You are running a bingo game where you want to tweet the winner of each round of the game. You want to announce the name of who won, and how much they won in dollars. Make a function that takes those two words in as input, and then announces the win. For now, just print the statement that you will want to tweet later. (Hint: Remember that you are taking a number as input, which has to be converted to a string to concatenate it.)

Answers

Answer 1
Thank you I guess lol

Related Questions

Match the learning styles with the example.
Column B
Column A
a. Visual
1.
b. Auditory
2.
C. Kinesthetic
3.
Angela likes to review graphs and articles.
Which learning style do you think best matches
this student?
Helga likes to take notes and do fun activities.
Which learning style do you think best matches
this student?
Armando creates pictures to help remember his
math concepts. Which learning style do you
think best matches this student?
Hannah likes group discussions and oral
presentations from her teacher. Which learning
style do you think best matches this student?
Enjoy discussions and talking things through
and listening to others.
Benefit from illustrations and presentations,
and especially those in color.
Likes to move around a lot.
4.
5.
6
7

Answers

Answer

it would be c

Explanation:

what is the correct sequence of events that occurs during the router startup process? 1. operating system is found and loaded 2. power-on self-test is conducted 3. configuration file is loaded from nvram 4. bootstrap loader executes from rom

Answers

The correct sequence of events that occurs during the router startup process is  2,4,1,3. Hence, Option B is correct.

What is a router?

In order to connect two or more packet-switched networks or subnetworks, a router is used. It has two main purposes: letting several devices to share an Internet connection and controlling traffic between these networks by sending data packets to the correct IP addresses.

Bootstrap loader runs from read-only memory, IOS operating system is discovered and run, configuration file is loaded from NVRAM, and power-on self test is performed.

Therefore, Option B is correct.

Learn more about router from here:

https://brainly.com/question/13600794

#SPJ1

The complete question has been attached below:

What is the correct sequence of events that occurs during the router startup process? 1. Operating system is found and loaded 2. Power-on self-test is conducted 3. Configuration file is loaded from NVRAM 4. Bootstrap loader executes from ROM

a. 1,2,3, 4

b. 2,4, 1,3

c. 3,4, 2,1

d. 2,4,3,1

Part 1, Remove All From String CodeHS what is the answer???

Answers

The Remove All From String function is a function that takes two strings as its arguments, and remove all occurrence of the second string from the first

The program in Python

The function written in Python, where comments are used to explain each action is as follows:

#This defines the function

def RemoveAllFomString(str1, str2):

   #This returns the new string after the second string have been removed

   return str1.replace(str2, "")

Read more about python programs at:

https://brainly.com/question/26497128

#SPJ2

Answer:

def remove_all_from_string(word, letter):

   while letter in word:

       x=word.find(letter)

       if x == -1:

           continue

       else:

           word = word[:x] + word[x+1:]

   return word

print(remove_all_from_string("hello", "l"))

Explanation:

this worked for me

which data science category do you extract, transform, and load data? 1 point data integration and transformation data management model building data visualization

Answers

The correct option is A) Data integration and transformation. ETL extracts and transforms data from various sources, ensuring data quality and accessibility for decision-making.

Data integration and transformation is a crucial part of data science that involves extracting data from various sources, transforming it into a format that can be used by the target system, and loading it into the destination system. This process, commonly known as ETL, involves a set of techniques and tools that are used to collect, process, and transform data from different sources, in different formats, and make it available for analysis. It plays a significant role in ensuring data quality, consistency, and accuracy, as well as making data accessible and usable for decision-making purposes.

Learn more about Data integration and transformation here: brainly.com/question/30801724

#SPJ4

Hardware and software for computers åe complements. a) Discuss the effects on the equilibrium price and quantity in the software market, when the price of computer hardware falls. (Please write down the discussion and also show the effects in diagrams.) 2. The market for DVDs has supply curve and demand curves given by P=2Q
S
and P=42−Q
D
, respectively. Calculate the equilibrium price and quantity (P

and Q

) of the DVD market.

