You want to know which files are large files (at least 0.1MB) in your data directory, but you do not want to go through them one by one. So you decide to design a regular expression to help with this. Locate the rule under the p1 target in your Makefile. This rule uses the Is command to list the contents of the data directory in your current folder. The -I option produces the long listing for these contents, which includes their size in bytes. The output of this is command is then piped as input into grep command. The-E option for the grep command allows searching through this text with a regular expression. Replace the regular expression in this grep command to search for any 6 digit number. Since the size of these files are displayed in bytes, the smallest possible six digit number: 100000 corresponds to 0.1MB. When this regular expression is correct, running "make p1" should display the three large files that can be found within the provided data directory. Tip: Start by composing a regex that matches any single digit, and test this to make sure that it works as expected. If you encounter trouble with one specific way of matching single digits, like \d, then please try to find another way that works with grep - E. Once this is working, look for a way to extend this pattern so that it must be repeated exactly six times to be matched.

Answers

Answer 1

You must pipe the command's output through grep in order to utilize grep as a filter. " | " is the symbol for pipe.

Explain about the grep?

The full line containing the matched string is displayed by default when using grep. To display only the matched pattern, change this setting. Using the -o option, we may instruct grep to show only the matching string. Using grep -n, output should be displayed together with the line number: To display the file's line number where the matching line was found.

Within collections of files, the grep command can look for a string. It outputs the name of the file, a colon, the line that matches the pattern, and the pattern when it discovers a pattern that matches in more than one file.

Instead of putting a filename at the end of a grep command, use an asterisk to search all files in the current directory.

To learn more about string refer to:

https://brainly.com/question/16397908

#SPJ4


Related Questions

Does clicking ads and pop ups like the one shown in this image could expose your computer to malware?

Answers

Answer: Yes, clicking adds/popups like the one in the image could cause your computer/electronic to catch viruses/malware.

Explanation: The cause to this is when you click an ad/popup you're exposing yourself to a potential dangerous/visious site. You're unaware to where the popup could bring you, and for all we know it could bring us to a fake site for a download which is really a visious malware to be downloaded to your device.

7d2b:00a9:a0c4:0000:a772:00fd:a523:0358 What is IPV6Address?

Answers

Answer:

From the given address:  7d2b:00a9:a0c4:0000:a772:00fd:a523:0358

We can see that:

There are 8 groups separated by a colon.Each group is made up of 4 hexadecimal digits.

In general, Internet Protocol version 6 (IPv6) is the Internet Protocol (IP) which was developed to deal with the expected anticipation of IPv4 address exhaustion.

The IPv6 addresses are in the format of a 128-bit alphanumeric string which is divided into 8 groups of four hexadecimal digits. Each group represents 16 bits.

Since the size of an IPv6 address is 128 bits, the address space has \(2^{128}\) addresses.

Java Fundamental

Step 1:

Ask the user to enter the clock speed (in Megahertz) of their graphics card (GPU). This is an indicator of how fast their graphics card is.

Step 2:

Ask the user to enter the clock speed (in Megahertz*) of their processor (CPU). This is an indicator of how fast their processor is.

Step 3:

Ask the user to enter the number of cores that their processor (CPU) has. The more cores a processor has, the more work it can do.

Step 4:

Output the following text: "Computer Hardware Graphics Quality Recommendation Tool"

Step 5:

Display the following output (See sample Input and Output below):

- The GPU clock speed
- The CPU clock speed
- The number of cores

Sample Input and Output (user input is in bold) - The output of your program should match the formatting and spacing exactly as shown.

