Write a class with methods to help you balance your checking account (an object class-main method is not in this class). The CheckingAccount Class should have at least two instance variables: the balance and the total service charges, along with methods to get and set each instance variable. You may add other variables and methods if you like. The program should read the initial balance for the month, followed by a series of transactions. For each transaction entered, the program should display the transaction data, the current balance for the account, and the total service charges. Service charges are $0.10 for a deposit and $0.15 for a check. If a check forces the balance to drop below $500.00 at any point during the month, a service charge of $5.00 is assessed but only for the first time this happens. Anytime the balance drops below $50.00, the program should print a warning message. If a check results in a negative balance, an additional service charge of $10.00 should be assessed. A transaction takes the form of an int number (the transaction code), followed by a double number (the transaction amount). If the int number is a 1, then the double number is the amount of a check. If the int number is 2, then the double number is the amount of a deposit. The last transaction is 0 with no number to follow it. Use the JOptionPane to produce the dialog. A sample Input/Output dialogue is provided via the Sample Run Link below. Use proper style and indentation, efficient programming techniques and meaningful variable and method names according to Java conventions.Code Template The following code template will help with this assignment:----------------- Main.java ------------------------public class Main { // global variables // define a CheckingAccount object to keep trach of the // account information public static void main (String[] args) { // defines local variables CS 3 – Spring 2017 E. Ambrosio 2 // get initial balance from the user // perform in a loop until the transaction code = 0 // get the transaction code from the user // and process it with appropriate helper method // When loop ends show final balance to user. } public static __________ getTransCode() { } public static _________ getTransAmt() { } public static __________ processCheck(___________) { } public static __________ processDeposit(___________) { } } --------------------CheckingAccount.java ------------------------- public class CheckingAccount { private double balance; private double totalServiceCharge; public CheckingAccount(double initialBalance) { balance = ______________________; totalServiceCharge = ______________; } public ____________ getBalance() { return _______________; } CS 3 – Spring 2017 E. Ambrosio 3 public void setBalance(double transAmt, int tCode) { if(tCode == 1) balance = ___________________; else //if(tCode == 2) balance = ______________________; } public ____________ getServiceCharge() { return totalServiceCharge; } public void setServiceCharge(double currentServiceCharge) { totalServiceCharge = ___________________________; } }

Answers

Answer 1

Using JAVA knowledge to write code about creating a bank account and using the data to make a transition.

Writing the code in JAVA, we have:

CheckingAccount.java

package bankAccount;

public class Transaction {

int transNumber;

int transId;

double transAmt;

public Transaction(int transNumber, int id, double amount) {

this.transNumber = transNumber;

this.transId = id;

this.transAmt = amount;

}

public int getTransNumber() {

return transNumber;

}

public void setTransNumber(int transNumber) {

this.transNumber = transNumber;

}

public int getTransId() {

return transId;

}

public void setTransId(int transId) {

this.transId = transId;

}

public double getTransAmt() {

return transAmt;

}

public void setTransAmt(double transAmt) {

this.transAmt = transAmt;

}

public String toString() {

return "Transaction Number: " + transNumber + ", Transaction ID: " + transId + " Transaction Amount: " + transAmt;

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write A Class With Methods To Help You Balance Your Checking Account (an Object Class-main Method Is
Write A Class With Methods To Help You Balance Your Checking Account (an Object Class-main Method Is
Write A Class With Methods To Help You Balance Your Checking Account (an Object Class-main Method Is
Write A Class With Methods To Help You Balance Your Checking Account (an Object Class-main Method Is

Related Questions

Alex discovers that the network routers that his organization has recently ordered are running a modified firmware version that does not match the hash provided by the manufacturer when he compares them. What type of attack should Alex categorize this attack as

Answers

A type of attack which Alex should categorize this attack as is: a supply chain attack.

What is a supply chain attack?

A supply chain attack can be defined as a type of attack that typically occurs before software or hardware (equipment) are delivered to a business firm.

In this context, we can infer and logically deduce that a type of attack which Alex should categorize this attack as is: a supply chain attack because the network routers were compromised before they received them.

