of a lack or shortage of entrepreneurs on the Economy Write the equation for a circle with a center at(8, -12) and a radius of 7. schoeninger interpreted the greater range of nitrogen isotope ratios in the stillwater burial population compared tothe pecos or ontario populations as reflecting: If the parent function is y=2^x which is the function of the graph? Word problem:Sachins office is 11.37km away from his house. He covers 9.245km by bus and rest by walking. How much distance does he cover by walking? (I only need the answer and how to do it ,PLS PLS PLS HELP I REALLY Need It PLS HELP One of the co-founders of the NAACP was ? Pls answer its for my final a trait unique to embryonic stem cells that makes them useful for generating knockout animals is that they 1. By design, intersections are risky because:a. Traffic signals might not always work.b. Drivers pay close attention to otherroad users.c. Vehicles cross one another's paths oftravel at various angles.d. Pedestrians typically cross roads andstreets quickly. Read then answer the question:What do you think would be more effective in discouraging a Xiongnu invasion, walls or a large Chinese population along the border? Explain your thinking.The Xiongnu live on meat and For the immigrants in such border cheese, wear furs, and possess no house or field. They move like birds and animals in the wild. They stop only at places which abound in grass and water, want of which will start them moving again. Today the Xiongnu are herding at several places and hunting along the frontiers.... It will be profitable to you to dispatch generals and officials together with troops to govern the frontier areas. People [slaves, convicts, and willing peasants] should be selected to settle along the border areas permanently, who can set up families and grow food grains while getting prepared against possible invasion by the Xiongnu. areas, the government will construct walled cities, well protected by high walls, deep moats, catapults, and thorns. Each city, along strategic points and thoroughfares, will be designed to hold no fewer than one thousand households.... Each walled city will have an inner wall and an outer wall 150 paces about 209 meters apart. Each residential area in the outer-wall area is to be surrounded by sandy fields to detect the intrusion of enemies in the night [Intruders will leave footprints in the soil.] Murray, Inc. emphasizes a desire for detail-oriented, motivated employees with strong social skills as indicated in the firm's job ________.A) specificationsB) analysisC) reportsD) descriptions 5. Determine if the following series are convergent or divergent. Justify your steps and state which test you are using. When necessary, make sure you check the hypotheses of the test that are satisfied before you apply it.(a). (4 point) [infinity]n=1 (-1) 1/n (b). (4 point) [infinity]n=1 6/5+8(c). (4 point) [infinity]n=1 n /2n+3n+2(d). (4 point) [infinity]n=1 n! / (n+2)! Which of the following specialized business models would perform e-business activities to generate revenues by matching online buyers and sellers to facilitate exchanges?Brokerage e-business model Which of the following use teams to combine vertical with horizontal structures?O A.Divisional structureO B. Geographic structure( C. Functional structure D. Matrix structure E. Virtual structure f: {0, 1} {0, 1} f(x) is obtained by replacing the first bit from x with 0. What is f(001)? f(001) = Ex: 101 Select all the strings in the range of f: 000 001 010 100 101 110 011 111 What are the characteristics of Mercury? (Select all that apply.)Mercury has less gravity than the Earth.Mercury has many rings visible from Earth.Mercurys year is similar to that of Earth.Mercury is the closest planet to the Sun. Smith has a dairy farm in which the number of cows increases at the rate of 5% per annum which results in the increase in the production level of the milk by 10% per annum. But the demand of the milk is increasing at the rate of the population of the town. If initially the farm has 160000 cows then the number of cows needed after 4 years to fulfill the requirement of the milk is: a. 204481 b.214481 c. 194440 d.194481 e. None of these