Please enter the clock speed (in Megahertz) of your graphics card: 1000

Please enter the clock speed (in Megahertz) of your processor: 3000

Please enter the number of cores of your processor: 2


Computer Hardware Graphics Quality Recommendation Tool

GPU Clock Speed: 1000.0 MHz

CPU Clock Speed: 3000.0 MHz

Number of cores: 2

Answers

The law for this would look commodity like this

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);  

The final law would look commodity like this ;  

public class ComputerHardwareTool{  public static void main( String() args){  

Scanner input =  new Scanner(System.in);

(" Please enter the  timer speed( in Megahertz) of your plates card");  

int gpuClockSpeed = input.nextInt();

(" Please enter the  timer speed( in Megahertz) of your processor");  

int cpuClockSpeed = input.nextInt();

(" Please enter the number of cores of your processor");  

int numCores = input.nextInt();

(" Computer Hardware Graphics Quality Recommendation Tool");

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);}}    

Java is an object- acquainted programming language that is generally used in software development. It's designed to be platform-independent, allowing it to run on any system that has a Java Virtual Machine installed.  

Step 1 Ask the  user to enter the  timer speed( in Megahertz) of their plates card( GPU). This is an  indicator of how presto their plates card is. To do this, you will need to use the Scanner class to read in the  user's input. The law for this would look commodity like this  

Scanner input =  new Scanner(System.in);

System.out.print(" Please enter the  timer speed( in Megahertz) of your plates card");

int gpuClockSpeed = input.nextInt();  

Step 2 Ask the  user to enter the  timer speed( in Megahertz *) of their processor( CPU). This is an  indicator of how presto their processor is. The law for this would look commodity like this (" Please enter the  timer speed( in Megahertz) of your processor"); int cpuClockSpeed = input.nextInt();  

Step 3 Ask the  user to enter the number of cores that their processor( CPU) has. The  farther cores a processor has, the  farther work it can do. The law for this would look commodity like this (" Please enter the number of cores of your processor");

int numCores = input.nextInt();

Step 4 Affair the following  text" Computer Hardware Graphics Quality Recommendation Tool". The law for this would look commodity like this (" Computer Hardware Graphics Quality Recommendation Tool");  

Step 5 Display the preceding affair( See sample Input and Affair below)-

The GPU  timer speed- The CPU  timer speed- The number of cores

The law for this would look commodity like this (" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);

The final law would look commodity like this ;

public class ComputerHardwareTool{  public static void main( String() args){  

Scanner input =  new Scanner(System.in);

(" Please enter the  timer speed( in Megahertz) of your plates card");  

int gpuClockSpeed = input.nextInt();

(" Please enter the  timer speed( in Megahertz) of your processor");  

int cpuClockSpeed = input.nextInt();

(" Please enter the number of cores of your processor");  

int numCores = input.nextInt();

(" Computer Hardware Graphics Quality Recommendation Tool");

(" GPU Clock Speed" gpuClockSpeed" MHz");

(" CPU  timer Speed" cpuClockSpeed" MHz");

(" Number of cores" numCores);}}

For more such questions on String, click on:

https://brainly.com/question/24994188

#SPJ8

How is the Agile way of working different?

Answers

Answer:

It is working within guidelines (of the task) but without boundaries (of how you achieve it).

What enables image processing, speech recognition & complex gameplay in ai

Answers

Deep learning, a subset of artificial intelligence, enables image processing, speech recognition, and complex gameplay through its ability to learn and extract meaningful patterns from large amounts of data.

Image processing, speech recognition, and complex gameplay in AI are enabled by various underlying technologies and techniques.

Image Processing: Convolutional Neural Networks (CNNs) are commonly used in AI for image processing tasks. These networks are trained on vast amounts of labeled images, allowing them to learn features and patterns present in images and perform tasks like object detection, image classification, and image generation.Speech Recognition: Recurrent Neural Networks (RNNs) and their variants, such as Long Short-Term Memory (LSTM) networks, are often employed for speech recognition. These networks can process sequential data, making them suitable for converting audio signals into text by modeling the temporal dependencies in speech.Complex Gameplay: Reinforcement Learning (RL) algorithms, combined with deep neural networks, enable AI agents to learn and improve their gameplay in complex environments. Through trial and error, RL agents receive rewards or penalties based on their actions, allowing them to optimize strategies and achieve high levels of performance in games.

By leveraging these technologies, AI systems can achieve impressive capabilities in image processing, speech recognition, and gameplay, enabling a wide range of applications across various domains.

