how to select two columns in excel that are not next to each other

Answers

Answer 1

To select two columns in Excel that are not next to each other, you can use the "Ctrl" key on your keyboard. First, click on the column letter of the first column you want to select. Hold down the "Ctrl" key on your keyboard and click on the column letter of the second column you want to select.

This will select both columns at the same time. You can then perform any action or function on the selected columns, such as formatting or copying data. The "Ctrl" key is a keyboard shortcut that allows you to select multiple non-consecutive items. In this case, holding down the "Ctrl" key while clicking on the column letters allows you to select two columns that are not next to each other. This technique can also be used to select multiple rows or cells that are not adjacent to each other.

To select two columns in Excel that are not next to each other, follow these steps: By following these three simple steps, you can easily select two columns in Excel that are not adjacent to each other. Holding down the 'Ctrl' key while clicking on the headers allows you to select multiple columns that are not continuous. This method works because the 'Ctrl' key acts as a modifier, enabling you to make non-contiguous selections in Excel. It is a versatile shortcut that can be used for selecting non-adjacent cells, rows, or columns in various scenarios.

To know more about "Ctrl" key visit :

https://brainly.com/question/1212286

#SPJ11


Related Questions

NIST guidelines for reusable passwords permit ________. NIST guidelines for reusable passwords permit ________. the use of the same password at different sites both A and B neither A nor B entirely lower-case passwords

Answers

NIST guidelines for reusable passwords permit neither the use of the same password at different sites both A and B nor entirely lower-case passwords.

The use of unique and complex passwords is recommended to ensure better security for online accounts. It is also advised to use a password manager to generate and store strong passwords for each site. In the context of computers, a site can refer to a location on the internet or a network where information is hosted or accessed. A website, for example, is a collection of related web pages and multimedia content that are accessed through a single domain name or IP address. Sites can also refer to physical locations within a network, such as a specific server or workstation. In enterprise environments, sites are often used to organize network resources and manage traffic between different locations or departments. Site-to-site VPNs can be used to securely connect networks across geographic locations or between cloud and on-premise infrastructure. Overall, sites play a key role in organizing and managing information and resources within computer systems and networks.

Learn more about Sites here:

https://brainly.com/question/30176619

#SPJ11

What is information cycle

Answers

Answer:

The term information cycle refers to the way information is processed and distributed and how it changes over time. It is usually used to describe the progression of media coverage relating to a particular newsworthy event or topic during which information goes through various stages of reporting and publication.

I didn’t know the answer just need to “answer” a question to get help.

how to prepare balance sheet and distributor of capital=175000, land=125000, investment = 80000, accrued income =10000, bank overdraft =30000, debtor=35000, net profit =40000, wages payable =5000​

Answers

Answer:

add them all

Explanation:

Hope wants to add a third use at the end of her nitrogen list.

What should Hope do first?

What is Hope’s next step?

Answers

Answer:the first answer is put it at the end of 2b

the second answer is press enter

Explanation:

Answer:

1,  put it at the end of 2b     2, press enter key

Explanation:

HELP ME ASAP

Use the drop-down menus to explain how to turn off meeting responses.

Meeting responses can be turned off to save room in the email inbox from large numbers of

Turning off meeting responses will disable the command

Answers

Answer:

1 replies 2 tracking

Explanation:

edge

Answer:

replies, tracking

Explanation:

Question 2 (1 point)
A bullet-point list is used when you have information
A: that must be in a sequential order
B: that must be in columns
C: that must use colored font to look professional
D: that does not have any necessary order or sequence

Answers

Answer:


A. That must be in a sequential order.


4. 5 Facts about Alternating Current and direct current

Answers

Answer:

1. The Alternating current comes from a power plant. The direction of the electricity switches back 60 times every second.

2. Alternating current: The same amount of current flows through a circuit regardless of the direction of the current.

3. Direct current: Even when no current is flowing through the wire, the electrons in the wire are moving at speeds up to 600 miles (1000 kilometers) per second but in random directions because the wire has a finite temperature.

4. Direct current: As opposed to alternating current, the direction and amperage of direct currents do not change. It is used in many household electronics and in all devices that use batteries.

