how to add a fixed decimal value to an identifier using Delphi 10 coding?​

Answers

Answer 1

Answer:A declaration defines an identifier (such as the name of a function or variable) that ... This topic introduces the Delphi language character set, and describes the syntax for ... The Delphi language uses the Unicode character encoding for its character set, ... Integer and real constants can be represented in decimal notation as ...

Explanation:


Related Questions

What does Falstaff do to protect himself in battle? ​

Answers

bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark

what is your biggest takeaway on that subject?​

Answers

Hi. You have not informed the subject to which this question refers, which makes it impossible for your question to be answered. However, I will try to help you as best I can.

The only way to answer this question is to evaluate the media where the subject in question is being presented. Thus, you must understand this subject, whether reading a text about it or watching a video about it, the important thing is that you understand it and absorb all the teachings it is capable of transmitting.

In this case, you need to evaluate all these teachings which was the most important for you and which represented a very important lesson in your life. This lesson will be the biggest takeaway you've achieved with this subject.

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data backups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will automatically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Answers

Answer:

Acronis True Image is the one I would recommend out of these mentioned online backup services.

Explanation:

The evaluations and reviews of each of the online backup services are as follows:

a. iDrive

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 88% - very good

Features = 95% - excellent

Pricing = 85% - Very good

Because of its various features, pricing, and usability, IDrive reviews suggest that it is a very efficient online backup solution. However, there have been complaints concerning its speed and the fact that there are no monthly plans available.

b. Carbonite

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 87% - very good

Pricing = 85% - very good

File backup and restoration = 75% - good

Carbonite reviews reveal that it is simple to use and provides limitless backup for one device. The main drawback is that it has extremely poor backup speeds.

c. Acronis True Image

This is fast, simple and intuitive

It has complete control over the backup updates, including how and when they occur.

It is not expensive.

Acrnonis True image is a powerful backup storage service. It enables data and file backup and restoration from USB drives.

Many reviewers of Acrnonis True image have stated that they have had no issues with its service, that it is worth purchasing, and that there are no concerns.

d. Backblaze

For this, we have:

Speed = 75% - good

Security = 75% - good

Privacy = 70% - decent

Pricing = 100% - excellent

Support = 95% - excellent

Features = 65% - decent

File back-up and restoration = 70% - decent

Backblaze is one of the most popular internet backup services. This storage service, however, does not allow for ustomization.

Recommendation

Acronis True Image is the one I would recommend out of these mentioned online backup services. This is due to the fact that it delivers a large amount of accurate and high-quality data storage. It is quick, simple and intuitive, which is what most people care about. Furthermore, reviewers have stated that this service is quite effective and that there have been very few issues with it. The other services demonstrate that their services have flaws, such as lack of customization and slowness.

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. What are considered as secure network protocols?

Answers

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.


[tex](a + b) {2}[/tex]

Answers

Answer:

ab2

Explanation:

write a program to update the rate by increasing 20% from sequential data file "items.dat" that store item name.rate and quantity​

Answers

Answer:

your answer is in the pic

(◔‿◔)

。◕‿◕。

Given the value x=false ,y=5 and z=1 what will be the value of F=(4%2)+2*Y +6/2 +(z&&x)?

Answers

Answer:

F = 13

Explanation:

Given:

x = false

y = 5

z = 1

F = (4%2)+2*Y +6/2 +(z&&x)

We solve this arithmetic using the order of precedence:

i. Solve the brackets first

=> (4 % 2)

This means 4 modulus 2. This is the result of the remainder when 4 is divided by 2. Since there is no remainder when 4 is divided by 2, then

4 % 2 = 0

=> (z && x)

This means (1 && false). This is the result of using the AND operator. Remember that && means AND operator. This will return false (or 0) if one or both operands are false. It will return true (or 1) if both operands are true.

In this case since the right operand is a false, the result will be 0. i.e

(z && x) = (1 && false) = 0

ii. Solve either the multiplication or division next whichever one comes first.

