A process needs 103 KB of memory in order to run. If the system on which it is to run uses paging with 2 KB pages, how many frames in memory are needed

Answers

Answer 1

Answer: 52

Explanation:

Following the information given in the question, we are informed that a process needs 103 KB of memory in order to run and that the system on which it is to run uses paging with 2KB pages, then the number of frames in memory that are needed will be:

= 103/2

= 51.5

= 52 approximately

Therefore, 52 frames in memory are needed.


Related Questions

Write a program that launches 1,000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect. Submit the code of the program and your comments on the execution of the program.

Answers

Answer:

Following are the code to the given question:

import java.util.concurrent.*; //import package

public class Threads //defining a class Threads

{

private Integer s = new Integer(0);//defining Integer class object

public synchronized static void main(String[] args)//defining main method  

{

Threads t = new Threads();//defining threads class object

System.out.println("What is sum ?" + t.s);//print value with message

}

Threads()//defining default constructor

{

ExecutorService exe = Executors.newFixedThreadPool(1000);//defining ExecutorService class object

System.out.println("With SYNCHRONIZATION........");//print message

for(int i = 1; i <= 1000; i++)//defining a for loop

{

exe.execute(new SumTask2());//calling execute method

System.out.println("At Thread " + i +" Sum= " + s + " , ");//print message with value

}

exe.shutdown();//calling shutdown method

while(!exe.isTerminated())//defining while loop that calls isTerminated method

{

}

}

class SumTask2 implements Runnable//calling SumTask2 that inherits Runnable class

{

public synchronized void run()//defining method run

{

int value = s.intValue() + 1;//defining variable value that calls intvalue which is increment by 1

s = new Integer(value);//use s to hold value

}

}

}

Output:

Please find the attached file.

Explanation:

In this code, a Threads class is defined in which an integer class object and the main method is declared that creates the Threads class object and calls its values.

Outside the method, the default constructor is declared that creates the "ExecutorService" and prints its message, and use a for loop that calls execute method which prints its value with the message.

In the class, a while loop is declared that calls "isTerminated" method, and outside the class "SumTask2" that inherits Runnable class and defined the run method and define a variable "value" that calls "intvalue" method which is increment by 1 and define s variable that holds method value.

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance. True False

Answers

Answer:

True

Explanation:

Spending plans serve as a tool to analyze program execution, an indicator of potential problems, and a predictor of future program performance.

Data representation and interactivity are important aspects of data visualization.

a. True
b. False

Answers

Answer:

a. True

Explanation:

Data visualization are defined as the representation of the data and information in graphical way. The data visualization tool uses charts, diagrams, graphs, maps, etc. to represent and visualized the information and understand the patter or trend in the data.

It is an effective way to interact with the user and works likes a form of a visual art.

Thus interactivity and data representations are the two important aspect of the data visualization.

Hence, the answer is true.

The__________is an HTML tag that provides information on the keywords that represent the contents of a Web page.

Answers

Answer:

Meta tag

Explanation:

Assume that an O(log2N) algorithm runs for 10 milliseconds when the input size (N) is 32. What input size makes the algorithm run for 14 milliseconds

Answers

Answer:

An input size of N = 128 makes the algorithm run for 14 milliseconds

Explanation:

O(log2N)

This means that the running time for an algorithm of length N is given by:

[tex]F(N) = c\log_{2}{N}[/tex]

In which C is a constant.

Runs for 10 milliseconds when the input size (N) is 32.

This means that [tex]F(32) = 10[/tex]

So

[tex]F(N) = c\log_{2}{N}[/tex]

[tex]10 = c\log_{2}{32}[/tex]

Since [tex]2^5 = 32, \log_{2}{32} = 5[/tex]

Then

[tex]5c = 10[/tex]

[tex]c = \frac{10}{5}[/tex]

[tex]c = 2[/tex]

Thus:

[tex]F(N) = 2\log_{2}{N}[/tex]

What input size makes the algorithm run for 14 milliseconds

N for which [tex]F(N) = 14[/tex]. So

[tex]F(N) = 2\log_{2}{N}[/tex]

[tex]14 = 2\log_{2}{N}[/tex]

[tex]\log_{2}{N} = 7[/tex]

[tex]2^{\log_{2}{N}} = 2^7[/tex]

[tex]N = 128[/tex]

An input size of N = 128 makes the algorithm run for 14 milliseconds

let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5’- 6.4”. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1.