Read more on chain attack here: https://brainly.com/question/25815754

#SPJ1

1. The biggest advantage of an object created either as an object literal or with the new Object() command is that the object is reusable. True False

Answers

It is true that The biggest advantage of an object created either as an object literal or with the new Object() command is that the object is reusable.

What is JavaScript?

JavaScript refer to a programming language that is use to create a unique session with web browsers supplying information.

Therefore, It is true that The biggest advantage of an object created either as an object literal or with the new Object() command is that the object is reusable.

Learn more about JavaScript below.

https://brainly.com/question/16698901

#SPJ1

Write a function that receives a StaticArray where the elements are in sorted order, and returns a new StaticArray with squares of the values from the original array, sorted in non-descending order. The original array should not be modified.

Answers

Answer:

def sa_sort(arr):

   for i in range(len(arr)):

       for j in range(0, len(arr) - i-1):

           if arr[j] > arr[j + 1]:

               arr[j], arr[j + 1] = arr[j + 1], arr[j]

test_cases = (

   [1, 10, 2, 20, 3, 30, 4, 40, 5], ['zebra2', 'apple', 'tomato', 'apple', 'zebra1'],

   [(1, 1), (20, 1), (1, 20), (2, 20)])

for case in test_cases:

   print(case)

   sa_sort(case)

   print(case)

Explanation:

Write the definition of a function named isPositive, that receives an integer argument and returns true if the argument is positive, and false otherwise. So, if the argument's value is 7 or 803 or 141 the function returns true. But if the argument's value is -22 or -57, or 0, the function returns false.

Answers

Answer:

// header files

#include <iostream>

using namespace std;

// required function

bool isPositive(int num)

{

// check if number is positive

if (num > 0)

{

// return true

return true;

}

// if number is 0 or negative

else

{

// retrun false

return false ;

}

}

// main function

int main() {

// test the function with different values

cout<<isPositive(7)<<endl;

cout<<isPositive(803)<<endl;

cout<<isPositive(141)<<endl;

cout<<isPositive(-22)<<endl;

cout<<isPositive(-57)<<endl;

cout<<isPositive(0)<<endl;

return 0;

}

A ________ occurs when multiple processes or threads read and write data items so that the final result depends on the order of execution of instructions in the multiple processes.

Answers

Answer:

race condition

Explanation:

Write the output of the following:
DECLARE FUNCTION
program
SUM (A, B)

Answers

Answer:

#include<studio.h>

Int main()

{

Int a=10, b= 20, sum;

Sum =a+b;

Printf(“ sum = %d”, sum );

Return 0;

}

Explanation:

Let's Assume A = 10 and B = 20

What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets

Answers

Mobile device management  is a security strategy comprised of products and services that offer remote support for mobile devices.

What is the aim of mobile device management MDM?

Mobile device management (MDM) is known to be a kind of software that helps a lot of IT administrators to run, secure and use policies on smartphones, tablets and other kind of endpoints.

Therefore, Mobile device management  is a security strategy comprised of products and services that offer remote support for mobile devices.

Learn more about management   from

https://brainly.com/question/1276995

#SPJ1

What are the two most common input and output devices?

Answers

Answer:

Keyboard and mouse are the most common input devices.

Monitor and the printer are the common output devices.

What is the potential outcome for an author if she uses a word without realizing its connotation? she may write something that she does not mean she may make a serious spelling error she may force her reader to use a thesaurus she may convince the audience of her writing skills

Answers

A potential outcome for an author who uses a word without realizing its connotation is: A. she may write something that she does not mean.

What is connotation?

Connotation refers to the quality, feeling or an idea which a word brings to the mind of a reader or listener, as well as its literal, dictionary or primary meaning.

This ultimately implies that, a potential outcome for an author who uses a word without realizing its connotation is that he or she may write something that she does not mean or pass across an information she didn't intend to.

Read more on connotation here: https://brainly.com/question/20236939

#SPJ1

A user calls in about a printer issue. You ask for the IPv4 address listed on the printer's configuration report. The user reads an IPv4 address of 169.254.13.50 from the report. What would this tell you

Answers

The  IPv4 address of 169.254.13.50  tells that the printer failed to obtain an IP address from DHCP.