Answers

In the software market, when the price of computer hardware falls, the equilibrium price and quantity will be affected. The demand for software is positively related to the demand for hardware, as they are complements. As hardware becomes cheaper, more people will be willing to purchase computers, leading to an increase in the demand for software.

When the price of computer hardware falls, it becomes more affordable for consumers to purchase computers. This reduction in hardware prices leads to an increase in the demand for computers. As a result, the demand for software, which complements the use of computers, also rises. This shift in demand will cause the demand curve for software to shift to the right, indicating an increase in demand at every price level.

In the diagram, the initial demand curve for software (D1) intersects with the supply curve (S) at the equilibrium point (E1), determining the initial equilibrium price (P1) and quantity (Q1) of software. When the price of computer hardware falls, the demand curve for software shifts to the right, from D1 to D2. The new equilibrium point (E2) is determined by the intersection of the new demand curve (D2) and the supply curve (S), resulting in a higher equilibrium price (P2) and quantity (Q2) of software.

Overall, when the price of computer hardware decreases, it stimulates the demand for software, leading to an increase in both the equilibrium price and quantity in the software market. The complementary relationship between hardware and software plays a crucial role in determining the effects of changes in hardware prices on the software market.

Learn more about software here:

https://brainly.com/question/20532745

#SPJ11

Omar wants to research additional information about asteroids. Complete the sentences to describe how he should use the Smart Lookup feature in PowerPoint. Step 1: He should ____________ the word asteroid. Step 2: He should navigate to the _________ tab. Step 3. He should go to the __________ command group. Step 4: He should turn on the Intelligent Services of PowerPoint in the pane. Step 5: He should click the ________ option to open links that contain information about asteroids. Please answer quickly! It is quite urgent

Answers

Answer:

Step 1: He should  

✔ select

the word asteroid.

Step 2: He should navigate to the  

✔ Review

tab.

Step 3. He should go to the  

✔ Insights

command group.

Step 4: He should turn on the Intelligent Services of PowerPoint in the pane.

Step 5: He should click the  

✔ Explore

option to open links that contain information about asteroids.

Explanation:

Edg2020

Omar should use the Smart Lookup feature in PowerPoint in several steps 1. Select, 2. Review, 3. Insights, 4. Explore.

What is the Smart Lookup feature in PowerPoint?

The new Smart Lookup feature in PowerPoint 2016 for Windows is an option that shows up definitions, images, and other results from various online platforms about a word or phrase, right within PowerPoint.

There are four steps to use the Smart Lookup feature in PowerPoint:

Step 1: He should select the word asteroid.

Step 2: He should navigate to the Review tab.

Step 3. He should go to the Insights command group.

Step 4: He should turn on the Intelligent Services of PowerPoint in the pane.

Step 5: He should click the Explore option to open links that contain information about asteroids.

Therefore, he should use  1. Select, 2. Review, 3. Insights, 4. Explore.

Learn more about PowerPoint, here:

https://brainly.com/question/19238885

#SPJ2

This is an image of the ...................... Topology. * If you get it right i will mark you brainlist ​

This is an image of the ...................... Topology. * If you get it right i will mark you brainlist

Answers

Answer:

Tree

Explanation:

When dealing with perspective, _____ lines are used or implied.

Answers

Answer:

I'm pretty sure the answer is vanishing lines.

Explanation:

True or False: Cross-functional teams are optimized to work on one technical layer of a system only (e.g. GUI, database, middle tier, interfaces).

Answers

The statement that “Cross-functional teams are optimized to work on one technical layer of a system only (e.g. GUI, database, middle tier, interfaces)” is FALSE.

Cross-functional teams are optimized to work across multiple technical layers of a system. In cross-functional teams, team members with diverse skill sets collaborate to tackle complex projects, and the team has members from multiple technical layers of the system who work together to achieve common goals.