=> 2 * y

This means the product of 2 and y ( = 5). This will give;

2 * y = 2 * 5 = 10

=> 6 / 2

This means the quotient of 6 and 2. This will give;

6 / 2 = 3

iii. Now solve the addition by first substituting the values calculated earlier back into F.

F = (4%2)+2*Y +6/2 +(z&&x)

F = 0 + 10 + 3 + 0

F = 13

Therefore, the value of F is 13

Ten examples of a compiler

Answers

Answer:

Compilers for AdaCompilers for ALGOL 60Compilers ALGOL 60 ALGOL 68ALGOL 60 ALGOL 68 Assemblers Compilers (Intel *86) Assembly.ALGOL 60 ALGOL 68 assemblers (Intel *86) assemblers (Motorola 68*) Assemblers.Compilers for ALGOL 60 Compilers for ALGOL 68 Assemblies (Motorola 68*) Assemblies (Intel *86) (Zilog Z80)Compilers ALGOL 60 Compilers for ALGOL 68 Intel *86 Assemblers Mounting machines (Motorola 68*) (Zilog Z80) Assemblers Assemblers (other)Compilers for ALGOL 60 Compilers for ALGOL 68 Assembled assemblers (Intel *86) (Motorola 68*) (Zilog Z80) Assemblers Assemblers (other) Compilers BASICCompilers for ALGOL 60 Compilers for ALGOL 68 Intel *86 Assembly Machines Motorola 68* Assemblers.  Assemblies (Zilog Z80) Assemblers Assemblers (other) Compilers of BASIC Interpreters from the Basic.ALGOL 60 compilers ALGOL 68 Intel Compilers *86 Motorola 68* Assemblers Assembly Machines. Meetings of the assembly members (Zilog Z80) (other) BASIC Interpreter compilers from the fundamental

Explanation:

Compiler – The compiler is the language processor, which reads the whole of your source software, and translates it into an equivalent program in the machine language.

Ex: C, C++, C#, Java.

When free of errors, the source code of a compiler is successfully transposed into the object code. At the end of the build, when the source code has errors, the compiler indicates the errors. Before the compiler can successfully recompile source code, errors must be removed.

The number of host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0. Show the calculations.​

Answers

Answer:

adress: 10101100.00010000.1 0000000.00000000

netmask: 11111111.11111111.1 0000000.00000000

Network:   172.16.128.0/17       10101100.00010000.1 0000000.00000000 (Class B)

Explanation:

ex: 10 -> 00001010

200 ->11001000

BADM-Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Required:
Provide a 500 word (or 2 pages double spaced) minimum reflection.

Answers

Answer:

WooW We Have To All This Which Class can you Please tell

In the U.S. fuel efficiency of cars is specified in miles per gallon (mpg). In Europe it is often expressed in liters per 100 km. Write a MATLAB user- defined function that converts fuel efficiency from mpg to liters per 100 km. For the function name and arguments, use Lkm-mpgToLpkm (mpg). The input argument mpg is the efficiency in mi/gl, and the output argument Lkm is the efficiency in liters per 100 km (rounded to the nearest hundredth). Use the function in the Command Window to:________.
(a) Determine the fuel eficiency in liters per 100 km of a car whose fuel effi- ciency is 21 mi/gal.
(b) Determine the fuel efficiency in liters per 100 km of a car whose fuel effi- ciency is 36 mi/gal.

Answers

Answer and Explanation:

Using MATLAB code:

Function Lkm = Lkm-mpgToLpkm (mpg)

Lkm= mpg*1.60934/3.78541;

Lkm= Lkm^(-1);

Lkm= Lkm*100;

%the code above defines a function Lkm and takes argument/input to its parameter mpg(miles per gallon) and then returns/output Lkm which is the litres per kilometers conversion from miles per gallon input.

end

To call the function written above with argument 30 mpg, we write:

Lkm= Lkm-mpgToLpkm (30)

what is the difference of expository and reflexive documentary

Answers

The reflexive documentary mode focuses on the relationship between the filmmaker and the audience. While expository documentaries set up a specific point of view or argument about a subject and a narrator often speaks directly to the viewer.