What IP Addresses in Network Printers?

The IP address is known to be one that is special to the printer as it is one that works as a form of an identifier and it is one that informs a computer where to see the printer on the network.

So, one can say that the  IPv4 address of 169.254.13.50  tells that the printer failed to obtain an IP address from DHCP.

See full question below

A user calls in about a printer issues. You ask for the IPv4 address listed on the printer's

configuration report. The user reads an IPv4 address of 169.254.13.50 from the report. What would

this tell you?

a. The printer has a paper jam

b. The printer failed to obtain an IP address from DHCP

c. The printer had too many print jobs sent to it

d. The printer had a valid IP address and should work after a restart

Learn more about printer from

https://brainly.com/question/145385

#SPJ1

What is the difference between asset allocation and diversification?
A) Diversification is much more important than asset allocation in an investment strategy.
B) Asset allocation and diversification are the same.
C) Asset allocation is about risk and diversification is about reward.
D) Asset allocation is the types of investments you choose, diversification is how you spread your investments within each investment type.

Answers

The difference between asset allocation and diversification is that Asset allocation is the types of investments you choose, diversification is how you spread your investments within each investment type.

What is the difference between asset allocation and diversification?

Asset allocation is known to be the percentage of stocks, bonds, and other form of cash in a person's portfolio, while diversification entails the act of spreading one's assets in all of one's asset classes within the given three buckets.

Therefore, The difference between asset allocation and diversification is that Asset allocation is the types of investments you choose, diversification is how you spread your investments within each investment type.

Learn more about asset allocation from

https://brainly.com/question/11744867

#SPJ1

is a programming model that focuses on an application's components and data and methods the components use. Group of answer choices Classical programming Functional programming Procedural programming Object-oriented programming

Answers

Object-oriented programming is a programming model that focuses on an application's components and data and methods the components use.

What is Object-oriented programming (OOP)?

This is known to be a form of  a programming paradigm that is known to be due to the idea of "objects", that often contain data and code.

Note that, Object-oriented programming is a programming model that focuses on an application's components and data and methods the components use.

Learn more about programming model from

https://brainly.com/question/22654163

#SPJ1

You have to write a program that will read a number followed by a series of bit operations from a file and perform the given operations sequentially on the number.
The operations are as follows:
set(x, n, v) sets the nth bit of the number x to v
comp(x, n) sets the value of the nth bit of x to its complement (1 if 0 and 0 otherwise)
get(x, n) returns the value of the nth bit of the number x
The least significant bit (LSB) is considered to be index 0.
Input format: Your program will take the file name as input. The first line in the file provides the value of the number x to be manipulated. This number should be considered an unsigned short. The following lines will contain the operations to manipulate the number. To simplify parsing, the format of the operations will always be the command name followed by 2 numbers, separated by tabs. For the set(x, n, v) command, the value of the second input number (v) will always be either 0 or 1. For the comp(x, n) and get(x, n) commands the value of the second input number will always be 0 and can be ignored. Note that the changes to x are cumulative, rather than each instruction operating independently on the original x.
Output format: Your output for comp and set commands will be the resulting value of the number x after each operation, each on a new line. For get commands, the output should be the requested bit’s value.
Example Execution:
For example, a sample input file "file1.txt" contains the following (except the annotation comments):
5 ---------------------------------# x = 5
get 0 0 -------------------------# get(x, 0), ignoring second value (0)
comp 0 0 ----------------------# comp(x, 0), ignoring second value (0)
set 1 1 --------------------------# set(x, 1, 1)
The result of the sample run is:
$ ./first file1.txt
1
4
6

Answers

The program what will read a number followed by a series of bit operations from file and perform the given operations sequentially on the number is given below.

What is an operation in computer science?

An operation, in mathematics and computer programming, is an action that is carried out to accomplish a given task.

There are five basic types of computer operations:

Inputting, processing, outputting, storing, and controlling.