For more such question on artificial intelligence

https://brainly.com/question/30073417

#SPJ8

Use MPLAB to write an asemply program to multipy two numbers (11111001) and (11111001). Then save the product in file reisters 0x50 and 0x51. Return a snapshot of your code, the SFR memory view showing the register used to store the multiplication, the file register view showing the product value.

Answers

3.148085752161e17
-should be right,did my best

If You're is in credit card debt, why can't you just say your card was stolen so you can avoid the debt.

Answers

You can not claim this because most times credit card issuers will be able to match purchases and charges to your location, ex stores around you, online purchases sent to your location.
because they can see literally everything you do with your card, they monitor everything

name the steps to turn on a computer properly​

Answers

Answer:

Check that the computer is connected to power, and is powered on.

Make sure that your keyboard and mouse are plugged in.

Check that the monitor (screen) is plugged into the computer using its display cable.

Ensure that the monitor is connected to power and is turned on.

Explanation:

Which XXX completes the definition of the generic method, avgNum?
public class FindAverage { XXX { long tripleSum; tripleSum = item1.longValue() + item2.longValue() + item3.longValue(); return tripleSum / 3; } }
a. public static long avgNum(long item1, long item2, long item3)
b. public static long avgNum(TheType item1, TheType item2, TheType item3)
c. public static long avgNum(TheType item1, TheType item2, TheType item3)
d. public static avgNum(TheType item1, TheType item2, TheType item3)

Answers

Answer:

Explanation:

The correct piece of code for the generic method in the question would be the following...

public static <TheType extends Number> long avgNum(TheType item1, TheType item2, TheType item3)

This declaration of the avgNum method declares this method as a Generic TheType method that is a subclass of the Number class. It also takes in generic parameters which are the same as the Generic class that was declared. Finally, outputting a long value which would be tripleSum / 3

Which of the following usually addresses the question of what?
a. Data and information
b. Information and knowledge
c. Knowledge and data
d. Communication and feedback

Answers

Information is understood to be knowledge obtained by study, communication, research, or education. The result of information is fundamentally...

What is the starting point for communication?

Communication is the act of giving, receiving, or exchanging information, thoughts, or ideas with the intent of fully conveying a message to all persons involved. The sender, message, channel, receiver, feedback, and context are all parts of the two-way process that constitutes communication. We may connect with others, share our needs and experiences, and fortify our relationships through communication in daily life. We may share information, convey our emotions, and communicate our opinions through it. Giving, getting, and sharing information is the act of communicating.

To know more about education visit:-

https://brainly.com/question/18023991

#SPJ1

Algorithm of the odd number between 10 to 50

Answers

Answer:

Explanation:

The algorithm to find all odd numbers between 10 and 50 is as follows:

1. Start by setting the variable `i` equal to 11.

2. While `i` is less than or equal to 49, do the following:

  - Print the value of `i`.

  - Add 2 to `i`.

3. End the loop.

This algorithm will print all odd numbers between 10 and 50, inclusive .

I hope this helps! Let me know if you have any other questions.

Write equivalent predicate statement for Every teacher who is also a painter loves Bob​

Answers

Answer:

Every teacher who is also a painter loves Bob

I have no idea how to answer this question so I’m just gonna

What refers to a set of instructions executed in order?
code block
code snippet
sequence
blueprint
30 points

Answers

Answer:

I think the answer is sequence

Answer:

sequence

sequence

codehs 8.2.5 spell it out pls help

Answers

The answer is not here, so you should look down↓:

Explanation:

The programming question requires that we write a function that takes a string and returns every character in it but the first character.

The function in Python, where comments are used to explain each line.

This defines the function too.

This returns every character in the string except the first one.

some context free languages are undecidable

Answers

yess they are and have been for awhile although they’re already

who you on
1. What type of web page is classified as flat or stationary?
A. Web 1.0 B. Web 2.0 C. Web 3.0 D. Web 4.0​

Answers

Answer:

Web 1.0

Explanation:

Web 1.0 was its terminology used during the World Wide Web to reference to the first period of growth that was characterised by basic static websites. Flat pages: Pages did not provide dynamic functionality that modified depending on the activities of website users. Websites were primarily informative at that time.