5.  Alternating current is five times more dangerous than Direct current. The frequency of the alternating current is the main reason for this severe effect on the human body. The frequency of 60 cycles is in an extremely harmful range. At this frequency, even a small voltage of 25 volts can kill a person.

Explanation:

Git pull is a combination of which 2 other git commands?.

Answers

Answer:

git fetch followed by git merge

Explanation:

Which of the following skills would a digital librarlan need that a traditional librarian would not necessarily need?
O web development
O information organization
customer service
O research skills

Answers

Answer: web development

Explanation:

A digital librarian would likely need web development skills, as they would need to be able to manage and maintain a website for the digital library. A traditional librarian may not need this skill, as they may not be responsible for managing a website for their library.

Next → Creating Documents Using Word Processing Software: Mastery Test
1
Type the correct answer in the box. Spell all words correctly.
Under which key category do the Page Up and Page Down keys fall?
Page Up and Page Down keys fall under the
Reset
keys category.
Next

Answers

Any of these approaches can be used to open a Word document that already exists. Although a doc file will open when double-clicked in Windows Explorer.

What exactly is word processing software?

The process of creating, editing, saving, and printing documents on a computer is referred to as word processing. Specialized software, also referred to as a word processor, is required in order to execute word processing. Microsoft Word is one example of a word processor, while many people also use other word processing programs.

Does Excel have a word-processing component?

MS Excel is a spreadsheet application used to create tables, and charts, and perform intricate computations. Microsoft Word is a word processing tool used for producing papers, reports, and other written work.

to know more about Word Processing here:

brainly.com/question/29762855

#SPJ1

State whether the given statement is True/False. Arguments are the input values to functions upon which calculations are performed.

Answers

false i think just saying

WHAT DOES THE SCRATCH CODE BELOW DO?

WHAT DOES THE SCRATCH CODE BELOW DO?

Answers

i think the correct answer would be b but im not 100% so if i’m wrong please lmk :]

a computer program that seems to perform one function while actually doing something else. group of answer choices A. application B. software C. compiler D. interpreter E. trojan

Answers

The term that describes a computer program that seems to perform one function while actually doing something else is a trojan.

The correct answer is (E) trojan.

A trojan is a type of malware that is designed to deceive the user into thinking it is a harmless program while actually performing malicious actions, such as stealing sensitive information or taking control of the user's computer. It is a type of computer program that appears to perform a certain function or provide a desirable feature but actually has hidden malicious functionality. It is designed to deceive users into running it, thinking it is a legitimate program, while it performs other unauthorized actions in the background.

The other options listed, such as application, software, compiler, and interpreter, do not specifically refer to a program that masquerades as one thing while performing a different task.

Therefore, option (E) trojan is the correct answer.

For more questions on trojan: https://brainly.com/question/28566320

#SPJ11

blueprint could not be loaded because it derives from an invalid class. check to make sure the parent class for this blueprint hasn't been removed! do you want to continue (it can crash the editor)?

Answers

The error message, "Blueprint could not be loaded because it derives from an invalid class" implies that the blueprint could not be loaded due to the fact that it is based on an invalid class. This error message can occur when a blueprint's parent class has been deleted or is no longer present in the game.

Thus, the blueprint cannot be loaded by the game engine. The message goes further to ask the user to ensure that the parent class has not been removed before continuing. If the user chooses to continue, the engine may crash. This can happen if the engine is not able to identify the base class of the blueprint and thus, cannot load the blueprint's content. If you encounter this issue, it is advisable to try to locate and restore the parent class for the blueprint in order to fix the error. One of the ways to do this is to restore the base class that was removed or to rebuild the parent class.

It is important to note that if the blueprint is critical to the game, a crash may result if the blueprint is loaded without fixing the error. In conclusion, Blueprint could not be loaded because it derives from an invalid class can be fixed by restoring the parent class or rebuilding it to ensure that the game engine can load the blueprint without crashing.

