Assign courseStudent's name with Smith, age with 20, and ID with 9999. Use the print member function and a separate cout statement to output courseStudents's data. End with a newline. Sample output from the given program:
#include
#include
using namespace std;
class PersonData {
public:
void SetName(string userName) {
lastName = userName;
};
void SetAge(int numYears) {
ageYears = numYears;
};
// Other parts omitted
void PrintAll() {
cout << "Name: " << lastName;
cout << ", Age: " << ageYears;
};
private:
int ageYears;
string lastName;
};
class StudentData: public PersonData {
public:
void SetID(int studentId) {
idNum = studentId;
};
int GetID() {
return idNum;
};
private:
int idNum;
};
int main() {
StudentData courseStudent;
/* Your solution goes here */
return 0;
}

Answers

Answer 1

Answer:

Replace /* Your solution goes here */

with the following:

courseStudent.SetName("Smith");

courseStudent.SetAge(20);

courseStudent.SetID(9999);

courseStudent.PrintAll();

cout <<courseStudent.GetID();

Explanation:

From the given code segment, we have the following methods defined under the StudentData class;

SetName -> It receives name from the main

SetAge -> It receives age from the main

SetID --> It receives ID from the main and passes it to GetID method

printID --> Prints all the required output.

So, we have:

Pass name to setName

courseStudent.SetName("Smith");

Pass age to setAge

courseStudent.SetAge(20);

Pass ID to setID

courseStudent.SetID(9999);

Print all necessary outputs

courseStudent.PrintAll();

Manually print the student ID

cout <<courseStudent.GetID();


Related Questions

The manager of the Super Supermarket would like to be able to compute the unit price for products sold there. To do this, the program should input the name and price of an item per pound and its weight in pounds and ounces. Then it should determine and display the unit price (the price per ounce) of that item and the total cost of the amount purchased. You will need the following variables: ItemName Pounds Ounces PoundPrice TotalPrice UnitPriceYou will need the following formulas: UnitPrice = PoundPrice/16 TotalPrice = PoundPrice * (Pounds + Ounces/16)

Answers

Answer:

The program in Python is as follows:

name = input("Name of item: ")

PoundPrice = int(input("Pound Price: "))

Pounds = int(input("Weight (pounds): "))

Ounces = int(input("Weight (ounce): "))

UnitPrice = PoundPrice/16

TotalPrice = PoundPrice * (Pounds + Ounces/16)

print("Unit Price:",UnitPrice)

print("Total Price:",TotalPrice)

Explanation:

This gets the name of the item

name = input("Name of item: ")

This gets the pound price

PoundPrice = int(input("Pound Price: "))

This gets the weight in pounds

Pounds = int(input("Weight (pounds): "))

This gets the weight in ounces

Ounces = int(input("Weight (ounce): "))

This calculates the unit price

UnitPrice = PoundPrice/16

This calculates the total price

TotalPrice = PoundPrice * (Pounds + Ounces/16)

This prints the unit price

print("Unit Price:",UnitPrice)

This prints the total price

print("Total Price:",TotalPrice)

Complete the implementation of the following methods:__init__hasNext()next()getFirstToken()getNextToken()nextChar()skipWhiteSpace()getInteger()

Answers

From method names, I am compelled to believe you are creating some sort of a Lexer object. Generally you implement Lexer with stratified design. First consumption of characters, then tokens (made out of characters), then optionally constructs made out of tokens.

Hope this helps.

write a script to check command arguments. Display the argument one by one (use a for loop). If there is no argument provided, remind users about the mistake.

Answers

Answer and Explanation:

Using Javascript programming language, to write this script we define a function that checks for empty variables with if...else statements and then uses a for loop to loop through all arguments passed to the function's parameters and print them out to the console.

function Check_Arguments(a,b,c){

var ourArguments= [];

if(a){

ourArguments.push(a);}

else( console.log("no argument for a"); )

if(b){

ourArguments.push(b);}

else( console.log("no argument for b"); )

if(c){

ourArguments.push(c);}

else( console.log("no argument for c"); )

for(var i=0; i<ourArguments.length; i++){

Console.log(ourArguments[i]);

}

}

___________ colors come forward and command attention. ______________ colors recede away from our eyes and tend to fall into the background of a design.