Web pages which lacks interactivity such that only contents which have been originally posted remains there and hence do not change characterize the earliest form of web pages called Web 1.0.

The name stationary or flat web was culled from how the the earliest form of web pages appear. They do not contain visuals or interactive capability.

In static web pages, contents remain as they are posted as editing cannot be made on the go as it is possible with dynamic web pages which characterizes more newer forms of web pages.

Therefore, the earliest form of web pages, Web 1.0 are referred to as being flat or stationary.

Learn more :https://brainly.com/question/9060926

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

Order the steps to successfully create a data table.
Answer: Write the formula used to create table values
Select the range
Select the Data tab and What-If Analysis
Select Data Table
Select the values for row/column input.

Answers

Here are the steps to successfully create a data table:

Select the range.Select the Data tab and What-If Analysis.Select Data Table.Write the formula used to create table values.Select the values for row/column input.

How to create the data table

For achieving the desired outcome of generating a data table, it is suggested to adhere to the following measures:

Choose the cells group in which you intend to generate the data table. Include both the cells for input and presentation of results in the specified range.

Provide the equation that you intend to apply for computing the figures enlisted in the data chart. This equation must refer to the designated cells and yield the intended outcome.

Access the What-If Analysis feature by navigating to the Data tab within your spreadsheet program. To access the menu, simply click on it.

Choose the Data Table option from the What-If Analysis menu. This action will trigger the appearance of a dialog box or prompt that will require you to input the required details.

Determine the desired input values for either the row or the column in the data table dialogue box. The table's outcomes will be computed based on these values.

By adhering to these guidelines, you can produce a chart of data that exhibits computed figures derived from various input situations, aiding you in scrutinizing and comprehending the ramifications of different factors on your data.

Read more about data tables here:

https://brainly.com/question/32534586

#SPJ1

Most of the devices on the network are connected to least two other nodes or processing
centers. Which type of network topology is being described?

bus

data

mesh

star

Answers

The network topology “mesh” is being described. In terms of computer science, a kind of topology where devices connect to 2+ nodes is called mesh.

Documents files should be saved as a _____ file

Answers

Answer:

PDF

Explanation:

One of the common tests used to evaluate the accessibility of a web page consists of

using an Internet search engine to see if the page can be found easily.
clicking all hyperlinks in the page to test for broken or inaccurate links.
using the TAB and ENTER keys to move through the page’s content.
comparing the page with others in the website to find inconsistent layout.

Answers

The statement provided is True. An Internet search engine examination is a comprehensively employed method to evaluate the accessibility of a webpage, gauging if the page can be expeditiously found by users.

Other methods of accessing data

Furthermore, all hyperlinks in the page are clicked upon to weed out broken or inaccurate links which may negatively affect user experience by leading them astray. This rubric helps identify any links that may pose difficulties in accessing an accurate destination or even incorrect one, thus excluding any possibility of misunderstanding or degradation of user satisfaction.

An additional arbiter frequently employed to determine the accessibility of a webpage is using TAB and ENTER keys on a keyboard only interface. Loopholes for a comfortable exploration via keyboards when digital displays cannot help decipher is demonstrated in this manner; important for those susceptible to low vision or motor impairments obeying disability codes with accessible requirements or anyone else lacking interaction means save the keyboard.

Learn more about Internet search engine at

https://brainly.com/question/26488669

#SPJ1

Would two bits be enough to assign a unique binary number to each vowel in the English language? Explain.

Answers

Answer:

No.

Explanation:

Since there are 5 vowels, you'd need at least 3 bits to number them. 2 bits give you 2²=4 possibilities, which is 1 short. 3 bits give you 2³=8 possibilities, which fits 5 easily.

The term "bit" means binary digit, and it is used to represent data in a computer system.  

The number of character an n-bit computer can hold is \(2^n\)

So, a 2-bit computer can hold a maximum of:

\(Max = 2^2\)

\(Max = 4\)

i.e. A 2-bit computer can hold a maximum of 4 characters.