To know more about blueprint visit:

https://brainly.com/question/28187253

#SPJ11

Server Selection The developers of Hackerland want to build a distributed system. It is represented as a grid of
n
rows and
m
columns where
n≥m
and each cell is a server. The vulnerablility of the
f th server in the
f th column is vulnerability[i][i]. The net vuinerability of a system Is the minimum vuinerabilitis of the maximum vulnerabilities of the servers in all the columns. In other words, Create a set of maximum vuinerabilities from each column of the grid and find the minimum of this set. They want to consider only a subset of
m
rows to increase net vulnerability. Find the maximum possible value of net vulnerablility that can be achieved by choosing exactly
m−1
rows from the grid. Example Suppose,
n=4,m=3
, vulnerabilicy
=[[1,3,1]
,
[3,1,1]
,
[1,2,2]
,
[1,1,3]]
We can choose
m−1=2
rows only. It is optimal to choose the
2 nd and
3 rd row to make a new grid. Our new vulnerability
=[[3,1,1]
,
[1,2,2]]
The maximum of the respective columns is
(3,2,2)
and the minimum of this set is 2. Hence we report 2 as our answer. Functon Descriptlon Complete the function getMaxNetVulnerability in the editor below. getMaxNetvulnerability has the following parameter(s): vulnerablilig][n][m]; a 2-dimensional array described in statement Function Description Complete the function getMaxNetVulnerability in the editor below. getMaxNetVulnerability has the following parameter(s): vulnerability[n][m]: a 2-dimensional array described in problem statement Returns int: the maximum possible net vulnerability using exactly
m
- 1 rows Constralnts -
2≤m≤n≤1000
-
1≤
vulnerability[ij[i]
≤10 6
Input Format For Custom Testing Sample Case 0 Sample Input For Custom Testing Sample Output 2 Explanatlo[s We can select at most
m−1=2
rows. We select the first and the second row. Our new vulnerabllisy
=[[5,1,3]
,
[5,2,1]]
The maxima of the columns are
(5,2,3)
and the minimu Sample Case 1 Sample Output 2 Explanation We can select at most
m−1=2
rows. We select the first and the second row. Our new vulnerability
=[[5,1,3]
,
[5,2,1]]
The maxima of the columns are
(5,2,3)
and the minimum of these is 2 . - Sample Case 1 Sample Input For Custom Testing Sample Output 4 Explanation We can select at most
m−1=2
rows. We select the first and the second row. Our new vulnerabilisy
=[[5,3,3]
,
[3,4,6]]
The maxima of the columns are
(5,4,6)
and the minimum

Answers

Hackerland's creators intend to create a distributed system. It is shown as a grid with n rows & m columns, where each cell represents a server and nm.

A network server is what?

Dedicated machines that are a part of a network and run programs designed to handle client requests and deliver pertinent answers are known as network servers. The physical machine that this application is operating on is normally included in a network server, while the software itself may be referred to as the server in some cases.

What does a server do primarily?

A server sends, receives, and stores data. In essence, by offering services, it "serves" another goal. A server may be a computer, piece of software, or a storage device, and it may offer one.

To know more about  server visit:

https://brainly.com/question/30168195

#SPJ4

the recovery requirements after a disaster are the time frame in which systems must be recoverable and the data that must be recovered. which two terms relate to recovery requirements?

Answers

The two terms that relate to recovery requirements are "Recovery Time Objective (RTO)" and "Recovery Point Objective (RPO)."

Recovery Time Objective (RTO): RTO is the time frame within which systems, applications, and data must be recovered after a disaster. It represents the maximum allowable downtime that an organization can tolerate without significant business impact. For example, if an organization has an RTO of 4 hours, it means that systems and data must be restored within 4 hours of a disaster.

Recovery Point Objective (RPO): RPO is the amount of data that an organization is willing to lose in the event of a disaster. It represents the maximum acceptable data loss that an organization can tolerate without significant business impact. For example, if an organization has an RPO of 1 hour, it means that the organization is willing to lose up to 1 hour's worth of data in the event of a disaster.

Both RTO and RPO are critical metrics that help organizations establish their disaster recovery strategy and plan for business continuity. By defining RTO and RPO, organizations can determine the level of redundancy, backup, and recovery measures needed to ensure that their critical systems and data are protected and can be quickly restored in the event of a disaster.