A database has two tables Rand S with 100 tuples each. Exactly two transactions, 11 and T2, execute concurrently on the database. T1 inserts a tuple in R and after some time decides to abort. T2 computes the difference: SELECT count(*) from R - SELECT count(*) from s and inserts as many tuples in S. After the transactions complete, R has 100 tuples and S has 101 tuples. Which of the following is possible?
a. The transactions executed in the REPEATABLE READ isolation level.
b. The transactions executed in the READ UNCOMMITTED isolation level.
C. The transactions executed in the READ COMMITTED isolation level.
d. This outcome is not possible in any of these isolation levels.

Answers

Answer:

a. The transaction executed in the REPEATABLE READ isolation level.

Explanation:

Database management system are used by businesses to organize and handle large data. There are 3 types of DBMS :

1- Hierarchical Database management system

2- Network Database management system

3- Object oriented Database management system.

What are the consequences of writing selection structures to include an unnecessary nested selection structure ?​

Answers

Answer: less efficient code

Explanation:

When a programmer studies the specifications of a problem, then the programmer can then decide if the solution to the problem will require a nested selection structure or not.

One consequences of writing selection structures to include an unnecessary nested selection structure is that it produces a less efficient code.

You are a high school student learning about computers and how to build them. As a class project, you have built a new computer. You power on your computer and begin to configure the system. After a short while, you notice smoke coming from the PC, and shortly after that, the computer stops working. After removing the computer case, you see that the CPU and surrounding areas are burnt and very hot. You realize that the costly mistake you made was not using a heat sink. When rebuilding your computer, which cooling systems would MOST efficiently remove heat from the CPU?

Answers

Answer:

You can use thermal paste, active heat sink, liquid pipes, and even a fan. These are just some that I've heard.

Explanation:

All of these are cooling and will stop the Central Processing Unit from overheating.

Hope this helps :)

When rebuilding your computer, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are: cooling fan and thermal compounds.

A computer refers to an intelligent electronic device that is designed and developed to receive raw data as an input and then processes these data into an information (output) that is usable by an end user.

Basically, the main part of a computer are broadly divided into the following;

Input devices (peripherals). Output devices (peripherals). Motherboard. Memory and storage device.Central processing unit (CPU).

A cooling device can be defined as a device that is designed and developed to efficiently remove or dissipate heat from the inside of a computer. The cooing system used in a computer are grouped into two

(2) main categories and these are:

I. Active cooling device: an example is a cooling fan.

II. Passive cooling device: an example is a heat sink.

In conclusion, the cooling systems which would most efficiently remove heat from the Central processing unit (CPU) are cooling fan and thermal compounds.

Read more: https://brainly.com/question/10983152

please use True / False to help me on the bellow questions

1. Netiquette is one of the services on the internet......

2. The web can exist without the internet and vice versa........

3. Telecommunication technologies are heavily used
on the internet.........

Match the terms with the appropriate definition by writing the letter of the alphabet against it.

(A) home page. (B) link (C) wikis (D) URL (E) Browser (F) netiquette (G) mailing list. (H) uploading. (I) Blog (J)Extranet. (K) HTML.

(L)internet

4.--------- a language used to create web pages and web documents.

5. -------- a private network that connects more than one organisation.

6.----------the process of transferring documents to a web server.

7.............A code and guidelines for acceptable behavior on the internet.

8..........Built-in connection to related web pages or part of a web page.

9..........A software interpret and display web page.

10.............A unique adress of a web resource.
11............ web site that allow visitors to easily contribute or correct content
12.............a running web log that allows an individual to post opinions and ideas.​

13...........A discussion forum that is based on e-mails

Answers

Answer:

The answer is below

Explanation:

1. Netiquette is one of the services on the internet - FALSE. This is because Netiquette is defined as a bunch of regulations for acceptable online attitude or conduct.

2. The web can exist without the internet and vice versa. FALSE. This is because the web, a short form of world wide web (www), can only be accessed through the internet

3. Telecommunication technologies are heavily used on the internet. TRUE. This is because telecommunication technologies such as Smartphones, Emails, Televisions, Radios, data communication, computer networking, etc, which involve the transfer of information, such as voice, video, and data, are heavily used on the internet.