Answers

Answer:

"Warm; Cool/receding" is the correct answer.

Explanation:

The color temperature would be referred to as summer and winter upon that color wheel, the hottest becoming red/orange as well as the most cooler always being bluish or greenish.A terminology to define the warmth of the color is termed as Warm colors. Warm hues are prominent as well as lively just like reds, oranges, etc.

Thus the above is the right answer.

A small company with 100 computers has hired you to install a local area network. All fo the users perform functions like email, browsing and Office software. In addition, 25 of them also do a large number of client/server requests into a database system. Which local area network operating system would you recommend?

Answers

Answer:

Based on the requirements indicated in the question above, the best Local Area Network (LAN) operating system that can be used is

Windows 7 , 8.1 or Windows 10. This is because they all are configured to handle extensive LAN activity and can connect over 200 users.

Explanation:  

Generally speaking, Windows 10 packs more improvement over the previous windows.

Cheers

1. Write the CSS for an id with the following characteristics: fixed position, light grey background color, bold font weight, and 10 pixels of padding

Answers

Answer:

#element

{

position: fixed;

background-color: RGBA(211, 211, 211, 1);

font-weight: bold;

padding: 10px;  

}

When a database stores the majority of data in RAM rather than in hard disks, it is referred to as a(n) _____ database.

Answers

Answer:

in-memory.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

In this context, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

Hence, a database management system (DBMS) is a system that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

Radom Access Memory (RAM) can be defined as the main memory of a computer system which allow users to store commands and data temporarily.

Generally, the Radom Access Memory (RAM) is a volatile memory and as such can only retain data temporarily.

All software applications temporarily stores and retrieves data from a Radom Access Memory (RAM) in computer, this is to ensure that informations are quickly accessible, therefore it supports read and write of files.

Generally, when a database stores the majority of data in random access memory (RAM) rather than in hard disks, it is referred to as an in-memory database (IMDB).

An in-memory database (IMDB) is designed to primarily to store data in the main memory of a computer system rather than on a hard-disk drive, so as to enhance a quicker response time for the database management system (DBMS).

vacuum tubes produced a large amount of

Answers

Answer: suck

Explanation:

sucktion    

Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Then the output is:1000 500 250Note: In Python 3, integer division discards fractions. Ex: 6 // 4 is 1 (the 0.5 is discarded).LAB ACTIVITY2.29.1: LAB: Divide by x0 / 10main.pyLoad default template...12''' Type your code here. '''

Answers

Answer:

Following are the code to the given question:

user_num = int(input())#defining a variable user_num that takes input from user-end

x = int(input())#defining a variable x that takes input from user-end

for j in range(3):#defining for loop that divides the value three times

   user_num = user_num // x#dividing the value and store integer part

   print(user_num)#print value

Output:

2000

2

1000

500

250

Explanation:

In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.

In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.  

How can I pass the variable argument list passed to one function to another function.

Answers

Answer:

Explanation:

#include <stdarg.h>  

main()  

{  

display("Hello", 4, 12, 13, 14, 44);  

}  

display(char *s,...)  

{  

va_list ptr;  

va_start(ptr, s);  

show(s,ptr);  

}  

show(char *t, va_list ptr1)  

{  

int a, n, i;  

a=va_arg(ptr1, int);  

for(i=0; i<a; i++)  

 {  

n=va_arg(ptr1, int);  

printf("\n%d", n);  

}  

}

Fred is a 29 year old golfer, who has been playing for 4 years. He is a 12 handicap. He is considering the Srixon ZX5 or the Mavrik Pro. Talk through major considerations and provide a recommendation that would be well suited for him. Include explanations about forged vs cast features, the look of the club, and overall feel.