It includes individuals with different technical and functional skillsets working together to accomplish a common goal.Cross-functional teams work together in a collaborative effort that promotes skill sharing, expertise, and experience to enable innovation, progress, and overall team success.

Learn more about cross-functional teams at:

https://brainly.com/question/31625757

#SPJ11

if you try to close a document without saving it word prompts you to save it​

Answers

Answer:

You can change it in settings.

Explanation:

It is an automatic system to remind you save the document before quitting the app or in case you quit the app mistakenly without saving it.

Furthermore, You can change it in settings.

Kieran wants to search a database quickly for information on the last time a patient came to his medical facility. This information is contained in one table. Which feature would make the most sense for him to use?

A. Query

B. Report

C. Filter

D. Sort

Answers

D. Sort

I hope im correct

Sort feature would make the most sense for him to use.

What is Medical facility?

In general, a health facility is any place that offers medical services. Small clinics, doctor's offices, urgent care facilities, big hospitals with sophisticated emergency rooms, and trauma centers are all examples of healthcare facilities.

One typical indicator of a country or region's prosperity and quality of life is the quantity and caliber of its health services. Health care facilities are frequently subject to some legal regulation; frequently, a facility must first get a license from a regulatory body before it can begin operations.

Governments, for-profit companies, non-profit groups, and occasionally even private citizens may own and run healthcare facilities, with the proportions varied by nation.

Therefore, Sort feature would make the most sense for him to use.

To learn more about Sort, refer to the link:

https://brainly.com/question/18568184

#SPJ5

how and why Steve Jobs left Apple Computer.

Answers

Answer:

Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. ... He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy.

Explanation:

Adam is using the software development life cycle to create a new game. He made an outline of what functionality the game will require, determined how long it will take to create the game, and made a list of people who could help him with the graphics. What should Adam do next

Answers

Answer:

Write pseudocode and create a mock-up of how the game will work and look

Explanation:

Since in the question it is mentioned that Adam wants to develop a new game for this he made an outline with respect to game functions needed, time period, people who help him.

After that, he writes the pseudocode i.e a programming language and then develops a model i.e mock up that reflects the working of the game and its look so that he would get to know how much work is pending.

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated
Please help, will give brainliest!!! I need help with these coding questions, any help is appreciated

Answers

Answer:

class Foo:

   def F(self, n):

       if n == 1:

           return 1

       return self.F(n - 1) + 3 * n - 2

Explanation:

This should cover part a to this question. The thing I'm not sure on is they use the term "method" which in python technically means a class function...but then list one argument with the function call which makes me think it is possibly just supposed to be a regular function. Which would be the following snippet. It would depend on if you are using classes or not yet in your coding class.

def F(n):

   if n == 1:

       return 1

   return F(n - 1) + 3 * n - 2

Play around with it and look into python "lists" and "for loops" for part c. Part b I'm not sure what kind of example they want since I'm not in that class. Good luck!

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that

Answers

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.

What technology that was developed in the early 1880s was used for both mining reclaiming land in the california delta?.

Answers

The technology that was developed in the early 1880s ,that was used for both mining reclaiming land in the california delta is hydraulic mining.

A type of mining known as hydraulic mining involves moving silt or displacing rock material with the help of high-pressure water jets. The resulting water-sediment slurry from placer mining for gold or tin is sent through sluice boxes to extract the gold. Kaolin and coal mining both use it.

Ancient Roman practices that employed water to remove soft subsurface minerals gave rise to hydraulic mining. Its contemporary form, which makes use of pressured water jets generated by a nozzle known as a "monitor," was developed in the 1850s in the United States during the California Gold Rush. Despite being effective in extracting gold-rich minerals, the process caused significant environmental harm due to increased flooding and erosion as well as sediment blocking water ways and covering farmland.

To know more about hydraulic mining click here:

https://brainly.com/question/13970465

#SPJ4

What are the
advontages of social medio?​

Answers

Answer: some advantages are making sure you’re informed about things going on in the world and connecting with you’re friends or even talking to family members. I hope this answered you’re question!