4. HTML - a language used to create web pages and web documents.

5. EXTRANET- a private network that connects more than one organization.

6. UPLOADING - the process of transferring documents to a web server.

7. NETIQUETTE - A code and guidelines for acceptable behavior on the internet.

8. LINK - Built-in connection to related web pages or part of a web page.

9. BROWSER - A software interprets and displays web pages.

10. URL - A unique address of a web resource.

11. WIKIS - web site that allows visitors to easily contribute or correct content

12. BLOG - a running weblog that allows an individual to post opinions and ideas.​

13. MAILING LIST A discussion forum that is based on e-mails

Write a Java program that creates a two-dimensional array of type integer of size x by y (x and y must be entered by the user). The program must fill the array with random numbers from 1 to 9. Then, the program must print the original array and the elements that are in even columns of the array.

Answers

Answer:

The java program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 Random r = new Random();

 int x, y;

 x = input.nextInt();  

 y = input.nextInt();

 int[][] Array2D = new int[x][y];

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          Array2D[i][j] = r.nextInt(9) + 1;      }

 }

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

 

 for(int i = 0; i < x ; i++){

     for(int j = 1; j < y; j+=2){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

}

}

Explanation:

This creates a random object

 Random r = new Random();

This declares x and y as integers

 int x, y;

This gets input for x

 x = input.nextInt();  

This gets input for y

 y = input.nextInt();

This declares the 2D array

 int[][] Array2D = new int[x][y];

The following iteration populates the array with integers 1 to 9

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          Array2D[i][j] = r.nextInt(9) + 1;      }

 }

The following iteration prints all elements of the array

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

The following iteration prints all elements on the even column

 for(int i = 0; i < x ; i++){

     for(int j = 1; j < y; j+=2){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

QUESTION 4 PRACTICAL EXERSIZE
create a list of the types of computers and write a key characteristic down for each of them. For example LAPTOP- portable computer. ​

Answers

Answer:

Mainframe, Super Computer, Workstation, Personal Computer, Laptop computer and Tablet and Smartphone.

Explanation:

Mainframe Computer is high capacity and costly computer.

Super Computer is the fastest among all computer and also very expensive.  

Workstation is a high-performance computer system that has advanced graphics capabilities, having large storage capacity and a powerful CPU.

Personal Computer is a computer whose size, capabilities, and price make it feasible for individual use.  

Laptop computer is a type of computer which is portable, having high storage and very high speed.

Tablet and Smartphone is a type of computer which is also portable and can be kept in pocket.

write the sql code to generate the total hours worked and the total charges made by all employees . the results are shown in fig.P7.8

Answers

Answer:

Select SUM(HOURS), SUM(CHARGES) from employees

Explanation:

The table structure is not given. So, I will assume that the table name is "employees", the columns to retrieve are "hours" and "charges"

Having said that, the function to retrieve the total of column is the sum() function.

So, the query is as follows:

Select ----> This means that the query is to retrieve from the table

SUM(HOURS), SUM(CHARGES) --- This represent the records to retrieve

from employees ---- This represents the table to retrieve from.

1.               Which of the following is smallest?

a)     desktop System Unit

b)     notebooks System Unit

c)     PDA System Unit

d)     tablet PC’s​

Answers

Answer:

c)     PDA System Unit

Explanation:

.... ...

Trust me mark me as brainliest trust me

Answer:

The smallest is PDA System Unit - c

What are 6 Steps in opening the print dialogue box in PowerPoint presentation​?

Answers

Answer:

Find the steps below.

Explanation:

The print dialogue box is the box that contains all the options to be selected before a hard copy of the power point presentation is obtained. The steps in opening it include;

1. Click on File to select the document to be printed

2. Click the Print icon

3. When the option Printer is displayed, choose the desired printer

4. Select Settings and choose the number of slides to print, the layout of the print-out, the color, and if the slides will be collated or not.