Answers

Answer:

oh nice yes good fine I like it

Write a program that uses a stack to test input strings to determine whether they are palindromes. A palindrome is a sequence of characters that reads the same as the sequence in reverse; for example, noon.

Answers

Answer:

Here the code is given as follows,

Explanation:

def isPalindrome(x):

   stack = []

   #for strings with even length

   if len(x)%2==0:

       for i in range(0,len(x)):

           if i<int(len(x)/2):

               stack.append(x[i])

           elif stack.pop()!=x[i]:

               return False

       if len(stack)>0:

           return false

       return True

   #for strings with odd length    

   else:

       for i in range(0,len(x)):

           if i==int(len(x)/2):

               continue

           elif i<int(len(x)/2):

               stack.append(x[i])

           elif stack.pop()!=x[i]:

               return False

       if len(stack)>0:

           return false

       return True  

def main():  

   while True:  

       string = input("Enter a string or Return to quit: ")  

       if string == "":  

           break  

       elif isPalindrome(string):  

           print("It's a palindrome")  

       else:  

           print("It's not a palindrome")  

if __name__ == '__main__':  

   main()

write an algorithm for finding the perimeter of a rectangle

Answers

A formula could be 2a+2b

The conversion rate would be the highest for keyword searches classified as Group of answer choices buyers grazers researchers browsers

Answers

Answer:

buyers

Explanation:

Search engine optimization (SEO) can be defined as a strategic process which typically involves improving and maximizing the quantity and quality of the number of visitors (website traffics) to a particular website by making it appear topmost among the list of results from a search engine such as Goo-gle, Bing, Yah-oo etc.

This ultimately implies that, search engine optimization (SEO) helps individuals and business firms to maximize the amount of traffic generated by their website i.e strategically placing their website at the top of the results returned by a search engine through the use of algorithms, keywords and phrases, hierarchy, website updates etc.

Hence, search engine optimization (SEO) is focused on improving the ranking in user searches by simply increasing the probability (chances) of a specific website emerging at the top of a web search.

Typically, this is achieved through the proper use of descriptive page titles and heading tags with appropriate keywords.

Generally, the conversion rate is mainly designed to be the highest for keyword searches classified as buyers because they're the main source of revenue for a business and by extension profits.

Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstation they can compromise. You know that a workstation can be used as a pivot point to gain access to more sensitive systems. Which of the following is the most important aspect of maintaining network security against this type of attack?
A. Network segmentation.B. Identifying a network baseline.C. Documenting all network assets in your organization.D. Identifying inherent vulnerabilities.E. User education and training.

Answers

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked while working on the workstation and no networks could be compromised. Thus, option E is the correct answer.

Sophia is putting together a training manual for her new batch of employees.Which of the following features can she use to add a document title at the top of each page?
A) Heading style
B) Page margin
C) References
D) Header and Footer

Answers

Answer:

A heading style to add a document title

The feature can she use to add a document title at the top of each page is - Heading style. Therefore option A is the correct resposne.

What are Header and Footer?

A footer is a text that is positioned at the bottom of a page, whereas a header is text that is positioned at the top of a page. Usually, details about the document, such as the title, chapter heading, page numbers, and creation date, are inserted in these spaces.

A piece of the document that appears in the top margin is called the header, while a section that appears in the bottom margin is called the footer. Longer papers may be kept structured and made simpler to read by including more information in the headers and footers, such as page numbers, dates, author names, and footnotes. Each page of the paper will have the header or footer text you input.

To read more about Header and Footer, refer to - https://brainly.com/question/20998839

#SPJ2

g 1-4 Which piece of network hardware breaks a network up into separate collision domains within a single broadcast domain

Answers

Answer:

A switch

Explanation:

A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings. Some of the network devices or equipments used in a local area network (LAN) includes an access point, personal computers, a hub, a router, printer, a switch, etc.