Answers

Answer:

Humildade

Ser justo (Fair Play)

Vencer independente

If the signal is going through a 2 MHz Bandwidth Channel, what will be the maximum bit rate that can be achieved in this channel? What will be the appropriate signal level?

Answers

Answer:

caca

Explanation:

That's the code that's was already provided with the assignment
// Program takes a hot dog order
// And determines price
using System;
using static System.Console;
class DebugFour1
{
static void Main()
{
const double BASIC_DOG_PRICE = 2.00;
const double CHILI_PRICE = 0.69;
const double CHEESE_PRICE = 0.49;
String wantChili, wantCheese;
double price;
Write("Do you want chili on your dog? ");
wantChilli = ReadLine();
Write("Do you want cheese on your dog? ");
wantCheese = ReadLine();
if(wantChili = "Y")
if(wantCheese = "Y")
price == BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;
else
price == BASIC_DOG_PRICE + CHILI_PRICE;
else
if(wantCheese = "Y")
price = BASIC_DOG_PRICE;
else
price == BASIC_DOG_PRICE;
WriteLine("Your total is {0}", price.ToString("C"));
}
}

Answers

Answer:

Code:-

// Program takes a hot dog order

// And determines price  

using System;

using static System.Console;  

class DebugFour1

{

   static void Main()

   {

       const double BASIC_DOG_PRICE = 2.00;

       const double CHILI_PRICE = 0.69;

       const double CHEESE_PRICE = 0.49;

       String wantChili, wantCheese;

       double price;

       Write("Do you want chili on your dog? ");

       wantChili = ReadLine();

       Write("Do you want cheese on your dog? ");

       wantCheese = ReadLine();

       if (wantChili == "Y")

       {

           if (wantCheese == "Y")

               price = BASIC_DOG_PRICE + CHILI_PRICE + CHEESE_PRICE;

           else

               price = BASIC_DOG_PRICE + CHILI_PRICE;

       }

       else

       {

           if (wantCheese == "Y")

               price = BASIC_DOG_PRICE + CHEESE_PRICE;

           else

               price = BASIC_DOG_PRICE;

       }

       WriteLine("Your total is {0}", price.ToString("C"));

   }

}

Being the Sales Manager of a company you have to hire more salesperson for the company to expand the sales territory. Kindly suggest an effective Recruitment and Selection Process to HR by explaining the all the stages in detail.

Answers

Answer:

1. Identification of a vacancy and development of the job description.

2. Recruitment planning

3. Advertising

4. Assessment and Interview of applicants

5. Selection and Appointment of candidates

6. Onboarding

Explanation:

The Recruitment process refers to all the stages in the planning, assessment, and absorption of candidates in an organization. The stages involved include;

1. Identification of a vacancy and development of the job description: This is the stage where an obvious need in the organization is identified and the duties of the job requirement are stipulated.

2. Recruitment planning: This is the stage where the HR team comes together to discuss the specific ways they can attract qualified candidates for the job.

3. Advertising: The HR team at this point seeks out job sites, newspapers, and other platforms that will make the opportunities accessible to applicants.

4. Assessment and Interview of applicants: Assessments are conducted to gauge the candidates' knowledge and thinking abilities. This will provide insight into their suitability for the job.

5. Selection and Appointment of candidates: Successful candidates are appointed to their respective positions. A letter of appointment is given.

6. Onboarding: Candidates are trained and guided as to the best ways of discharging their duties.

We have removed
A
balls from a box that contained
N
balls and then put
B
new balls into that box. How many balls does the box contain now?
Constraints
All values in input are integers.
Input
Input is given from Standard Input in the following format: n a b
Output
Print the answer as an integer.