5. Select the number of copies to be printed

6. Click Print or Ok

An infographic displays the relative frequencies of the 100 most common emojis used in text messaging for each of the last 12 months. Which of the following conclusions cannot be drawn from such a representation of emoji usage?
a. You can determine the growth or decline in popularity of a particular emoji.
b. You can determine what percentage of text messages contains a particular emoji.
c. You can determine how long the most popular emoji has held the #1 position.
d. You can determine the average age of emoji users based on emoji use.

Answers

Answer:

d. you can determine the average age of emoji users based on emoji use.

Explanation:

The infographic displays 100 most common emoji used in text messaging. This information can be used to determine percentages of text message which contains particular emoji. This details can not determine the age of emoji user based in emoji use.

2. Used to drive in or remove screws that fasten electrical wires or other electrical accessories. A. Pliers C. Screwdrivers B. Mechanical D. Multi-tester VOM​

Answers

Answer:

the correct answer is C. screwdriver

The following pseudocode describes how a widget company computes the price of an order from the total price and the number of the widgets that were ordered. Read the number of widgets. Multiple the number of widgets by the price per widget of 9.99. Compute the tax (5.5 percent of the total price). Compute the shipping charge (.40 per widget). The price of the order is the sum of the total widget price, the tax, and the shipping charge. Print the price of the order

Answers

Answer:

The program in Python is as follows:

widget = int(input("Widgets: "))

price = widget * 9.9

tax = price * 0.55

ship = price * 0.40

totalprice = price + tax + ship

print("Total Price: $",totalprice)

Explanation:

The question is incomplete, as what is required is not stated.

However, I will write convert the pseudocode to a programming language (in Python)

Get the number of widgets

widget = int(input("Widgets: "))

Calculate price

price = widget * 9.9

Calculate the tax

tax = price * 0.55

Calculate the shipping price

ship = price * 0.40

Calculate the total price

totalprice = price + tax + ship

Print the calculated total price

print("Total Price: $",totalprice)

The compound known as butylated hydroxytoluene, abbreviated as BHT, contains carbon, hydrogen, and oxygen. A 1.501 g sample of BHT was combusted in an oxygen rich environment to produce 4.497 g of CO2(g) and 1.473 g of H2O(g). Insert subscripts below to appropriately display the empirical formula of BHT.

Answers

Answer:

C15H24O

Explanation:

n(C) = 4.497 g/44g/mol = 0.1022

Mass of C = 0.1022 × 12 = 1.226 g

n(H) = 1.473g/18 g/mol = 0.0823 ×2 moles = 0.165 moles

Mass of H = 0.0823 × 2 ×1 = 0.165g

Mass of O= 1.501 -(1.226 + 0.165)

Mass of O= 0.11 g

Number of moles of O = 0.11g/16g/mol = 0.0069 moles

Dividing through by the lowest ratio;

0.1022/0.0069, 0.165/0.0069, 0.0069/0.0069

15, 24, 1

Hence the formula is;

C15H24O

Answer

The formula is C1SH240

An array is a fixed-size container which stores a collection of values of the same type.

a. True
b. False

Answers

A. True would be the answer

what is a network computer that processes requests from a client server​

Answers

Answer:

computer processing unit

computer processing unit is a network computer that processes requests from a client server​.

What is a computer processing unit?

The main element and "control center" of a computer is the Central Processing Unit (CPU). The CPU, sometimes known as the "central" or "main" processor, is a sophisticated collection of electronic circuitry that manages the device's software and operating system.

A central processing unit, sometimes known as a CPU, is a piece of electronic equipment that executes commands from software, enabling a computer or other device to carry out its functions.

Computers use a brain to process information, much like people do. The brain is the central processing unit for a computer (CPU). The CPU is the component that carries out all of the computer's instructions. It connects with all the other hardware parts of the computer while being on the motherboard.

Thus, computer processing unit.

For more information about computer processing unit, click here:

https://brainly.com/question/29775379

#SPJ6

Which report views shows how the report will look in print and enable you to make modifications to the print settings?