In computer networking, a switch is a network hardware (device) that breaks up a network into separate collision domains within a single broadcast domain. Thus, it's commonly configured with virtual local area network (VLAN) to break up and interconnect multiple networks.

Write a method printShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline and decare/use loop variable. Example output for numCycles = 2:
1: Lather and rinse.
2: Lather and rinse.
Done.
import java.util.Scanner; 3 public class ShampooBottle 4 5 Your solution goes here / 7 public static void main (String [] args) ShampooBottle trialSize - new ShampooBottle); trialsize.printShampooInstructions (2) 10 Run View your last submission Your solution goes here / public void printShampooInstructions (int numCycles) f if (numCycles 1) System.out.printin("Too few.") else if (numCycles4) System.out.printin("Too many.") else System.out.println("Done."); for (int i = 1; i (z numCycles ; ++i){ System.out . printin (? + ": Lather and rinse.");

Answers

Answer:

if (numCycles < 1){

        System.out.println("Too few.");

     }

     else if (numCycles > 4){

        System.out.println("Too many.");

        }    

  else{

     for(int i = 1; i <= numCycles; i++)

  {

     System.out.println(i + ": Lather and rinse.");

  }

     System.out.println("Done.");

  }

 

Explanation:

application of printer​

Answers

Answer:

In addition, a few modern printers can directly interface to electronic media such as memory cards, or to image capture devices such as digital cameras, scanners; some printers are combined with a scanners and/or fax machines in a single unit, and can function as photocopiers.

How would you type the word floor

Answers

Answer:

f l o o r

Explanation:

List safety conditions when downloading shareware, free free where, or public domain software

Answers

Answer:

Explanation:

Freeware and shareware programs are softwares which are either free of charge or consist of a free version for a certain trial period. These programs pose a threat of habouring malware or viruses which could damage one's computer and important files and programs. Therefore, it is imperative that carefulness is maintained when trying to get these softwares.

Some of the necessary safety conditions that should be taken include;

1) Appropriate research about the software including taking more about the vendors and reviews.

2.) Once, a healthy review has been identified ; the download can begin with the Downloader ensuring that the download is from the recommended site.

3) Prior to installation the software should be scanned with an active anti-virus program to determine if there is possibility that a virus has creeped in.

4.) Some softwares may require that computer anti-virus be turned off during installation, this is not always a good idea as this act leaves the system vulnerable a d badly exposed.

9.19 LAB: Sort an array Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is:

Answers

Answer:

i hope you understand

mark me brainlist

Explanation:

Explanation:

#include <iostream>

#include <vector>

using namespace std;

void vector_sort(vector<int> &vec) {

int i, j, temp;

for (i = 0; i < vec.size(); ++i) {

for (j = 0; j < vec.size() - 1; ++j) {

if (vec[j] > vec[j + 1]) {

temp = vec[j];

vec[j] = vec[j + 1];

vec[j + 1] = temp;

}

}

}

}

int main() {

int size, n;

vector<int> v;

cin >> size;

for (int i = 0; i < size; ++i) {

cin >> n;

v.push_back(n);

}

vector_sort(v);

for (int i = 0; i < size; ++i) {

cout << v[i] << " ";

}

cout << endl;

return 0;

}

CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False

Answers

this is in fact false to my knowledge

To connect several computers together, one generally needs to be running a(n) ____ operating system
a. Network
b. Stand-alone
c. Embedded
d. Internet

Answers

Answer. Network

Explanation:

what is an RTF file?

Answers

Answer:

The Rich Text Format is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products.

The DevOps team is requesting read/write access to a storage bucket in the public cloud that is located in a backup region. What kind of services are they requesting

Answers

Answer:

Authorization

Explanation:

The kind of service that they are requesting is known as Authorization. This is basically when a user, such as the DevOps team in this scenario, is requesting permission to access a certain service or function that is locked. In this scenario, the services being requested are the read/write access which would allow the DevOps team to manipulate the data in the storage bucket. This is usually locked because the data is sensitive and innapropriate changes can cause many errors in the system. Therefore, authorization is needed to make sure that only specific users have access.