Explanation:

Which feature in Access 2016 will ensure that every foreign key in a table has a link to a primary key in another
table?

O References
O Referential Integrity
O Autocorrect
O Data Source Binding

Answers

Answer:

B

Explanation:

edge :p

Type the correct answer in the box. Spell all words correctly.
What does Clara create that programmers can use to write code?
Clara works in a software development company. Her boss identifies that she has strong problem-solving skills. Clara’s boss places her on the planning team to create____ for programmers.
This is for Edmentum final! thanks

Answers

Answer:

design documents

Explanation:

Usually, in a software development company or information technology (IT) department, software is developed through a team effort. Such teams have programmers and various other professionals, such as software developers and engineers. These professionals perform parts of the entire software development process. For example, the programmer is not the only person in a team who can formulate a solution to a problem. Many times, software developers and system analysts do this. They create design documents for the programmer to follow. Based on these design documents, a programmer writes the code for the program.

Help FAST PLS in complete sentences discuss the process used to determine your credit score. Do you think it is fair? Why or why not? Make sure to use complete sentences.

Answers

Answer:

A fair credit score just means that the credit reference agencies think you're doing an okay job of managing your credit history. ... This means lenders could reject you for some of the best credit cards or loans

Seed 1,000, inputStep 100Bits 32t. r. 1. 1/2f. a. 1. 1/4e. T. 0. 1/8I _. 0. 1/16r=1-(1/2) +1-(1/4) +0(1/8)-0(1/16)...Find on the D2L a text version of War and Peace by Leo Tolstoy. Youwill use it create a pseudo random number generator. The PRNGshould be an object:prng = WarAndPeacePseudoRandomNumberGenerator()Alternatively, you should be able to pass a seed when you createthe object:prng = WarAnd PeacePseudoRandomNumberGenerator(12345)Then, you should be able to generate pseudo random numbers[0,1):r = prng.random()

Answers

Make a pseudo-random number generator by utilising Tolstoy's War and Peace in text format. Pass a seed to generate numbers from 0 to 1.

A pseudo-random number generator object may be made using a text file of War and Peace, the seed, and the specified input instructions. The object can be initialised with or without a seed argument. The generator will generate a pseudo-random number between 0 and 1 after being invoked. The generator's randomness is based on the frequencies of letters and words in the text, making it unpredictable and appropriate for simulation and gaming applications. Use Tolstoy's War and Peace in text format to create a pseudo-random number generator. To generate numbers from 0 to 1, pass a seed.

learn more about text here:

https://brainly.com/question/5677552

#SPJ4

A proprietary software license allows users to install and use the software on any number of computers. install and use the software after agreeing to the terms of the license. inspect, modify, and redistribute the software. copyright and resell the software.

Answers

Answer:

install and use the software after agreeing to the terms of the license.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Hence, a proprietary software license allows users to install and use the software after agreeing to the terms of the license.

A proprietary software license allows users to install and use the software after agreeing to the terms of the license.

Thus, option (b) is correct.

Users are required to agree to these terms before they can legally install and use the proprietary software. The license agreement may outline specific restrictions, limitations, and permitted usage scenarios.

Installing and using the software on any number of computers: This is not necessarily true for proprietary software.

Inspecting, modifying, and redistributing the software: These activities are typically not allowed under a proprietary software license, as they generally provide limited or no access to the source code and impose restrictions on modifications and redistribution.

Copyrighting and reselling the software: These rights are typically retained by the software's copyright holder and are not granted to users under a proprietary software license.

Therefore, install and use the software after agreeing to the terms of the license.

Thus, option (b) is correct.

Learn more about Software installation here:

https://brainly.com/question/7548929

#SPJ6

The question attached are seems to be incomplete, the complete question is:

A proprietary software license allows users to :

install and use the software on any number of computers.install and use the software after agreeing to the terms of the license.inspect, modify, and redistribute the software.copyright and resell the software.

hi hehehehehehehehehheeheh

Answers

Hi, how are you? I assume youre hyper?

which process is most like copying and pasting in that it places a duplicate of external data into an access table?