Answers

There were [tex]N[/tex] balls but we took [tex]A[/tex] balls out, so there are now [tex]N-A[/tex] balls. We add [tex]B[/tex] balls and now we have [tex]N-A+B[/tex] balls.

The program that computes this (I will use python as language has not been specified is the following):

n, a, b = int(input()), int(input()), int(input())

print(f"There are {n-a+b} balls in the box")

# Hope this helps

The valid call to the function installApplication is

void main(  )
{
 // call the function installApplication
}

void installApplication(char appInitial, int appVersion)
{
  // rest of function not important
}
Select one:

A.
int x =installApplication(‘A’, 1);

B.
installApplication(‘A’, 1);

C.
int x= installApplication(  );

D.
installApplication(2 , 1);

Answers

Answer:

B. installApplication(‘A’, 1);

Explanation:

Given

The above code segment

Required

The correct call to installApplication

The function installApplication is declared as void, meaning that it is not expected to return anything.

Also, it receives a character and an integer argument.

So, the call to this function must include a character and an integer argument, in that order.

Option D is incorrect because both arguments are integer

Option C is incorrect because it passes no argument to the function.

Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).

Option B is correct

Coding 5 - Classes The Item class is defined for you. See the bottom of the file to see how we will run the code. Define a class ShoppingCart which supports the following functions: add_item(), get_total_price(), and print_summary(). Write code only where the three TODO's are. Below is the expected output: Added 2 Pizza(s) to Cart, at $13.12 each. Added 1 Soap(s) to Cart, at $2.25 each. Added 5 Cookie(s) to Cart, at $3.77 each.

Answers

Answer:

Explanation:

The following is written in Java. It creates the ShoppingCart class as requested and implements the requested methods. A test class has been added to the main method and the output is highlighted in red down below.

import java.util.ArrayList;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       ShoppingCart newCart = new ShoppingCart();

       newCart.add_item();

       newCart.add_item();

       newCart.add_item();

       newCart.print_summary();

   }

}

class ShoppingCart {

   Scanner in = new Scanner(System.in);

   ArrayList<String> items = new ArrayList<>();

   ArrayList<Integer> amount = new ArrayList<>();

   ArrayList<Double> cost = new ArrayList<>();

   public ShoppingCart() {

   }

   public void add_item() {

       System.out.println("Enter Item:");

       this.items.add(this.in.next());

       System.out.println("Enter Item Amount:");

       this.amount.add(this.in.nextInt());

       System.out.println("Enter Cost Per Item:");

       this.cost.add(this.in.nextDouble());

   }

   public void get_total_price() {

       double total = 0;

       for (double price: cost) {

           total += price;

       }

       System.out.println("Total Cost: $" + total);

   }

   public void print_summary() {

       for (int i = 0; i < items.size(); i++) {

           System.out.println(amount.get(i) + " " + items.get(i) + " at " + cost.get(i) + " each.");

       }

       get_total_price();

   }

}

Write a function that takes six arguments of floating type (four input arguments and two output arguments). This function will calculate sum and average of the input arguments and storethem in output arguments respectively. Take input arguments from the user in the main function.

Answers

Answer:

Answer:Functions in C+

The integer variable n is the input to the function and it is also called the parameter of the function. If a function is defined after the main() .....

Describe the operation of IPv6 Neighbor Discovery. ​

Answers

can you give me the link to an article about this so i may help?

Write a recursive method to form the sum of two positive integers a and b. Test your program by calling it from a main program that reads two integers from the keyboard and users your method to complete and print their sum, along with two numbers.

Answers

Answer:

see the code snippet below writing in Kotlin Language

Explanation:

fun main(args: Array<String>) {

   sumOfNumbers()

}

fun sumOfNumbers(): Int{

   var firstNum:Int

   var secondNum:Int

   println("Enter the value of first +ve Number")

   firstNum= Integer.valueOf(readLine())

   println("Enter the value of second +ve Number")

   secondNum= Integer.valueOf(readLine())

   var sum:Int= firstNum+secondNum

  println("The sum of $firstNum and $secondNum is $sum")

   return sum

}

Explain the following terms.
a) Explain Final keyword with example. b) Define Static and Instance variables

Answers

Answer:

A.

the final keyword is used to denote constants. It can be used with variables, methods, and classes. Once any entity (variable, method or class) is declared final , it can be assigned only once.