To know more about Recovery Time Objective (RTO) visit:

https://brainly.com/question/15187241

#SPJ11

When it is aware that the destination address is not present on the other side, then the
blocks the data from crossing it.

Answers

Answer:

answer is c

Explanation:

(Maximum 400 words) Describe how this period of Coronavirus (COVID-19) will influence and affect the STEM (Science, Technology, Engineering, and Mathematics) fields.

Answers

The period of coronavirus will have both negative and positive impacts on STEM fields.

However, the STEM (Science, Technology, Engineering, and Mathematics) fields have shown significant changes and impacts.

Here is how this period of COVID-19 will affect the STEM fields.

1. Technology

The current situation has increased the use of technology in various fields. Remote work and online meetings are becoming more popular, and this has led to increased technology usage. Technological advancements are expected in the future, leading to new business models that are more efficient.

2. Biomedical research

The COVID-19 pandemic has sparked the need for more biomedical research and led to an increase in research funding. Scientists are researching vaccines, treatments, and diagnostic tools, which is expected to lead to a better understanding of viruses and other infectious diseases.

3. Education

The pandemic has affected the education system globally, with many institutions closing and students learning from home. Teachers and educators are now incorporating technology in teaching, and the pandemic has accelerated the adoption of e-learning platforms. This has led to the development of new ways to learn and teach, and new online learning platforms are expected to emerge in the future.

4. Engineering

The pandemic has led to an increase in demand for essential supplies such as ventilators, personal protective equipment (PPE), and other medical devices. This has led to the development of new designs and manufacturing processes that are more efficient. The need for innovation has also led to the development of new solutions, such as 3D printing of medical supplies.

5. Mathematics

Mathematical models are used to understand the transmission of diseases, and the COVID-19 pandemic has led to the development of new models to understand the spread of the virus. These models help policymakers and public health officials make decisions to control the pandemic.

In conclusion, the COVID-19 pandemic has impacted STEM fields significantly, leading to new developments and innovations. With increased technology adoption, biomedical research, e-learning platforms, and engineering, the STEM fields are expected to change and adapt to the new normal. It is crucial to keep up with these changes and find ways to take advantage of the opportunities presented by the pandemic.

learn more about STEM fields here:

https://brainly.com/question/30082530

#SPJ11

your friend is having problems finding the bootmgr file and asks for your help. what is your response for the best option?

Answers

Your friend is having problems finding the bootmgr file and asks for your help. Explain your friend that performing a startup repair is a better option.

Where is the Bootmgr file located?

The actual BOOTMGR file is read-only and concealed. It can be found in the root directory of the disc management partition designated as Active. This partition is typically designated as System Reserved on Windows PCs and doesn't receive a drive letter.

Who is in charge of initiating system startup and locating an OS to load?

The boot process is then initiated by the BIOS. For the operating system, it will search. If none of the parameters are changed, the BIOS will load the operating system into RAM after retrieving it from the hard drive. The operating system is subsequently given control by the BIOS.

What happens when the operating system is transferred from the hard drive to the RAM?

The right response is booting. Booting is the process by which a computer loads an operating system into its primary memory, also known as random-access memory (RAM).

To know more about boot manager visit;

https://brainly.com/question/29220833

#SPJ4

ASAP! Due by tonight!!!! Please help!!!

ASAP! Due by tonight!!!! Please help!!!

Answers

The answer is C. Start of mystery

Answer: e

Explanation:

When it comes to the morals and ethics of programming a car, does a correct or wrong response to a situation exist?

Answers

I'll go over the reasons why it is morally acceptable to develop self-driving automobiles as well as the reasons why it is unethical.

what is ethics of programming a car?

Self-driving vehicles already exist, and people travel on our motorways and roads alongside them. They are among the most cutting-edge inventions ever made by humanity in terms of technology. As with any new technology, it will raise fresh ethical concerns. Is it moral to create self-driving cars whose decisions would impact the driver's lifestyle and the environment?

I'll go over the reasons why it is morally acceptable to develop self-driving automobiles as well as the reasons why it is unethical. I'll come to a conclusion with the most moral response to the aforementioned dilemma after using an utilitarians approach to examine both sides.