Answers

The process most similar to copying and pasting, which duplicates external data into an Access table, is the "Import" function.

The "Import" function in Microsoft Access allows users to bring in data from external sources, such as Excel spreadsheets or text files, and create a duplicate copy of that data within an Access table. This process is similar to copying and pasting because it involves selecting and transferring data from an external source into a destination table within Access. The imported data is essentially duplicated and stored in the Access table, allowing users to work with and manipulate it within the database environment. This method is commonly used to consolidate and integrate data from different sources into a single Access database for further analysis or processing.

Learn more about Microsoft Access here:

https://brainly.com/question/17959855

#SPJ11

a data analyst working for an e-commerce website creates the following data visualization to present the amount of time users spend on the

Answers

The data analyst working for an e-commerce website creates a data visualization to present the amount of time users spend on the website.

The data analyst creates a data visualization to effectively convey the amount of time users spend on the e-commerce website. The visualization could take various forms depending on the goals and preferences of the analyst. One possible approach is to use a bar chart or column chart, where each bar represents a specific time range (e.g., 0-10 minutes, 10-20 minutes, etc.) on the x-axis, and the corresponding number of users or the total duration spent is represented on the y-axis. This allows for a clear comparison of time ranges and easily identifies the range with the highest user engagement.

Another option could be a line chart, showing the trend of user activity over time. The x-axis would represent time intervals (e.g., days, weeks, or months), while the y-axis would indicate the average or cumulative time spent on the website. This visualization helps in understanding any patterns or changes in user engagement over a specific period.

Learn more about websites from here:

https://brainly.com/question/30884978

#SPJ11

Write a program to calculate the volume of a cube which contains 27 number of small identical cubes on the basis of the length of small cube input by a user.​

Answers

Answer:

This program is written in python programming language.

The program is self explanatory; hence, no comments was used; However, see explanation section for line by line explanation.

Program starts here

length = float(input("Length of small cube: "))

volume = 27 * length**3

print("Volume: "+(str(volume)))

Explanation:

The first line of the program prompts the user for the length of the small cube;

length = float(input("Length of small cube: "))

The volume of the 27 identical cubes is calculated on the next line;

volume = 27 * length**3

Lastly, the calculated volume of the 27 cubes is printed

print("Volume: "+(str(volume)))

Which designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI)?
a. Controlled Unclassified Information (CUI)
b. A Common Access Card and Personal Identification Number.
c. Store it in a shielded sleeve.
d. CUI may be stored on any password-protected system.

Answers

Controlled Unclassified Information (CUI) designation includes Personally Identifiable Information (PII) and Protected Health Information (PHI).

Government-owned or created information, or CUI, must be protected and disseminated in accordance with applicable laws, rules, and government-wide policies. CUI is not a delicate bit of information. It is not considered to be company intellectual property unless it was created for or included into specifications related to a government contract. CUI is less restricted than classified material, making it the simplest target for attackers. The loss of aggregated CUI, which directly affects the lethality of our warfighters, is one of the largest dangers to national security. In March 2020, DCSA received eight responsibilities connected to CUI under DoD Instruction 5200.48. DCSA created an implementation strategy to carry out these duties during the first half of 2021, and it would use a staged approach to operationalize its CUI.

Learn more about  Controlled Unclassified Information here:

https://brainly.com/question/30242754

#SPJ4

the dhcp server is software running on some server os (like windows server, or linux).

Answers

The statement that the DHCP server is software running on some server like Windows servers, or Linux is True.

What is the DHCP?

DHCP is short for Dynamic Host Configuration Protocol. This term is used to refer to a server that makes for the automatic assignment of computer configurations to network services.

Instead of manually configuring the systems, these can be automatically connected, thus making for speed and wireless connectivity. DHCP can be set up in Windows and Linux operating systems.