The English language vowel are 5 (i.e. letters a, e, i, o and u).

5 is greater than the maximum number of characters the 2-bit computer can hold (i.e. 5 > 4)

Hence, two bits will not be enough to hold each vowel in the English language.

Read more about binary digits at:

brainly.com/question/9480337

Complete the steps for finding and replacing text.
1. Click on the
✓tab.
2. In the Editing group, click
3. Type the text you want to find.
✓ button.
4. Click the
5. Type the replacement text.
6. Click Replace All.


NEED THE ANSER ASAP

Answers

Replace all with click editing group thanks ur welcome

True or false question :)

Handware can be tracked back to ancient times. Over six centuries ago.
°true
°false

Answers

Answer:

false and it's a recent technology

i would say the answer is false!

Please rewrite and correct the following sentences:
1. Their dog ran away last night, and now their looking for him.
2. The company lost there biggest client last year.
3. Who is you going to the party with tonight?
4. The museums is open on Saturdays from 10am to 5pm.
5. Neither the boys or their father have any idea where the car keys is.

Answers

1.Their dog ran away last night, and now they are looking for him.

2. Their company lost their biggest client last year.

3. With whom you are going to the party with tonight?

4. The museums are open on saturdays from 10 am to  pm.

5. Fathers or Boys no one knows where the car keys are?

Thus, English has three tenses: past, present, and future. When writing about the past, we employ the past tense.

When writing about facts, opinions, or regular occurrences, we employ the present tense. To write about upcoming events, we utilize the future tense. Each of those tenses has additional characteristics, but we won't cover them in this session.

It's crucial to maintain the same tense throughout a writing endeavor after you've decided on one. To communicate yourself clearly, you may need to switch up the tense from time to time.

Thus, English has three tenses: past, present, and future. When writing about the past, we employ the past tense.

Learn more about Tenses, refer to the link:
https://brainly.com/question/29757932

#SPJ1

The editor serves as both a creative and technical role. True False

Answers

Answer:

True

Explanation:

brian is a graduate engineer and has passed the fe exam but is not yet licensed. he is employed by a small engineering firm, and works with jim, a licensed professional engineer and owner of the company. the firm is retained to do the structural design of a new rural public school. the project is assigned to brian. after completing his preliminary calculations for the structure, brian does a computer analysis of some of the more complex aspects of the design. this computer analysis shows brian's hand calculations are essentially correct. although brian feels he is quite thorough and conscientious, he notices that jim is rarely in the office, provides little or no supervision, and never checks brian's work before sealing and submitting the plans and specifications to the client for the bidding and construction phases. brian wonders if jim is in conformance with the act and board rules and decides to discuss the matter with him.

Answers

After finishing his initial calculations for the construction, Brian uses a computer to analyze some of the more intricate components of the design.

What are the guiding principles of the engineering code of ethics?

By using their knowledge and skills to improve environmental and human welfare, engineers uphold and advance the integrity, honor, and dignity of the engineering profession. serving the public, their employers, and their clients faithfully while being honest and impartial.

This computer study showed that Brian's hand calculations were generally right.

In spite of Brian's conviction that he is meticulous and diligent, he observes that Jim is rarely present in the office, offers scant to no supervision, and never reviews Brian's work before sealing and delivering the drawings and specifications to the customer for approval.

To know more about engineer visit:-

https://brainly.com/question/29529598

#SPJ4

please answer urgently. See the attached image

please answer urgently. See the attached image

Answers

Based on the information, the tight upper bound for T(h) is O(h).

How to explain the information

The algorithm visits at most x children in line 3, where x is the number of keys in the current node.

T(h) ≤ T(h-1) + x

For a B-Tree of height 0, i.e., a single node, the algorithm just compares the key with the node key and returns. Therefore, T(0) = Θ(1).

We can express T(h) as a sum of terms of the form T(h-i) for i = 1 to h:

T(h) ≤ T(h-1) + x

T(h-1) ≤ T(h-2) + x

T(h-2) ≤ T(h-3) + x

...

