Write a program to create an array of size m X n and print the sum of all the numbers row wise in java

Answers

Answer 1

Answer:

Here is the program to create an array of size m X n and print the sum of all the numbers row wise in Java:

```

import java.util.Arrays;

public class ArraySumRowWise {

   public static void main(String[] args) {

       int m = 3;

       int n = 4;

       int[][] arr = {{1, 2, 3, 4}, {5, 6, 7, 8}, {9, 10, 11, 12}};

       // Print the original array

       System.out.println("Original Array:");

       for (int[] row : arr) {

           System.out.println(Arrays.toString(row));

       }

       // Compute and print the row wise sum

       System.out.println("Row Wise Sum:");

       for (int i = 0; i < m; i++) {

           int rowSum = 0;

           for (int j = 0; j < n; j++) {

               rowSum += arr[i][j];

           }

           System.out.println("Row " + (i+1) + ": " + rowSum);

       }

   }

}

```

Explanation:

In this program, we have created an array of size 3 X 4 and initialized it with some values. We have then printed the original array and computed the row wise sum by iterating over each row and adding up all the elements. Finally, we have printed the row wise sums. You can replace the values of m, n, and arr with your own values to test the program with different array sizes and values.


Related Questions

Create a python program that asks the user to input the subject and mark a student received in 5 subjects. Output the word “Fail” or “Pass” if the mark entered is below the pass mark. The program should also print out how much more is required for the student to have reached the pass mark.

Pass mark = 70%



The output should look like:

Chemistry: 80 : Pass: 0% more required to pass

English: 65 : Fail: 5% more required to pass

Biology: 90 : Pass: 0% more required to pass

Math: 70 : Pass: 0% more required to pass

IT: 60 : Fail: 10% more required to pass

Answers

HERE IS THE CODE

pass_mark = 70# Input marks for each subjectchemistry_mark = int(input("Chemistry: "))english_mark = int(input("English: "))biology_mark = int(input("Biology: "))math_mark = int(input("Math: "))it_mark = int(input("IT: "))# Calculate pass or fail status and percentage required to passchemistry_status = "Pass" if chemistry_mark >= pass_mark else "Fail"chemistry_percent = max(0, pass_mark - chemistry_mark)english_status = "Pass" if english_mark >= pass_mark else "Fail"english_percent = max(0, pass_mark - english_mark)biology_status = "Pass" if biology_mark >= pass_mark else "Fail"biology_percent = max(0, pass_mark - biology_mark)math_status = "Pass" if math_mark >= pass_mark else "Fail"math_percent = max(0, pass_mark - math_mark)it_status = "Pass" if it_mark >= pass_mark else "Fail"it_percent = max(0, pass_mark - it_mark)# Output resultsprint(f"Chemistry: {chemistry_mark} : {chemistry_status}: {chemistry_percent}% more required to pass")print(f"English: {english_mark} : {english_status}: {english_percent}% more required to pass")print(f"Biology: {biology_mark} : {biology_status}: {biology_percent}% more required to pass")print(f"Math: {math_mark} : {math_status}: {math_percent}% more required to pass")print(f"IT: {it_mark} : {it_status}: {it_percent}% more required to pass")

The program asks the user to enter their scores for each subject, determines if they passed or failed, and calculates how much more they need to score in order to pass. The percentage needed to pass is never negative thanks to the use of the max() method. The desired format for the results is printed using the f-string format.

why is the sellfish difficult to catch?

Answers

Answer:

I dont know if this is supposed to be a joke, or an improper spelling of "Shellfish" but they aren't hard to catch, all you need is to find a muddy estuary, grab a crowbar or other tool, and start digging

Explanation:

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

Write a program that takes as input a number of kilometers and prints the corresponding number of nautical miles.

Use the following approximations:

A kilometer represents 1/10,000 of the distance between the North Pole and the equator.
There are 90 degrees, containing 60 minutes of arc each, between the North Pole and the equator.
A nautical mile is 1 minute of an arc.

An example of the program input and output is shown below:

Enter the number of kilometers: 100
The number of nautical miles is 54

Answers

In python:

kilos = int(input("Enter the number of kilometers: "))

print(f"The number of nautical miles is {round(kilos/1.852,2)}")

I hope this helps!

For an input of 100 kilometers, the program displays "The number of nautical miles is 54.00."