Learn more about DHCP here:

https://brainly.com/question/10097408

#SPJ1

When using bits to represent fractions of a number, can you create all possible fractions? Why or why not?

Answers

Answer:

No, there will be values you cannot create, such as values smaller than your smallest bit place value, or values that are "in-between" other values. This inability to represent numbers exactly results in roundoff errors.

Explanation:

Answer:

Yes, we can create the possible fractions using bits to represent the fractions of a number.

Explanation:

A bit is defined as a single digit in the binary code. It is the basic unit of information in digital communication and computing. It has values either 0 or 1.

In the context, we can create the fractions by using the first bits in order to represent the full number and also the last for the bits as the numbers that is above the fraction.

Learn More :

https://brainly.com/question/17386539

When using bits to represent fractions of a number, can you create all possible fractions? Why or why
Other Questions
Which usually grows faster: M1 or M2? Produce a graph showing M2divided byM1. When this ratio rises, M2 outpaces M1 and vice versa. What isthe long-runpattern? Is the pattern stable? Area of a right angled triangle is 600 cm if one of its side containing the right angle is 40 cm then find other two sides of the triangle . Please explain Find the length of d in the figure below if a = 8 in., b = 3 in., and c = 4 in. Round your answer to the nearest tenth. Pls help :( How many atoms of carbon, C, are in 0.020 g of carbon? write how your usual day is (im in school) use wordsaufstehenduschenfrhstckenin der Schule seinlernenzu Mittag essennach Hause zurckkommenein Buch lesenComputer spielenzu Abend essenschlafen gehenschlafen Identify the tissue in the sections below and name TWO (2)identifying/characteristic features that helped you identify thetissue? the line on the graph is slanted and straight. what does the line show about the acceleration of the object? Which is the first distinctively hominin trait to appear in the fossil record? upright walking (bipedalism) sophisticated stone tools increased brain size write a liner function f with the values f(0) = -4 and f(3)=6 6-10. Match each vocabulary word with its corresponding synonym. *bargaindesiredexactnessplannedshelterchoreographed OOOnegotation Oprecision Orefuge Coveted "What is the relationship between opportunity cost and money costs? Would you say that the money cost of a 4-year college education in the United States is close to the opportunity cost of a college ed" What is the area of a square with side length of 4 and one-fourth m? 8 and one-half meters squared17 meters squared18 and 1 Over 6 meters squared20 and one-fourth meters squared a. Gabriela, (ir)........ a recogere regalo para Claudio: (recordar)que maana es sucumpleaos.b. Jaime, (poner) .....verdura en el frigorfico y (encender)el fuego para calentar ellaONc. Ninos, (salir)de vuestrahabitacion y (apagar)d. Olga, (decir).................... a mam quehoy vuelvo a casa un poco ms tarde. Are feeling overloaded with too much information and the gender of the individual independent? Explain. O A. Yes, because P(maleloverloaded with too much information) #P(male). O B. No, because P(maleloverloaded with too much information) = P(male). O C. No, because P(maleloverloaded with too much information) # P(male). OD. Yes, because P(maleloverloaded with too much information) = P(male). The sum of the measures of angle LMN and angle NMP is 180 degrees Is the number of sit-ups Anna does proportional to the time she spends doing them? 98+4x+6=180 X=19 What is the measurement of the missing angle? We have an accounts receivable on the client Bad Risk of 5,000. In year N-1 an impairment loss of 1,500 has been recognized for this receivable On 31/12/N we estimate that we risk not receiving 30% of the receivable Indicate the correct answer (one only).A. In N this situation decreases profit by 1,500 and has no impact on cash.B. In N this situation increases cash and decreases profits by 2,000.C. In N this situation decreases profits by 2,000 and has no impact on cash.D. In N this situation has no impact on profits and cash. 3/4 and 7/12 common factor The water flowing in a river moves at different speeds. The picture showswhat happens to a river over time.new land insteadriver replaceslandof rivernew land insteadof riverriver replaceslandWhere does the river deposit sediment?