T(2) ≤ T(1) + x

T(1) ≤ T(0) + x

Adding all these inequalities, we get:

T(h) ≤ T(0) + xh

Substituting T(0) = Θ(1), we get:

T(h) = O(h)

Therefore, the tight upper bound for T(h) is O(h).

Learn more about upper bound on

https://brainly.com/question/28725724

#SPJ1

You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!

Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.

Answers

Confidential Computer Forensics Investigation Report

Case Number: 2023-4567

Date: June 22, 2023

Subject: Computer Forensics Investigation Findings

I. Introduction:

The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.

II. Computer Information:

The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.

III. Access and Usage:

During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.

IV. Forensic Tools and Findings:

Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.

Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.

File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.

Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.

V. Conclusion:

Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.

The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.

Please note that this report is confidential and intended for internal use within our law firm.

Sincerely,

[Your Name]

Computer Forensics Investigator

[Law Firm Name]

I hope this helps. Cheers! ^^

1. What would be the best explanation of the variable name 'int indexSize'?
a. Shows the number in the index is big
b. Holds the number in the last index spot
c. Holds the number in the first index spot
d. Holds the number of indexes in the array

Answers

1The option that would be the best explanation of the variable name 'int indexSize' is option d. Holds the number of indexes in the array

What is the variable about?

The variable name 'int indexSize' is one that tells that it have the number of indexes in an array.

Note that The use of the term "indexSize" is one that tells that it stand for the size or the amount of the indexes in the array, and thus it is one that is telling the total number of indexes as well as the elements that is seen in the array.

Therefore, It is common work in programming to be able to make use of variable names that are said to be descriptive.