To know more about ethics of programming a car visit:

https://brainly.com/question/28016237

#SPJ1

with the advent of technology one can experience special features such as 3D theater experiences true or false

Answers

The answer would be true

What can Amber do to make sure no one else can access her document? O Use password protection. O Add editing restrictions. O Use Hidden text. O Mark it as final.​

Answers

Add a password.

The question is asking how to make sure no one can “access” it which means look at it at all. This means that Editing restricting still allow people to access it, white text does nothing but make the text invisible, and marking it as final still gives them access
use password protection.

Instructions You will create a presentation based on a PRODUCT, SERVICE or IDEA of your choosing! Must use the PREP method Presentations must be 15(min)−20 slides (max) Length of presentation is to be no longer than 15 minutes

Answers

The chosen product for the presentation is a solar-powered water heating system.

How does a solar-powered water heating system work?

A solar-powered water heating system utilizes solar energy to heat water for various purposes. The system consists of three main components: solar collectors, a storage tank, and a circulation system.

Solar collectors are usually installed on the roof or in an open area to maximize sunlight exposure. These collectors absorb solar radiation and convert it into heat energy. There are two types of solar collectors commonly used: flat-plate collectors and evacuated tube collectors.

The heated water from the solar collectors is transferred to a storage tank, where it is stored until needed. The storage tank is insulated to minimize heat loss.

To ensure a continuous supply of hot water, a circulation system is employed. This system consists of pipes and a pump that circulate the water between the solar collectors and the storage tank.

When hot water is required, it is drawn from the storage tank and used in showers, sinks, or other applications.

Learn more about solar-powered water

brainly.com/question/858507

#SPJ11

Consider the following relational schema:
Course (cid, cname, dept, credit)
Student (sid, sname, dept, gpa)
Enroll (cid, sid, grade, semester)
The meaning of these relations is straightforward and the keys are underlined. Write the following queries in SQL.
a) List all the students who never got a grade above ‘C’.
b) Find the number of students not enrolled in any class.
c) Find name of students in EE department who took all the courses offered by CS
department.
d) Find the name s of students who took courses offered by CS department and no
other department.
e) Find the names of all classes that have 10 or more students enrolled

Answers

SQL queries are written to retrieve specific information from the given relational schema.

How to write SQL queries for given scenarios?

To write SQL queries, you need to use the SELECT statement along with appropriate clauses such as WHERE, JOIN, GROUP BY, and HAVING. These queries can be used to retrieve specific information from the tables based on the given requirements.

a) List all the students who never got a grade above 'C':

The query selects the names (sname) of students from the Student table.It uses a subquery to filter out students who have received a grade above 'C' in the Enroll table by comparing their IDs (sid).

b) Find the number of students not enrolled in any class:

The query counts the number of students (COUNT(*) AS num_students) from the Student table.It uses a subquery to filter out students who have enrollment records in the Enroll table by comparing their IDs (sid).

c) Find the names of students in the EE department who took all the courses offered by the CS department:

The query selects the names of students (sname) from the Student table.It uses subqueries and the EXISTS clause to check if a student in the EE department has enrolled in all the courses offered by the CS department.

d) Find the names of students who took courses offered by the CS department and no other department:

The query selects the names of students (sname) from the Student table.It uses subqueries and the EXISTS and NOT EXISTS clauses to filter out students who have taken courses from the CS department and exclude those who have taken courses from other departments.

e) Find the names of all classes that have 10 or more students enrolled:

The query selects the names of classes (cname) from the Course table.It uses an inner join with a subquery that counts the number of students enrolled in each class (Enroll table) and filters out classes with 10 or more students.

Note: The explanations provided assume familiarity with SQL syntax and the structure of the given relational schema.

Learn more about SQL queries

brainly.com/question/31663284

#SPJ11

Among fatal plane crashes that occurred during the past ​years, were due to pilot​ error, were due to other human​ error, were due to​ weather, were due to mechanical​ problems, and were due to sabotage. Construct the relative frequency distribution. What is the most serious threat to aviation​ safety, and can anything be done about​ it?.