To convert kilometers to nautical miles based on the given approximations.

Here are the simple steps to write the code:

1. Define a function called km_to_nautical_miles that takes the number of kilometers as input.

2. Multiply the number of kilometers by the conversion factor \((90 / (10000 \times 60))\) to get the equivalent number of nautical miles.

3. Return the calculated value of nautical miles from the function.

4. Prompt the user to enter the number of kilometers they want to convert.

5. Read the user's input and store it in a variable called kilometers.

6. Call the km_to_nautical_miles function, passing the kilometers variable as an argument, to perform the conversion.

7. Store the calculated value of nautical miles in a variable called nautical_miles.

8. Display the result to the user using the print function, formatting the output string as desired.

Now the codes are:

def km_to_nautical_miles(km):

   nautical_miles = (km * 90) / (10000 * 60)

   return nautical_miles

kilometers = float(input("Enter the number of kilometers: "))

nautical_miles = km_to_nautical_miles(kilometers)

print(f"The number of nautical miles is {nautical_miles:.2f}.")

The output of this program is:

The result is displayed to the user as "The number of nautical miles is 54.00."

To learn more about programming visit:

https://brainly.com/question/14368396

#SPJ4

Question # 1 Dropdown Finish the code for this class. class book: def (self, title, author): self.title = title self.author = author self.checkouts = []

Answers

Answer:

__init__

Explanation:

got it wrong for the right anser

The object-oriented counterpart of the C++ constructor in Python is the __init__ method. Every single time an object is created from a class, the __init__ function is invoked. The only function of the __init__ method is to allow the class to initialize the attributes of the object.

What role __init__ in different program?

In Java and C++, the default __init__ constructor. The state of an object is initialized using constructors. When an object of the class is created, constructors have the responsibility of initializing (assigning values to) the class' data members.

If access is needed to initialize the class's attributes, the __init__ function can be invoked when an object is created from the class.

Therefore, A reserved method in Python is called __init__. In object-oriented programming, the word “constructor” is employed.

Learn more about  __init__ here:

https://brainly.com/question/28036484

#SPJ2

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

What is the best scenario to use a display font?

for quickly read messages, such as a highway sign
for important, dense information, such as a nutrition label
for small type, such as in body copy
for large type, such as a title

Answers

Answer:

For large type, such as a title

Explanation:

i tried all of the answer's til i got the right one

The best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.

What is a Display font?

A display font may be defined as the arrangement of words with respect to the requirement that makes the writing more attractive, effective, and understandable.

Display font is utilized in order to determine how a font face is represented based on whether and when it is downloaded and ready to use.

Display fonts generally include large types of texts which are used to frame a title. This makes the title more attractive, effective, and ready to read from a long distance as well.

A title is the main characteristic that influences the readers about the writing.

Therefore, the best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.

To learn more about fonts, refer to the link:

https://brainly.com/question/14052507

#SPJ2

Different types of users in a managed network, what they do, their classification based on tasks

Answers

In a  managed network,, skilled can be miscellaneous types of consumers accompanying various roles and blames.

What is the network?

Administrators are being the reason for directing and upholding the network infrastructure. Their tasks involve network arrangement, freedom management, consumer approach control, listening network performance, and mechanically alter issues.

Administrators have high-ranking approach and control over the network. Network Engineers: Network engineers devote effort to something designing, achieving, and claiming the network foundation.

Learn more about   network from

https://brainly.com/question/1326000

#SPJ1

Describe how smartphones communicate. List and describe four popular types of messages you can send with smartphones. Write one well-written paragraph and answer the above question to earn 10 points.

Answers

The way that smartphones communicate is that people connect with each other and with businesses has been changed by mobile messaging. However, users and businesses can choose from a variety of mobile messaging types.

The Kinds Of Mobile Messaging are:

SMS & MMS MessagingPush Notifications.In-App Messages.RCS.

What is the messaging about?

Brief Message Service (SMS): One of the most popular types of mobile communications is SMS. A basic text message sent via a cellular signal is known as an SMS, or short messaging service.

SMS is completely text-based and has a character restriction of 160. Users in the United States who don't have an unlimited messaging package pay cents per message.