B.

Static variables are declared in the same place as instance variables, but with the keyword 'static' before the data type. While instance variables hold values that are associated with an individual object, static variables' values are associated with the class as a whole.

A user reports network resources can no longer be accessed. The PC reports a link but will only accept static IP addresses. The technician pings other devices on the subnet, but the PC displays the message Destination unreachable. Wh are MOST likley the causes of this issue?

Answers

Answer: is this a real question but I think it would be Ip address hope this helps :)))

Explanation:

In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark government bond?
a. Price
b. Price Impact
c. Bond Spread
d. Yield Curve

Answers

Answer:

c. Bond Spread

Explanation:

An interactive chart is used to show all the details in the chart and the user can extend or shrink the details that is presented in the charts by using the slider control.

The bond spread in an interactive is a chart that is used to compare and chart the current spread between the corporate bond as well as the benchmark government bond.

In Interactive Charting, the chart type that give room for charting the current spread between a corporate bond and a benchmark government bond is C:Bond Spread.

An interactive charts serves as a chart that give room to the user to carry out zooming actions as well as hovering a marker to get a tooltip and avenue to choose variable.

One of the notable type of this chart is Bond Spread, with this chart type, it is possible to charting the current spread that exist between a corporate bond as well as benchmark government bond.

Therefore, option C is correct because it allows charting of the current spread between a corporate bond.

Learn note about interactive charts at:

https://brainly.com/question/7040405

Which key should you press to leave the cell as it originally was?

Answers

Answer:

Backspace.

Explanation:

Cancel Button you should press to leave the cell as it originally was. Cancel Button you should press to leave the cell as it originally was. This answer has been confirmed as correct and helpful.

Backspace is press to leave the cell as it originally was.

What is Backspace key?

The Backspace key is situated in the top-right corner of the character keys part of the keyboard.

Backspace is replaced by a "delete" key on Apple computers, although it serves the same purpose.

There are no "backspace" keys on an Android or Apple iPhone smartphone or iPad tablet, but there is a key that serves the same purpose. Look for a key that resembles an arrow with a "X" or an arrow pointing left, as illustrated in the image.

Therefore, Backspace is press to leave the cell as it originally was.

To learn more about backspace, refer to the link:

https://brainly.com/question/29790869

#SPJ2

Which of the following financial functions can you use to calculate the payments to repay your loan

Answers

Answer:

PMT function. PMT, one of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. Use the Excel Formula Coach to figure out a monthly loan payment.

Explanation:


The part of the computer that provides access to the Internet is the

Answers

Answer:

MODEM

Explanation:

A(n) _____ is a network connection device that can build tables that identify addresses on each network.

Answers

Answer:

Dynamic Router

Explanation:

A dynamic router is a network connection device that can build tables that identify addresses on each network.

What is Dynamic network?

Dynamic networks are networks that vary over time; their vertices are often not binary and instead represent a probability for having a link between two nodes.

Statistical approaches or computer simulations are often necessary to explore how such networks evolve, adapt or respond to external intervention.

DNA statistical tools are generally optimized for large-scale networks and admit the analysis of multiple networks simultaneously in which, there are multiple types of nodes (multi-node) and multiple types of links (multi-plex).

Therefore, A dynamic router is a network connection device that can build tables that identify addresses on each network.

To learn more about dynamic router, refer to the link:

https://brainly.com/question/14285971

#SPJ6

What variable(s) is/are used in stack to keep track the position where a new item to be inserted or an item to be deleted from the stack

Answers

Answer:

Hence the answer is top and peek.

Explanation:

In a stack, we insert and delete an item from the top of the stack. So we use variables top, peek to stay track of the position.

The insertion operation is understood as push and deletion operation is understood as entering stack.

Hence the answer is top and peek.

Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender:_____.
A. Malicious code.
B. Hoaxes.
C. Spoofing.
D. Sniffer.