Answers

To construct the relative frequency distribution, we need to divide the number of occurrences of each category by the total number of fatal plane crashes. Let's assume there were 100 fatal plane crashes in the past years.

Pilot error: 60 crashes
Other human error: 10 crashes
Weather: 20 crashes
Mechanical problems: 8 crashes
Sabotage: 2 crashes

To calculate the relative frequency, divide the number of occurrences by the total number of crashes and multiply by 100:

Pilot error: (60/100) * 100 = 60%
Other human error: (10/100) * 100 = 10%
Weather: (20/100) * 100 = 20%
Mechanical problems: (8/100) * 100 = 8%
Sabotage: (2/100) * 100 = 2%

The most serious threat to aviation safety based on this data is pilot error, which accounts for 60% of the fatal crashes. To mitigate this threat, measures can be taken to improve pilot training, increase awareness of potential errors, and enforce stricter safety regulations. Additionally, implementing advanced technology and automation systems can help reduce human error and enhance overall aviation safety.

To know more about plane visit:

https://brainly.com/question/28609011

#SPJ11

What if an input is always the same for an algorithm?
(Plz do not answer if you don’t know)

Answers

given a particular input, will always produce the same output, with the underlying machine always passing through the same sequence of states.

the main work area of the computer is the

Answers

Answer:

Desktop

Explanation:

The desktop is the main work area of your computer, and will likely be the most visited area of your computer. Your desktop appears every time you log into your account, and contains icons and shortcuts to your most used programs and files.

Which command is used for -
1. Open solve style and formatting window in winter
2. Open solver in calc
3. Calculate subtotals

Answers

The commands being used for following functions are as follows: In WPS Office (previously known as Kingsoft Office), the command to open the solve style and formatting window in WPS Spreadsheet (similar to Microsoft Excel) during the winter theme is Alt + B + T + Enter.

In LibreOffice Calc, the command to open the Solver add-in is Tools > Solver.

In Microsoft Excel, the command to calculate subtotals is Data > Subtotal.

Microsoft Excel is a spreadsheet software application developed by Microsoft Corporation. It is used to store, organize, and analyze data using a grid of cells arranged in numbered rows and letter-named columns. Excel provides a range of tools and features for performing calculations, creating charts and graphs, and formatting data. It is commonly used in business, finance, and academic settings for tasks such as budgeting, financial analysis, data analysis, and project management.

Learn more about Microsoft Excel here brainly.com/question/24202382

#SPJ4

a company set up controls to allow only a specific set of software and tools to install on workstations. a user navigates to a software library to make a selection. what type of method prevents installation of software that is not a part of a library

Answers

Allow list is type of method prevents installation of software that is not a part of a library.

What is Allow list?

A list of domains or email addresses that you want to receive emails from is referred to as a whitelist or an allow list. You can instruct the email system not to filter email from a certain address or domain by adding it to your list of allowed addresses or domains.

What does whitelist being enabled mean?

An email address, IP address, domain name, or application can be approved while all others are rejected using a cybersecurity technique known as a whitelist (allowlist).

What is Allowlist in phone?

From a security perspective, allowlisting is a useful tool for preventing PHAs from devices because the allowlist of programs ultimately gets quite small.

Learn more about allow list.