What is the requested program above?

#include <stdio.h>

#include <fcntl.h>

int main(int argc, char *argv[])

{

  int number, n, v, temp;

  char line[25], fun[10];

  FILE *f = fopen(argv[1], "r");

 

  fgets(line, 24, f);

  sscanf(line, "%d", &number);   //reading the number

  while( fgets(line, 24, f) )

   {

      sscanf(line, "%s %d %d", fun, &n, &v); //reading the commands

      switch(fun[0])           //checking which command to run

      {

          case 'g':    temp = 1;

                      temp = temp<<n;   //shifting for getting that bit

                      printf("%d\n",(number&temp)&&1);

                      break;

          case 's':   temp = 1;

                      temp = temp<<n;   //shifting for setting that bit

                      if(!v)

                      {

                          temp = ~temp;

                          number = number & temp;

                      }

                      else

                      {

                          number = number | temp;

                      }

                      printf("%d\n",number);

                      break;

          case 'c':   temp = 1;

                      temp = temp<<n;   //shifting for complimenting that bit

                      number = number ^ temp;   //xor to complement that bit

                      printf("%d\n",number);

                      break;

          default:printf("not defined");

      }

  }

  return 0;

}

Execution and Output:

terminal-> $ gcc -o first first.c

terminal-> $ ./first file1.txt

1

4

6

Learn more about programs at;
https://brainly.com/question/16397886
#SPJ1

Inheritance means ________. Question 18 options: A) that a class can contain another class B) that data fields should be declared private C) that a variable of supertype can refer to a subtype object D) that a class can extend another class

Answers

Answer:

Inheritance means D) that a class can extend another class.

A computer professional's job involves analyzing computer systems for
businesses and determining whether they are protected from cyber threats.
Which discipline includes this job?
A. Information technology
B. Computer engineering
C. Software engineering
D. Computer science

Answers

Information technology is the discipline that includes analyzing computer systems for businesses and determining whether they are protected from cyber threats. Option A is correct.

What is information technology?

The practice of using computers to generate, process, store, retrieve, and communicate various types of electronic data and information is known as information technology (IT).

Analysis of computer systems for organizations to ascertain if they are secure against cyber attacks is part of a computer professional's work. This position falls within the discipline of information technology.

Unlike personal or recreational technology, IT is primarily utilized in the context of commercial activities. ​

A computer professional's job involves analyzing computer systems for businesses and determining whether they are protected from cyber threats. The discipline included in this job will be Information technology.

Hence option A is correct.

To learn more about information technology refer;

https://brainly.com/question/14426682

#SPJ1

Answer:

a.

Explanation:

Which statement best describes computer systems administrators?
A. They must have excellent organizational skills.
B. They must understand how microprocessors work.
C. They must have knowledge of network security.
D. They must be proficient in multiple computer languages.

Answers

The statement that best describes a computer administrator is, that they must have knowledge of network security.

Computer system administrators

An administrator is basically someone solely responsible for carrying out certain tasks. A computer systems administrator is a designation given to someone who is responsible for computer system-related tasks, such as performing maintenance of computer systems and ensuring the security of information on the systems.

You can learn more about computer systems administrators here  https://brainly.com/question/27129590

#SPJ1

how have the computers contributed in the banking ?

Answers

Answer:

manage financial transactions

Explanation:

through the use of special cash dispensing machines called ATMs used for cash deposit & withdrawal services

_____ are important because they help to ensure data integrity. _____ are important because they help to ensure data integrity. Attributes Relationships Constraints Entities

Answers

Constraints  are important because they help to ensure data integrity.

What does constraint mean?

The term connote a kind of limitation that is often placed on something.

Note that in computing, Constraints  are important because they help to ensure data integrity as one will think twice before trying to manipulate data.

Learn more about Constraints from

https://brainly.com/question/6073946

#SPJ1

list three things that can spoil a printer if they are not of the correct specification and what damage may be caused​

Answers

Answer:

Debris, excess ink splatted around (from refilling probably), and the presence of small objects

Explanation:

contribute to paper jams and cause your printer to work inefficiently. Some printers have self-cleaning functions especially, for printer heads

the most useful site to learn.

https://schoolhouse.world/?ref=u-1ft1ub15nhaj

Answers

Studying online can be made easy when you learn from brainly.com and as such, the most useful site to learn is brainly

What is Is Brainly?