Answers

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

A coin is tossed repeatedly, and a payoff of 2n dollars is made, where n is the number of the toss on which the first Head appears. So TTH pays $8, TH pays $4 and H pays $2. Write a program to simulate playing the game 10 times. Display the result of the tosses and the payoff. At the end, display the average payoff for the games played. A typical run would be:

Answers

Answer:

Explanation:

The following code is written in Java. It creates a loop within a loop that plays the game 10 times. As soon as the inner loop tosses a Heads (represented by 1) the inner loop breaks and the cost of that game is printed to the screen. A test case has been made and the output is shown in the attached image below.

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       int count = 0;

       int loopCount = 0;

       while (loopCount < 10) {

           while (true) {

               Random rand = new Random();

               int coinFlip = rand.nextInt(2);

               count++;

               if (coinFlip == 1) {

                   System.out.println("Cost: $" + 2*count);

                   count = 0;

                   break;

               }

               loopCount++;

           }

       }

   }

}

Java programming
*11.13 (Remove duplicates) Write a method that removes the duplicate elements from
an array list of integers using the following header:
public static void removeDuplicate(ArrayList list)
Write a test program that prompts the user to enter 10 integers to a list and displays
the distinct integers separated by exactly one space. Here is a sample run:
Enter ten integers: 34 5 3 5 6 4 33 2 2 4
The distinct integers are 34 5 3 6 4 33 2

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main {

public static void removeDuplicate(ArrayList<Integer> list){

 ArrayList<Integer> newList = new ArrayList<Integer>();

 for (int num : list) {

  if (!newList.contains(num)) {

   newList.add(num);  }  }

 for (int num : newList) {

     System.out.print(num+" ");  } }

public static void main(String args[]){

 Scanner input = new Scanner(System.in);

 ArrayList<Integer> list = new ArrayList<Integer>();

 System.out.print("Enter ten integers: ");

 for(int i = 0; i<10;i++){

     list.add(input.nextInt());  }

 System.out.print("The distinct integers are: ");

 removeDuplicate(list);

}}

Explanation:

This defines the removeDuplicate function

public static void removeDuplicate(ArrayList<Integer> list){

This creates a new array list

 ArrayList<Integer> newList = new ArrayList<Integer>();

This iterates through the original list

 for (int num : list) {

This checks if the new list contains an item of the original list

  if (!newList.contains(num)) {

If no, the item is added to the new list

   newList.add(num);  }  }

This iterates through the new list

 for (int num : newList) {

This prints every element of the new list (At this point, the duplicates have been removed)

     System.out.print(num+" ");  } }

The main (i.e. test case begins here)

public static void main(String args[]){

 Scanner input = new Scanner(System.in);

This declares the array list

 ArrayList<Integer> list = new ArrayList<Integer>();

This prompts the user for ten integers

 System.out.print("Enter ten integers: ");

The following loop gets input for the array list

 for(int i = 0; i<10;i++){

     list.add(input.nextInt());  }

This prints the output header

 System.out.print("The distinct integers are: ");

This calls the function to remove the duplicates

 removeDuplicate(list);

}}

Consider the following class in Java:

public class MountainBike extends Bicycle {
public int seatHeight;
public MountainBike(int startHeight,
int startCadence,
int startSpeed,
int startGear) {
super(startCadence, startSpeed, startGear);
seatHeight = startHeight;
}

public void setHeight(int newValue) {
seatHeight = newValue;
}
}
What is this trying to accomplish?

super(startCadence, startSpeed, startGear);

a. Four fields of the MountainBike class are defined: super, startCadence, startSpeed and startGear.
b. The constructor for the parent class is called.
c. A method of the MountainBike class named super is defined.
d. Three fields are defined for the MountainBike class as intances of the class named super.

Answers

Answer:

b. The constructor for the parent class is called.

Explanation:

In this case this specific piece of code is calling the constructor for the parent class. Since a MountainBike object is being created. This creation uses the MountainBike class constructor but since this is a subclass of the Bicycle class, the super() method is calling the parent class constructor and passing the variables startCadence, startSpeed, startGear to that constructor. The Bicycle constructor is the one being called by super() and it will handle what to do with the variables inputs being passed.