Therefore, in Notifications through Push: It's possible that you mistakenly believe that the thing that's flashing on your cell phone's screen is a text message. Similar to SMS messages, push notifications are pop-up windows that appear while you're using your phone or on the lock screen rather than in your inbox with other texts.

Learn more about Mobile Messaging from

https://brainly.com/question/27534262
#SPJ1

A/An_is a series of instructions or commands that a computer follows; used to create software?

Answers

Answer:

Explanation:

A Program is a series of instructions or commands that a computer follows; used to create software

Which of the following is the MOST important reason for creating separate users / identities in a cloud environment?​

Answers

Answer:

Because you can associate with other

Answer:

Explanation:

To avoid cyberbully

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

Computer knowledge is relevant in almost every are of life today. With a
view point of a learning institute, justify these statement.

Answers

Answer:

mainly helps to get educate in computer knoeledge

Explanation:

The effective use of digital learning tools in classrooms can increase student engagement, help teachers improve their lesson plans, and facilitate personalized learning. It also helps students build essential 21st-century skills.

Write the pseudocode for a program that will process attendance records of CA students. The students attend college five days a week. Input values are the student’s name, number, and the time in and time out for each day of the week (i.e. five different times in and times out must be input). If a student attends college more than 36 hours in a week, a congratulatory message is printed. If a student attends college less than 30 hours in a week, a warning message is printed. The output for each student is the name, hours, and the appropriate attendance message. Processing continues until a student number of zero is input. Assume that students always check in and out on the hour. Therefore, timeIn and timeOut will be integer variables (i.e. they represent whole hours, and minutes are ignored).

Answers

Using the knowledge of pseudocodes it will be possible to write a code that calculates the amount of hours worked and giving warnings about it.

Writing a pseudocode we have that:

while

if number == 0

break

hours =0

for i =1 to 5

hours = hours + time_out[ i ] - time_in[ i ]

If hours >36 :

print ( "Name is " ,name)

print( "No of hours are ",hours)

print("Congratulaion! Your working hours are more than 36")

If hours <30 : #

print ( "Name is " ,name)

print( "No of hours are ",hours)

print("Warning !!!")

End loop

See more about pseudocode at brainly.com/question/13208346

#SPJ1

Write the pseudocode for a program that will process attendance records of CA students. The students

In which of the following situations must you stop for a school bus with flashing red lights?

None of the choices are correct.

on a highway that is divided into two separate roadways if you are on the SAME roadway as the school bus

you never have to stop for a school bus as long as you slow down and proceed with caution until you have completely passed it

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

Answers

The correct answer is:

on a highway that is divided into two separate roadways if you are on the OPPOSITE roadway as the school bus

What happens when a school bus is flashing red lights

When a school bus has its flashing red lights activated and the stop sign extended, it is indicating that students are either boarding or exiting the bus. In most jurisdictions, drivers are required to stop when they are on the opposite side of a divided highway from the school bus. This is to ensure the safety of the students crossing the road.

It is crucial to follow the specific laws and regulations of your local jurisdiction regarding school bus safety, as they may vary.

Learn more about school bus at

https://brainly.com/question/30615345

#SPJ1

Each time we add another bit, what happens to the amount of numbers we can make?

Answers

Answer:

When we add another bit, the amount of numbers we can make multiplies by 2. So a two-bit number can make 4 numbers, but a three-bit number can make 8.

The amount of numbers that can be made is multiplied by two for each bit to be added.

The bit is the most basic unit for storing information. Bits can either be represented as either 0 or 1. Data is represented by using this multiple bits.

The amount of numbers that can be gotten from n bits is given as 2ⁿ.

Therefore we can conclude that for each bit added the amount of numbers is multiplied by two (2).

Find more about bit at: https://brainly.com/question/20802846

How does using myNav allow Accenture to help its clients become more sustainable?

Answers

I got you g

Explanation:

Accenture Dispatches myNav® Green Cloud Advisor to Assist Companies Realize Supportability Objectives Through the Cloud. ... Investigate from Accenture has found that moving from on-premise information centers to the open cloud can diminish an enterprise's vitality utilization by 65% and cut carbon outflows by more than 84%

MyNav helps Accenture to help its clients to be more sustainable:

By facilitating the design of cloud solutions that reduce carbon emissions.

What ismyNav Green Cloud Advisor?