Brainly is known to be an online   education technology  free app that is said to function as a means for student in terms of social learning and it is a community that one ca get from App Store and also Go.ogle Play Store.

Hence, Studying online can be made easy when you learn from brainly.com and as such, the most useful site to learn is brainly.

Learn more about brainly from

https://brainly.com/question/25689052

#SPJ1

What are the different types of data types in python? Write example of each and print there types.

PLEASE HELP

Answers

Numeric, List, Tuple. Inside numeric: Float,string, integer,

What mitigation measures would you recommend for securing loose electronic items such as television sets, computer monitors, and electric appliances

Answers

The mitigation measures that I can recommend for securing loose electronic items such as television sets are:

The use of special hooksThe use of  VelcroThe use of bungee cords, and others.How do one Secure Loose Items?

There are special tools that one can use to secure any item from getting lost or missing.

Note that  The mitigation measures that I can recommend for securing loose electronic items such as television sets are:

The use of special hooksThe use of  VelcroThe use of bungee cords, and others.

Learn more about  mitigation measures  from

https://brainly.com/question/512988

#SPJ1


Stephen is slowing down as he approaches a red light. He is looking in his mirror to switch lanes and misjudges how close Keisha's car is, rear-ending her car. When
they get out and assess the damage, Keisha's bumper will need to be replaced. What type(s) of insurance could Stephen use to cover this accident? Explain.
Krisha had some discomfort in her neck at the time of the accident but thought it was minor and would go away. A week or so after the accident, Keisha finally goes
What t) of insurance could Keisha use to cover this accident?

Answers

The type of insurance that Stephen could use to cover this accident is known as liability coverage

What t) of insurance could Keisha use to cover this accident?

The insurance that Keisha could use to cover this accident is personal injury protection.

In the case above, The type of insurance that Stephen could use to cover this accident is known as liability coverage as damage was one to his property.

Learn more about Property Damage from

https://brainly.com/question/27587802

#SPJ1

____ files involves combining two or more files while maintaining the sequential order of the records.

Answers

Merging files involves combining two or more files while maintaining the sequential order of the records.

What is Merging files?

Merging is known to be the act of of taking two or a lot of groups of data in the method of a file or folder, and adding them together into a single file or folder,

There are different kinds of files that exists. A computer file is one that comes in different format and sizes as well as its function. To merge connote to put two or more things together.

Note that, Merging files involves combining two or more files while maintaining the sequential order of the records.

Learn more about Merging files from

https://brainly.com/question/1206838

#SPJ1

Matt uploads a malware sample to a third-party malware scanning site that uses multiple antimalware and antivirus engines to scan the sample. He receives several different answers for what the malware package is. What has occurred

Answers

The thing that has occurred is that there are a lot of vendors that uses different name for malware packages.

What are malware packages?

Malware that is malicious software, is known to be any program or file that is said to cause harm to a computer or lets say its user. they are: trojan horses, spyware, etc.

Note that, the thing that has occurred is that there are a lot of vendors that uses different name for malware packages.

Learn more about malware from

https://brainly.com/question/399317

#SPJ1

Write, compile, and test the MovieQuoteInfo class so that it displays your favorite movie quote, the movie it comes from, the character who said it, and the year of the movie: I GOT IT DONT WATCH AD.

class MovieQuoteInfo {
public static void main(String[] args) {
System.out.println("Rosebud,");
System.out.println("said by Charles Foster Kane");
System.out.println("in the movie Citizen Kane");
System.out.println("in 1941.");
}
}

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that removes your favorite phrase from the movie. It consists of two classes in which one is driver code to test the MovieQuoteInfo class.