Transformative Software develops apps that help disabled people to complete everyday tasks. Its software projects are divided into phases in which progress takes place in one direction. The planning, delivery dates, and implementation of the software under development are emphasized. Which software development methodology is the company most likely using:_________.

Answers

Answer: Cascading

Explanation:

The software development methodology that the company is most likely using is Cascading.

Cascading model is a sequential design process, that is used in software development, whereby progress flows downward from the conception phase, initiation phase, till it gets to the maintenance phase.

For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.

Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD

Answers

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

Dynamic addressing: __________.
a. assigns a permanent network layer address to a client computer in a network
b. makes network management more complicated in dial-up networks
c. has only one standard, bootp
d. is always performed for servers only
e. can solve many updating headaches for network managers who have large, growing, changing networks

Answers

Explanation:

jwjajahabauiqjqjwjajjwwjnwaj

E. can solve many updating headaches for network managers who have large, growing, changing networks
Other Questions
Scenario 1:Genetic engineering can be used to create more productive strains of farm animals used for milk and meat production. By adding genes to an animals DNA, the animal can be made to be more resistant to common infections. This can reduce the need to administer large doses of antibiotics to the animals.Do you think that this type of genetic engineering should be pursued? Explain your answer. (5 points)What are some possible impacts (positive and negative) of this type of genetic engineering on individuals, society, and the environment? (5 points) Give an example of a colony that was set up for strategic reasons. Construct a frequency distribution and a relative frequency histogram for the accompanying data set using five classes. Which class has the greatest relative frequency and which has the least relative frequency?Complete the table below. Use the minimum data entry as the lower limit of the first class.Class Frequency, f Relative frequencyx-x x xx-x x xx-x x xx-x x xx-x x x sumf= X?(Type integers or decimals. Round to the nearest thousandth as needed.)DATA:Triglyceride levels of 26 patients (in milligrams per deciliter of blood)138 199 240 143 294 175 240 216 223180 138 266 161 175 402 172 459 147391 152 199 294 188 320 421 161 The heights (in inches) of a sample of eight mother/daughter pairs of subjects were measured. Using a spreadsheet with the paired mother/daughter heights, the linear correlation coefficient is found to be 0.693. Find the critical value, assuming a 0.05 significance level. Is there sufficient evidence to support the claim that there is a linear correlation between the heights of mothers and the heights of their daughters?A. Critical value = 0.666; there is not sufficient evidence to support the claim of a linear correlation between heights of mothers and heights of their daughters.B. Critical value = 0.707; there is sufficient evidence to support the claim of a linear correlation between heights of mothers and heights of their daughters.C. Critical value = 0.666; there is sufficient evidence to support the claim of a linear correlation between heights of mothers and heights of their daughters.D. Critical value = 0.707; there is not sufficient evidence to support the claim of a linear correlation between heights of mothers and heights of their daughters. Why Darwin is known as father of evolution? Discuss how evidences against Darwinism led to formulation of modern evolutionary theory. Interpret its postulates in your words with relevant examples. (10 marks) Due to erratic sales of its sole producta high-capacity battery for laptop computersPEM, Inc., has been experiencing financial difficulty for some time. The companys contribution format income statement for the most recent month is given below: Sales (12,800 units $20 per unit) $ 256,000 Variable expenses 153,600 Contribution margin 102,400 Fixed expenses 114,400 Net operating loss $ (12,000 ) Required: 1. Compute the companys CM ratio and its break-even point in unit sales and dollar sales. 