This is known to be a tool that helps firms to set up or make cloud solutions that lower carbon emissions and give a background for good and better innovation.

Therefore, The myNav allow Accenture to help its clients become more sustainable by facilitating the design of cloud solutions that reduce carbon emissions.

See options below

How does using myNav allow Accenture to help its clients become more sustainable?

by facilitating design of cloud solutions that reduce carbon emissions

by reorganizing manufacturing facilities to easily calculate carbon emissions

by creating new company initiatives to reduce transportation costs

by devising new regulations for disposing of outdated technology.

Learn more about Accenture from

https://brainly.com/question/25682883

#SPJ9

What data is collected from your reaction time experiment using your
MakeCode micro:bit program?

Answers

The data collected includes the time taken for the user to react and press the button once the micro: bit has been triggered, as well as the number of trials completed and the average reaction time for each trial.

What is MakeCode micro:bit program

MakeCode micro:bit is a block-based programming language and online editor developed by Microsoft. It is used to program the BBC micro:bit, an open source hardware board with an ARM Cortex-M0 processor, accelerometer and magnetometer, Bluetooth, and USB.

MakeCode micro:bit can be used to build games, interactive stories, musical instruments, and much more.

Learn more about micro:bit program here:
https://brainly.com/question/29354598

#SPJ1

can anyone help???

Consider the following website URL: http://www.briannasblog.com. What
does the "http://" represent?
A. FTP
B. Resource name
C. Protocol identifier
O D. Domain name

can anyone help??? Consider the following website URL: http://www.briannasblog.com. Whatdoes the "http://"

Answers

Answer: Protocol identifier

Explanation:

Just took the test and resource name was incorrect. Hope this helps :)

Consider the following website URL: http://www.briannasblog.com. The the "http://" represent the Protocol identifier. Thus, option C is correct.

What is the role of the parts of the  Uniform Resource Locator?

The resource name has been known as or it  have the URL which has the name of the protocol that has been required for one to be able to gain entrance to a resource,

The protocol identifier has been known to be where the URL known which protocol to be used  as the form of the primary entrance means. It has been known to the identify the IP address or domain name.The two part of the Uniform Resource Locator are protocol identifier and the resource name.

A subdirectory has the directory within the directory, which has been used to organize files and other directories. The URL can be broken down into two main parts: the domain name.

Therefore,  two part of the Uniform Resource Locator are protocol identifier and the resource name.

Learn more about Uniform Resource on:

https://brainly.com/question/30074834

#SPJ7

Which of the following is a positional argument?
a) ABOVE
b) MIN
c) AVERAGE
d) MAX

Answers

D) MAX is a positional argument

During the projects for this course, you have demonstrated to the Tetra Shillings accounting firm how to use Microsoft Intune to deploy and manage Windows 10 devices. Like most other organizations Tetra Shillings is forced to make remote working accommodations for employees working remotely due to the COVID 19 pandemic. This has forced the company to adopt a bring your own device policy (BYOD) that allows employees to use their own personal phones and devices to access privileged company information and applications. The CIO is now concerned about the security risks that this policy may pose to the company.

The CIO of Tetra Shillings has provided the following information about the current BYOD environment:

Devices include phones, laptops, tablets, and PCs.
Operating systems: iOS, Windows, Android
Based what you have learned about Microsoft Intune discuss how you would use Intune to manage and secure these devices. Your answer should include the following items:

Device enrollment options
Compliance Policy
Endpoint Security
Application Management

Answers

I would utilise Intune to enrol devices, enforce compliance regulations, secure endpoints, and manage applications to manage and secure BYOD.

Which version of Windows 10 is more user-friendly and intended primarily for users at home and in small offices?

The foundation package created for the average user who primarily uses Windows at home is called Windows 10 Home. It is the standard edition of the operating system. This edition includes all the essential tools geared towards the general consumer market, including Cortana, Outlook, OneNote, and Microsoft Edge.

Is there employee monitoring in Microsoft Teams?

Microsoft Teams helps firms keep track of their employees. You can keep tabs on nearly anything your staff members do with Teams, including text conversations, recorded calls, zoom meetings, and other capabilities.