A recursive method may call other methods, including calling itself. A recursive method has:
1. a base case -- a case that returns a value or exits from a method without performing a recursive call.
2. a recursive case -- calling the method again with a smaller case..
Study the recursive method given below.
For example, this call recursiveMethod (5); returns 15:
public static int recursiveMethod (int num) (
if (num == 0)
return 1;
else {
if (numX2!=0)
return num * recursiveMethod (num -1);
else
return recursiveMethod (num-1);
}
}
1 What is the base case?
2. What does the following statement check?
3. What does the method do?

Answers

Answer:

Hence the answer is given as follows,

Explanation:

Base Case:-  

If (num == 0) //This is the base case for the given recursive method  

return 1;  

If(num % 2!=0) checks whether num is odd.  

The above condition is true for all odd numbers and false for even numbers.  

if the remainder is not equal to zero when we divide the number with 2 then it is odd.  

The method:-  

The above recursive method calculates the product of odd numbers up to the given range(that is num)  

For num=5   => 15(5*3*1).  

For num=7   => 105(7*5*3*1).  

For num=10 => 945(9*7*5*3*1).

If we have a book object but we do not give it a "subtitle" property, the following code will return undefined. bar len = book.subtitle.length;
a) true
b) false

Answers

Answer:

The answer is "Option a"

Explanation:

In the given question, this statement is true because in this bar len as a reference is declared that creates a book class object that calls the subtitle length method, that's why it is true.

Write three statements to print the first three elements of vector runTimes. Follow each with a newline. Ex: If runTimes = {800, 775, 790, 805, 808}, print: 800 775 790

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

int runTimes[] = {800, 775, 790, 805, 808};//defining array of integer

for(int x=0;x<3;x++)//defining for loop to print three element of array value

{

printf("%d\n",runTimes[x]);//print array value  

}

return 0;

}

Output:

Please find the attached file.

Explanation:

In this code, an array integer "runTimes" is declared that holds the given array values, and in the next step, a for loop is declared.

Inside the loop, an integer variable x is declared that starts from 0 and ends when its value less than 3 in which we print the first three array element values.

Which tools do you use for LinkedIn automation?

Answers

Explanation:

Automation tools allow applications, businesses, teams or organizations to automate their processes which could be deployment, execution, testing, validation and so on. Automation tools help increase the speed at which processes are being handled with the main aim of reducing human intervention.

Linkedln automation tools are designed to help automate certain processes in Linkedln such as sending broadcast messages, connection requests, page following and other processes with less or no human or manual efforts. Some of these automation tools include;

i. Sales navigator for finding right prospects thereby helping to build and establish trusting relationships with these prospects.

ii. Crystal for providing insights and information about a specified Linkedln profile.

iii. Dripify used by managers for quick onboarding of new team members, assignment of roles and rights and even management of subscription plans.  

Answer:

Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.  

Some other LinkedIn automation tools are;  

   Expandi      Meet Alfred      Phantombuster      WeConnect      LinkedIn Helper  

Hope this helps!