2. The president believes that a $6,700 increase in the monthly advertising budget, combined with an intensified effort by the sales staff, will result in an $84,000 increase in monthly sales. If the president is right, what will be the increase (decrease) in the companys monthly net operating income? Apply the distributive property to create an equivalent expression.4(x - 2 + y) =4(x2+y)=4, left parenthesis, x, minus, 2, plus, y, right parenthesis, equals Drag the tiles to the correct boxes to complete the pairs. Not all tiles will be used.Match the systems of equations to their solutions. Can someone just check my answers please? Please let me know which questions are wrong. Thank you for your time. Please help answer all correctly whoever answers all/ mostly all correctly will get brainly!!!1). Where did Tutankhamen relocate the Egyptian capital?A) AlexandriaB) AkhenatonC) MemphisD) Thebes2). How did Ramses IIs leadership affect Egypts economy?A) The economy slowed down because of the pharaohs heavy taxes.B) The economy expanded through trade and the conquest of territory.C) The economy struggled because Ramses II would not protect trade routes.D) The economy boomed as Ramses II discovered new trade routes for Egypt.3). What was an effect of Queen Hatshepsuts expanded trade routes?A) Egypt gained access to new resources.B) The Egyptians were able to trade for tools.C) The Egyptians found it harder to acquire resources.D) The Egyptians were able to trade ivory to other countries.4). What was a priority of Queen Hatshepsuts reign?A) constructing new pyramidsB) reforming religious ideasC) strengthening Egypts armiesD) expanding Egypts empire5). Why was Queen Hatshepsuts tax policy significant?A) People no longer had to pay taxes on trade.B) New taxes decreased Egypts wealth and status.C) Egypt was one of the first civilizations to pay taxes.D) Queen Hatshepsut significantly lowered taxes.6). How did Tutankhamens religious reforms affect society?A) The military became more focused on religious practices.B) Temples were closed because they were not being used.C) Trade declined because he focused on religion and not the economy.D) The people were able to return to their former religious practices.7). What statement describes the building projects accomplished under Tutankhamen?A) He built new temples to honor the old gods.B) He repaired religious sites and built monuments.C) He introduced the obelisk to Egyptian construction.D) He built new trade routes and trading centers in Egypt.8). What was taxed under Queen Hatshepsuts reign?A) trade goodsB) trade routesC) temple admissionD) construction projects9). How did Ramses II use the military to improve the Egyptian Empire?A) He used the military to retake old Egyptian territory.B) He used the army to force Egyptians to worship Aten.C) He took over Hittite land that was new to the kingdom.D) He was able to conquer all other neighboring countries10). What was a monetary effect of Queen Hatshepsuts reign?A) Egypt gained vast wealth through trade.B) Egypt became indebted to other countries.C) Egypt won back wealthy lands from the Hittites.D) Egypt lost money through taxes paid to other nations. can anyone help me here asapp,, I am in this question for nearly an hour Amish people are known for simple living, plain dress, and resistance to adopt modern conveniences of the American people (such as microwaves, cars, and electricity). In this way of life, the people of the Amish communities share meanings, values, and ideas collectively. What type of social concept does this example demonstrate A revenue account is increased by debits. is decreased by credits. has a normal balance of a debit. is increased by credits. The Modern State, whether absolutist or constitutional, relied on modern science to achieve its goals. Social Contract Theory, epitomized by Thomas Hobbes and John Locke, provided rational and humanist justification for the use of power by the state. Modern science, already rational, became more humanist, increasingly embracing the use of technology to better human lives. Science also increasingly came under the control of the state, although some science promoters resisted. The Enlightenment, with its rational and humanistic focus, seemed to embrace the growing role of the state, but only when the state was reformed in significant ways to achieve progress for humans and natural rights. Why did the Enlightenment come to embody the concept of reform of the modern state? _____ is the best method to quit tobacco use.A) Being told to quitB) Slowly cutting downC) Going "cold turkey"D) Hypnotism Be sure to answer all parts.Calculate the molarity of each of the following solutions:(a) 28.5 g of ethanol (C2H5OH) in 4.50 x 102 mL of solutionM Mes(b) 21.6 g of sucrose (C12H22011) in 67.0 mL of solutionM(c) 6.65 g of sodium chloride (NaCl) in 96.2 mL of solutionM Which statement correctly describes the graph of ? TRUE OR FALSE. when an object changed direction without changing its speed, it is not accelerating What was the main purposes of African art in the early modern period? 48. What is the volume of the cuboid below? 3cm 2cm 2cm