brainly.com/question/13850709

#SPJ4

Other Questions
A right triangle has side lengths 9,40 ,41 and as shown below. Use the lengths to find tanL, cosL, sinL if a gene contains a guanine nucleotide, the transcribed messenger rna would have what A nurse is developing a teaching plan for a client with asthma. Which teaching point has the highest priority?-Avoid contact with fur-bearing animals.-Change filters on heating and air conditioning units frequently.-Take ordered medications as scheduled.-Avoid goose down pillows.-Take ordered medications as scheduled.Although avoiding contact with fur-bearing animals, changing filters on heating and air conditioning units frequently, and avoiding goose down pillows are all appropriate measures for clients with asthma, taking ordered medications on time is the most important measure in preventing asthma attacks. True or False - Temperatures in the desert did not fluctuate (change) much from day to night Create an objective or statement about you - be brief, clear and concise ("mission statement"). Write a few sentences on the non-verbal cues that communicate yourmessage goals) with your photo.Write a short paragraph explaining your self-concept select all that apply sales returns and allowances . (select all that apply.) multiple select question. are adjusted for at the end of the accounting period for estimated returns and allowance expected to occur in the following months increases the amount the seller expects to receive from customers reduce the amount the seller expects to receive from customers are required to be recorded at the time of the initial sale are typically recorded after the initial sale when the actual return or allowance occurs "Equally important has been the influence of the Railway--now the principal means of communication in all civilized countries. This invention has started into full life within our own time. The locomotive engine had for some years been employed in the haulage of coals; but it was not until the opening of the Liverpool and Manchester Railway in 1830, that the importance of the invention came to be acknowledged. The locomotive railway has since been everywhere adopted throughout Europe. In America, Canada, and the Colonies, it has opened up the boundless.resources of the soil, bringing the country nearer to the towns, and the towns to the country. It has enhanced the celerity of time, and imparted a new series of conditions to every rank of life." - Men of Invention and Industry by Samuel Smiles, 1884Question:Which people is the author referring to when he states "every rank of life? The bank expert advised you to save at least 6% of your income before tax deduction. Accordingly, this will allow you to maintain a similar lifestyle at your retirement age. Your gross income (income before tax) is R800 000 per annum. Likewise, you save the recommended amount into an annuity by way of yearly payments. The saved amount earns 12% interest, compounded annually. Calculate how much you will receive in your retirement annuity when you retire in 40 years' time. Betty Corporation, a calendar years Corporation, has an Operating Loss of $80,000 and a Long-Term Capital loss of $20,000 for the year of 2021. Nanetto, an Individual owns forty percent (40%) of the stock of Betty Corporation and has a $20,000 basis in her stock at the beginning of the year of 2021. What amount of the Long Term Capital Loss can Nanette deduct on her personal Federal Income Tax Return (Form 1040) for the year of 20217 a 54,000 b $20,000 c $8,000. d $16,000 Suppose that last year the equilibrium price and quantity of good X were $10 and 5 million pounds, respectively. Because strong demand this year, the equilibrium price and quantity of good X are $12 and 7 million pounds, respectively. Assuming that the supply curve of good X is linear, producer surplus: increased from $12.5 million to $24.5 million. increased from $4.2 million to $5.6 million. increased from $25 million to $42 million. increased from $3 million to $7 million. Compare the demand for water with the demand for wine.The demand for water is likelyA. relatively more inelastic because water is a necessityB. relatively more elastic because water is a necessityC. relatively more inelastic because water is a luxuryD. equally elastic as the demand for wineE. relatively more elastic because water is a luxury 5. Paul practiced playing the piafor hour on Friday. He practfor the same amount of timeon Saturday. How long did Ppractice on Saturday? Answer gets 90 points Computer ethics refers to the moral issues and standards of behaviour that people demonstrate consideration and respect for others when using information systems. Give THREE situations how can we violate the rules with TWO specific scenarios. When an arrow is shot from a bow, it has kinetic energy in it. From where does it get its kinetic energy? (1) April received an inheritance from her grandmother in the form of an annuity. The annuity pays $3,000 on January 1st from 1966 through 1984. Find the value of this annuity on January 1, 1966 using an annual effective interest rate of 5% and represent this value by an appropriate annuity symbol. (2) Suppose i = 3%. Find the value one month before the first payment of a level annuity-due paying $200 at the beginning of each month for five years. (3) (a) Describe in words what the difference a is measuring. a IS measurin (b) Given thatay177208656 andn+I-185248436, find the integer n. could rectangle a be a scale drawing of rectangle b? explain. once a person reaches the age of majority and ratifies a contract made when he or she was a minor, the contract is still voidable until the person is 25 years old. When applying for jobs you should never skip reading the Ali is obsessed with cleanliness and control. Which stage of Freuds Stages of Psychosexual Development has Ali become fixated at? Whereas Alis younger brother Saim smokes, drinks alcohol, overeats, and bites his nails. Which stage of Freuds Stages of Psychosexual Development has Saim become fixated at? his wife was waiting for him at the door step change the voice