Other Questions
What is the period? Blank seconds. Someone please help me with this algebra problem A bullet with mass 5.35 g is fired horizontally into a 2.174-kg block attached to a horizontal spring. The spring has a constant 6.17 102 N/m and reaches a maximum compression of 6.34 cm. (a) Find the initial speed of the bullet-block system.(b) Find the speed of the bullet. Reliability is how long an item or system will perform its function before it breaks. Good reliability will ______________________. Decrease logistics support requirements Increase life cycle sustainment costs Decrease system readiness Increase manpower waste Please helpppppppp (sorry Need to get the word limit in) Choose the correct answer from each drop-down menu. How does Dickinson use syntax to develop the theme and mood?Hopeby Emily DickinsonHope is the thing with feathersThat perches in the soul,And sings the tune without the words,And never stops at all,And sweetest in the gale is heard;And sore must be the stormThat could abash the little birdThat kept so many warm.I've heard it in the chillest land,And on the strangest sea;Yet, never, in extremity,It asked a crumb of me.Dickinson ____ in order to ____1st blank options:Places the subject in the middle of the poemConcludes with an independent clauseUses balanced structure2nd blank options:highlight the difficulty of remaining hopefulemphasizes hope requires little of othersstress the sense of loss without hope A skydiver jumps from an airplane and accelerates toward the ground. His velocity can be modeled by the functionv(t) = 1000t/5t+8, where v (t) is the velocity in feet per second, and t represents time in seconds. Due to air resistance, there isa limiting velocity the skydiver will not exceed, called the "terminal velocity". At terminal velocity, the velocity does notcontinue to increase. What is the terminal velocity? Justify your answer. The U.S. average for state and local taxes for a family of four is $4172. A random sample of 20 families in a northeastern state indicates that they paid an annual amount of $4560 with a standard deviation of $1590. At = 0.05, is there sufficient evidence to conclude that they pay more than the national average of $4172? In "Better Wait Till Martin Comes," when the cats repeatedly pick up red hot coals,it proves that the cats are ordinary and will not harm John.it distracts the reader from worrying about Martins arrival.it builds suspense by showing that the cats are fearless.it calms the reader by repeating a familiar action. the length of each side of a nonagon is 3.25cm the perimeter of the nonagon is?a,12.25b,29.25mc,29.25d,none Cause-and effect appealsCompare-and contrast appealsInductive reasoning appealsDeductive reasoning appealsDefinition AppealsEmotional appeals URGENT NEED HELP NOW ITS A TEST You know different types of networks. If two computing station high speed network link for proper operation which of the following network type should be considered as a first priority?MANWANWLANLANAll of these What are the slope and the y-intercept of the linear function that is represented by the graph? Dr. Winston Lewiss patient, Annette Samuels, has come into the Inner City Health Care Clinic complaining of lower abdominal cramps and diarrhea. After discussion of her symptoms and a brief examination, Dr. Lewiss clinical diagnosis is an intestinal parasite infection. She asks Gwen Carr, CMA (AAMA), to obtain a stool sample from the patient. The sample will be sent to an outside independent lab to see if the parasite or its eggs can be visualized. This is called an ova and parasite test or O&P. Gwen is sensitive to Ms. Samuelss level of understanding as she gives her specific instructions on how to obtain the needed sample. She asks Ms. Samuels if she has questions and she has Annette repeat the instructions to be sure she understands them. When Ms. Samuels returns with the specimen, Gwen immediately labels it, and follows infection control protocol as she places it into a biohazard transport bag, then completes a lab requisition for the O&P test. Gwen reassures Ms. Samuels that the culture will take 24 to 48 hours, and responds honestly and diplomatically to Ms. Samuelss needs, assuring her that the test results will accurately determine her best treatment. Gwen tells Ms. Samuels that she will contact her the next day when the initial report is received. Answer the following questions:Can the O&P be completed in the office? Why or why not?Is there a specific time of day the O&P should be completed?What are the directions you as the MA would give to Ms. Samuels? 5 tons of sand cost $7,200.00. What is the price per pound? Abc similar to def the area of abc is 45cm and the area of triangle def is 20cm one side of triangle abc is 3.6cm the the length of corresponding side of triangle def is Help me to write introductory paragraph on the question "coronavirus vaccines" What is the difference between an orbit in the Bohr model of the hydrogen atom and an orbital in the quantum mechanical model Suppose that the natural rate of unemployment in a particular year is 4 percent and the actual unemployment rate is 13 percent. Instructions: Enter your answers as a whole number. a. Use Okun's law to determine the size of the GDP gap in percentage-point terms. percent b. If potential GDP is $500 billion in that year, how much output is forgone because of cyclical unemployment? $ billion need help w question in this pic thanks!!