To know more about BYOD visit:

https://brainly.com/question/20343970

#SPJ1

How does a junction table handle a many-to-many relationship?

by converting the relationship to a one-to-one relationship
by moving the data from the source table into the destination table
by directly linking the primary keys of two tables in a single relationship
by breaking the relationship into two separate one-to-many relationships

Answer: 4
by breaking the relationship into two separate one-to-many relationships

Answers

Answer:

two" (and any subsequent words) was ignored because we limit queries to 32 words.

Explanation:

please mark as brainliest

Answer:

By breaking the relationship into two separate one-to-many relationships

Explanation:

I just did it / edge 2021

To add a block device to a VDO volume, use the following command.

Answers

Truee


:))))))))))
Glad i can help.




:jjjj

what is used to manufacture chips in computer​

Answers

Answer:

The process of creating a computer chip begins with a type of sand called silica sand, which is comprised of silicon dioxide. Silicon is the base material for semiconductor manufacturing and must be pure before it can be used in the manufacturing process.

Explanation:

what is government to business ​

Answers

Government-to-business is a relationship between businesses and governments where government agencies of various status/levels provide services and/or information to a business entity via government portals or with the help of other IT solutions.

Source: https://snov.io/glossary/g2b/

What is a large public computer network through which computers can exchange information at high speed?​

Answers

Answer:

Server

Explanation:

The Question is vauge, but I believe a Server is the word you're looking for. Computer Network could mean various things, in this case im going to assume that by Network, its saying Server. As a server is what allows for high speed interactions between a host computer and a client computer.

Casey is researching the American Revolution and needs to create a short PowerPoint presentation about the major events of the war. Two websites have all the necessary information, but there are several things that Casey should check besides the information on the sites. What are some things that the website should have before Casey uses it for the project? Provide at least three different things.

Answers

Credible website? Can be one

When should students in a study session use flash cards to quiz one another?

while reviewing
while drilling
while discussing
while preparing`

Answers

When drilling, students in a study session use flashcards to quiz one another. thus, Option B is the correct statement.

What do you mean by drill and practice?

The term drill and practice can be described as a way of practice characterized by systematic repetition of concepts, examples, and exercise problems.

Drill and exercise is a disciplined and repetitious exercise, used as an average of coaching and perfecting an ability or procedure.

Thus, When drilling, students in a study session use flashcards to quiz one another. Option B is the correct statement.

Learn more about drill and practice:

https://brainly.com/question/27587324

#SPJ1

3X5
0
Problem 12:
Write a function problemi_2(x,y) that prints the sum and product of the
numbers x and y on separate Lines, the sum printing first.
Nam
RAN
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
def problemi_2(x,y):
X es 2
In
y en 5
print()
print("* + y
print("* * y
In
Trac
Fi
Name
In [C

Answers

Answer:

15

Explanation:

cause when you multiply three by five it will give u 15

how to match this things
1.we will cross bridge when we get to it ------- proactive,not reactive
2.privacy not displayed after collection of data---privacy embeeded into deisgn
3.we will have preticked check box on share my personal data with 3rd party-----visiboty and transparency
4.in acall recording privacy ntoice not shown to participants who were not part of invite but joined----privay by default

Answers

"We will cross the bridge when we get to it" - proactive, not reactive."Privacy not displayed after collection of data" - privacy embedded into design."We will have a pre-ticked checkbox on 'Share my personal data with 3rd party'" - visibility and transparency."In a call recording, privacy notice not shown to participants who were not part of the invite but joined" - privacy by default.

What is proactivity?

A proactive organization anticipates and responds to possible obstacles and opportunities.

This requires a clear vision of where you want to go as well as a strategy. Proactive organizations are forward-thinking and always looking for new ways to innovate and improve.

Learn more about privacy  at:

https://brainly.com/question/27034337

#SPJ1

Other Questions
30. Ramona gets in a lot of fights. Most of the time she starts them and she knows its her fault, but she cannot controllherself when she gets angry 4 DAY31. John gets in a lot of fights with his brother. His brother is aider and he is a buily. He is not respectful to John. Rex and Renaye paid a total of $4,120.00, including principal and interest, over an 18-month period, to pay off their credit card. Calculate how much, on average, they paid in addition to their $172.00 average minimum monthly payment. the command that removes unwanted or unnecessary areas of a picture is Terri Vogel, an amateur motorcycle racer, averages 129.77 seconds per 2.5 mile lap (in a 7 lap race) with a standard deviation of 2.26 seconds. The distribution of her race times is normally distributed. We are interested in one of her randomly selected laps. (Source: log book of Terri Vogel) Let X be the number of seconds for a randomly selected lap. Round all answers to 4 decimal places where possible. a. What is the distribution of X?XN(___________, _________). b. Find the proportion of her laps that are completed between 131.69 and 134.04 seconds________.c. The fastest 4% of laps are under__________seconds.d. The middle 70% of her laps are from seconds________ to_________ seconds. Elisabeth is considering a job as the manager of a piano store. Her utility function is given by U = w - 100, where w is the total of all monetary payments to her and 100 represents the effort cost to her of running the store. Suppose that Elisabeth's effort can be observed by the owners and will always be exerted. Her next best alternative to managing the piano store provides her with utility Un=60. The store's revenue is uncertain: there is a 50% chance the store earns 1,000 and a 50% chance it earns only 400. The store's only cost is Elisabeth's compensation. 6. [5 marks] If the owners decided to offer Elisabeth a quarter of the store's revenue, what would her expected utility be? Would she accept such a contract? Explain. (ii) [5 marks] Suppose instead that the owners decided to offer Elisabeth a fixed salary, plus a bonus of 50 if the store earns 1,000. What minimum fixed salary would she need to be paid so that she accepts the contract? (iii) [5 marks] The aim of the owners is to maximise their expected profit. What compensation package will they offer Elisabeth: a quarter of the store's revenue, or a fixed salary plus a bonus of 50 if the store earns 1,000? Explain your answer. currents in dc transmission lines can be 100 aa or higher. some people are concerned that the electromagnetic fields from such lines near their homes could pose health dangers.a. For a line that has current 180 A and a height of 8.0 m above the ground, what magnetic field does the line produce at ground level?b. What magnetic field does the line produce at ground level as a percent of the earth's magnetic field. which is 0.50 G.c. Is this value of magnetic field cause for worry? Please help ASAP!!!! The average of two numbers is 13.One number is 10.What is the other number? Let G = (V, E), where V = {1,2,3,4}, E = {(1,2), (2,3), (3, 4), (4,1)}. = = = 1. Find the number of subgraphs of G with 1 vertex. 4 2. Find the number of subgraphs of G with 2 vertices. 4 3. Find the number of subgraphs of G with 3 vertices. 4 4. Find the number of subgraphs of G with 4 vertices. 4 PLS SOMEONE HELP ME (03. 05 a clear perspective) english 2 honors FLVS One of the largest online databases is owned by ________.Group of answer choicesThe Federal Trade Commission (FTC)the U.S. Census BureauIBMMicrosoft True or False, Dating relationships tend to be more stable and committed in early adolescence, whereas in late adolescence, relationships tend to become casual and short-lived. In VWX, w = 680 cm, X=80 and V=32. Find the area of VWX, to the nearest 10th of a square centimeter. imagine you are an adviser to the president, and the economy is headed into recession. which policy changes would you recommend to halt the downturn? why is your plan the best? write a memo explaining your recommendations in terms of aggregate supply and aggregate demand. be sure to use correct grammar, spelling, and punctuation. Use the unique factorization theorem to write the following integers in standard factored form. (a) 756 2^2.3^3.7. (b) 819 3^2.7.11 (c) 9,075 3^2.5^2.7 Can someone help me with this puzzle in imperfecto form The first law regarding civil rights was the Civil Rights Act. true or false and The Equal Pay Act prohibits pay differential for those working abroad. true or false. Which of the following is not true about our perceptions of a target?A) Objects that are close together will be perceived together rather than separately.B) Motion, sounds, size and other attributes of a target shape the way we see it.C) Targets are usually looked at in isolation.D) Persons that are similar to each other tend to be grouped together. Wages paid to factory staff is an example of an indirect cost. Select one: True False Find the length of the arc, s, on a circle of radius r interceptedby a central angle . r = 9.2m = 10.5 Which of the following ways to assign employees to activities will more likely lead to a higher labor utilization? Assume demand is unlimited.A. Each employee takes care of all activities involved in the process.B. Each employee specializes in one activity.C. One employee is in charge of all activities; the rest will help out whenever they feel like it.D. One employee takes care of the bottleneck activity and the rest tend to the nonbottleneck activities.