Answers

Answer:

Print preview

Explanation:

In Microsoft access the report view that will show you an accurate picture of what your print out will look like before it is printed is : Print preview

Microsoft access is a relational database that allows the usage and storage of information in and organization

A. Describe four types of information that you can enter into a worksheet cell when using a spreadsheet package, giving specific examples.​

Answers

Answer:

The first step of learning about spreadsheets is understanding the terminology you will encounter as you work through this lesson. The glossary below lists terms that are specific to spreadsheet applications. Terminology that we learned when we looked at wordprocessing (such as copy, paste, clipboard, etc.) also apply to spreadsheet applications.

What is the third rule to normalize a database?

All primary keys must be based on filtered values.
All fields in the table must be included in the primary key.
Each primary key must be based on multiple fields in the table.
Each nonkey field must relate to the entire single-field primary key.

Answer is 4
Each nonkey field must relate to the entire single-field primary key

Answers

Answer:

4th option as u told

oook

Other Questions
Provide a detailed explanation of why meiosis is important in creating genetic variation in a population. Include details on how daughter cells receive genetic information and how they differ from parent cells. The function h is defined by h (x) = 3x2 + 7.Find h(5x).h (5x) = ? Ch n xng, th d dy ca chng tiu ho nh th no? The amounts of nicotine in a certain brand of cigarette are normally distributed with a mean of 0.974 g and a standard deviation of 0.325 g. The company that produces these cigarettes claims that it has now reduced the amount of nicotine. The supporting evidence consists of a sample of 48 cigarettes with a mean nicotine amount of 0.918 g. Assuming that the given mean and standard deviation have NOT changed, find the probability of randomly seleting 32 cigarettes with a mean of 0.917 g or less. P(M < 0.917 g) = __________ You are to receive a cash flow of $1,500 two years from now. Once received, you will invest the money and earn a 10.5% return. What is the value of the investment in year 5? QUESTION 10 of 10: You've been meaning to fix those rotted boards on your porch for years. Finally, last week the deck gave way. Thereplacement will cost you $3,000. Will you be able to recover the cost of replacement (less your deductible) from your homeowner'sinsurance?O a) Yesb) No what is the Young's modulus of a perfect rigid body Please help Ill give brainliest The initial temperature of a solution was 16C. The temperature dropped 3C every minute. What was the temperature of the water after 15 minutes in C? Help plzzz plzzz asappp!!!! Please answer this correctly without making mistakes Why does Mo Yan not explore political issues in his Nobel speech?A. Because he isn't interested in political issuesB. Because he doesn't talk about political issues in his fictionC. There was no reason for thisD. Political issues are not appropriate for Nobel speechesNEED ASAP GIVING POINTS 11) Write the explicit formulafor the sequence below anduse it to find the 47th term:-3, 5, 13, 21,... In communication, modeling means _____? In choosing to acquire a TV manufacturer as part of your entry strategy to enter the Smart TV market, Apple intends to integrate the TV manufacturer within its own company. The transfer of which competencies between the two companies creates the possible scenario for success? A. Fully integrate the company and combine it with the current computer business because monitors and televisions are similar in their requirementsB. Transfer the knowledge of touchscreen capabilities and the Apple ecosystem from Apple to the TV manufacturer to use for the new Apple Smart TV solve for x in the equation 9- x/4=2 Write the indicated event in set notation.When four coins are tossed, the first three tosses come up the same.[Hint: when four coins are tossed, the following 16 outcomes are possible:HHHH HHHT HHTH HHTTHTHH HTHT HTTH HTTTTHHH THHT THTH THTTTTHH TTHT TTTH TTTT ]a. (HHH, TTT) b. (HHHT, TTTH) c. (HHHT, TTTH, HTTT, THHH) d. (HHHH, HHHT, TTTH, TTTT) Keller performed the work below to express the polynomial in factored form: r(x) = x4 8x2 9 r(x) = (x2 + 1)(x2 9) (x) = (x + 1)(x 1)(x + 3)(x 3)Explain the error he made and complete the factorization correctly. x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1) An angle measures. What is the measure of its complement? (b) An angle measures 48 . What is measure 26 of its supplement?