Learn more about variable from

https://brainly.com/question/28248724

#SPJ1

Other Questions
for the area of study entitled kinesi/o/logy, the combining form means Ethanol is a possible fuel. Use average bond energies to calculate Hrxn for the combustion of ethanol. CH3CH2OH(g) + 3O2(g) 2CO2(g) + 3H2O(g) PLS HURRY THIS IS DUE IN 5 mins (a) Waves P and Q have the samebut wave P has twice theof wave Q.(b) Waves Q and R have the samebut wave R has twice theof wave Q.(c) Waveshows a steady frequency but changing amplitude.(d) Waveshows steady amplitude but a changing frequencyTel Wavesandhave a lowamplitude and a steadvafrecuency An individual's liquidity ratioincludesa. debt repayments over the next 15years.b. amount of an outstanding telephoneaccount.c. the balance of a 25-year mortgageloan.d. superannuation balance which receptor is responsible for telling the brain to increase blood flow Two methods have been used to produce the following forecasts over the past four months. Which forecast is the best one?DemandForecast AForecast B150130180200170180220184180190195180a. Forecast Bb. Forecast Ac. They are equally good.d. There is not enough information to tell. I need help ASAP with science with number 2 7. (a) An algorithm has been written in pseudocode to Input 50 numbers. Positive numbers are storedin the array PosNum[ ]. Negative numbers are stored in the array NegNum ).Zeros are not included in the positive and negative counts.Count 0PosCount CountNegCount + CountREPEATINPUT NumberIF Number > 0THENPosCount PosCount + 1PosNum[PosCount] = NumberELSENegCount = NegCountNegNum[NegCount] = NumberENDIFCount Count + 1UNTIL Count >= 50OUTPUT "There are ", PosCount," positive numbers"OUTPUT "There are ", NegCount," negative numbers"(b) The algorithm needs to be changed so there is no limit to how many numbers can be input.When the number 9999 is input, the algorithm stops more numbers being input and outputsthe results. The number 9999 is not to be stored nor counted as a positive number.Explain how you would change the algorithm. Use future or present value techniques to solve the following problems. a. Starting with $8,000, how much will you have in 8 years if you can earn 15 percent on your money? Round the answer to the nearest cent. Round FV-factor to three decimal places. Calculate your answer based on the FV-factor. s Calculate your answer based on the financial calculator. $ If you can earn only 6 percent? Round the answer to the nearest cent. Round FV-factor to three decimal places. Calculate your answer based on the FV-factor. $ Calculate your answer based on the financial calculator. $ b. If you inherited $65,000 today and invested all of it in a security that paid a 13 percent rate of return, how much would you have in 30 years? Round the answer Calculate your answer based on the FV-factor. $ Calculate your answer based on the financial calculator. $ c. If the average new home costs $300,000 today, how much will it cost in 14 years if the price increases by 7 percent each year? Round the answer to the nearest cent. Round FV-factor to three decimal places. Calculate your answer based on the FV-factor. $ Calculate your answer based on the financial calculator. $ d. You think that in 11 years, it will cost $227,000 to provide your child a 4-year college education. Will you have enough if you take $70,000 today and invest it for the next 11 years at 7 percent? Round the answer to the nearest cent. Round FV-factor and FVA-factors to three decimal places. Select, you will have approximately $ -Select-than your estimate of $227,000. If you start from scratch, how much will you have to save each year to have $227,000 in 11 years if you can earn a 7 percent rate of return on your investments? Calculate your answer based on the FVA-factor. $ Calculate your answer based on the financial calculator. $ e. If you can earn 3 percent, how much will you have to save each year if you want to retire in 35 years with $1.8 millions? Round the answer to the nearest cent. Round FVA-factor to three decimal places. Calculate your answer based on the FVA-factor. $ the nearest cent. Round FV-factor to three decimal places. Calculate your answer based on the financial calculator. $ f. You plan to have $500,000 in savings and investments when you retire at age 67. Assuming that you earn an average of 12 percent on this portfolio, what is the maximum annual withdrawal you can make over a 25-year period retirement? Round the answer to the nearest cent. Round PVA-factor to three decimal places. Calculate your answer based on the PVA-factor. Calculate your answer based on the financial calculator. When state and federal law conflict with each other, what would happen in a court of law?Federal law is overruled by state law.State law is overruled by federal law.Federal and state laws areconsidered equal. if an unknown compound undergoes oxidation during the chromic acid test, which functional group is present? what color change should you observe in the test tube for confirmation Given that events A and B are independent with P(A)=0.64P(A)=0.64 and P(A and B)=0.48P(B)P(B), rounding to the nearest thousandth, if necessary. Elenas bowling league tracks the number of strikes that each player on her team gets. It also tracks the number of games bowled. The table shows the results. Name Games Strikes Elena 10 7 Jenna 7 8 Freya 3 6 Ginny 6 12 Carol 13 15 Katie 9 18 The graph shows the relationship between each players games and strikes. Determine which team members have the same ratio of games to strikes, and select their corresponding points on the graph. A primary credit cardholder's card has an APR of 24.99%. The current monthly balance, before interest, is $3,476.25. If the balance is paid off after one month of interest charges, how much morewill have been paid instead of using cash?O$868.71O $86.87O $724.80O $72.39 a system administrator opens a phishing email while using his privileged credentials is considered an insider threat? Match the following.1 . Philippisite of church founded after stoning of Stephen2 . Antiochfirst pastor of Antioch church3 . JudaizersGreek god4 . Barnabasworshiped by citizens of Antioch5 . Jupitersite of first European missionary activity6 . Mars HillRoman proconsul7 . Bar-jesusaccompanied Paul and Barnabas8 . Ashtarothfirst stop on first missionary journey9 . SilasPaul's companion on second journey10 . Macedoniaopposed the Gentiles11 . John Marksorcerer12 . Cyprusdiscussed circumcision of Gentiles13 . Jerusalem Conferencefirst European convert14 . Sergius Pauluscall came to Paul to go there15 . Lydialocated in Athens How do living things use matter such as carbon, nitrogen, phosphorus and water? help me please deadline tomorrow please The function f(x) = -x + 2 can be formed byshifting the function y = -2/3x in which way?A. vertical shift up 2B. reflection over the x-axisC. vertical shift down 2D. horizontal shift to the left 2Please Show the Work & thank u Will give brainliest