Writing code in JAVA:

public class MovieQuoteInfo { //definition of MovieQuoteInfo class

//All the instance variables marked as private

private String quote;

private String saidBy;

private String movieName;

private int year;

public MovieQuoteInfo(String quote, String saidBy, String movieName, int year) { //parameterized constructor

 super();

 this.quote = quote;

 this.saidBy = saidBy;

 this.movieName = movieName;

 this.year = year;

}

//getters and setters

public String getQuote() {

 return quote;

}

public void setQuote(String quote) {

 this.quote = quote;

}

public String getSaidBy() {

 return saidBy;

}

public void setSaidBy(String saidBy) {

 this.saidBy = saidBy;

}

public String getMovieName() {

 return movieName;

}

public void setMovieName(String movieName) {

 this.movieName = movieName;

}

public int getYear() {

 return year;

}

public void setYear(int year) {

 this.year = year;

}

//overriden toString() to print the formatted data

public String toString() {

 String s = quote+",\n";

 s+="said by "+this.saidBy+"\n";

 s+="in the movie "+this.movieName+"\n";

 s+="in "+this.year+".";

 return s;

}

}

Driver.java

public class Driver { //driver code to test the MovieQuoteInfo class

public static void main(String[] args) {

 MovieQuoteInfo quote1 = new MovieQuoteInfo("Rosebud", "Charles Foster Kane", "Citizen Kane", 1941);//Create an object of MovieQuoteInfo class

 System.out.println(quote1); //print its details

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

You have compressed a 4 MB file into 2 MB. You are copying the file to another computer that has a FAT32 partition. How will you ensure that the file remains compressed

Answers

Answer:

You cannot maintain disk compression on a non-NTFS partition.

Explanation:

A technician is setting up three wireless access points to cover a floor of the office. What channels should the technician use for the access points

Answers

The channels that  the technician should use for the access points is One access point on channel 1 and the other two access points on channels 6 and 11.

What is an access point?

An access point is known to be a tool or a device that forms a wireless local area network, or WLAN, and it is one that is often used in an office or large building.

Note that in the above case, The channels that  the technician should use for the access points is One access point on channel 1 and the other two access points on channels 6 and 11 as it fits into the role.

See options below

A)All three access points on the same channel

B)One access point on channel 1 and the other two access points on channels 6 and 11

C)One access point on channel 1 and the other two access points on channels 3 and 5

D)One access point on channel 1 and the other two access points on channels 10 and 11

Learn more about technician from

https://brainly.com/question/2328085

#SPJ1

b) The automated input technique where keying of input data is originated is sometimes referred to S: (1mk) b ) The automated input technique where keying of input data is originated is sometimes referred to S : ( 1mk )​

Answers

The automated input technique where keying of input data is originated is sometimes referred to as Typing.

What is Typing?

Typing is known to be the act of writing or inputting text through the use or by pressing keys on any typewriter, computer keyboard, etc.

So, The automated input technique where keying of input data is originated is sometimes referred to as Typing.

Learn more about  input technique  from

https://brainly.com/question/20489800

#SPJ1

Hisoka is creating a summary document for new employees about their options for different mobile devices. One part of his report covers encryption. What would Hisoka NOT include in his document

Answers

Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Does Apple use the file based encryption?

It is said that iOS and iPad OS devices are known to often use a file encryption system known to be Data Protection.

Therefore,  Hisoka would not include in his document that is Apple users file-based encryption to offer a higher level of security.

Hence option A is correct.

Learn more about encryption from

https://brainly.com/question/9979590

#SPJ1

Other Questions
trigonometry questionworth 100 points! desperately need help -6-5A. 2C. 332A14-3-2-10-1-21B-3CEDF1 2 3In the similaritytransformation of AABCto ADFE, AABC was dilated bya scale factor of [? ], reflectedacross the [ ], and movedthrough the translaton [ ].B. 1/2D. 1/3 2. David determines that 3 sqrt 2 cis(7pi/4) = -3+3i. When he considers the graphical representation of these numbers, he knows he made an error. Clearly explain in complete sentences what David observed, and where David made his mistake. State the correct rectangular equivalence of 3 sqrt 2 cis(7pi/4). what is the answer (3^3/3^4)^5 Inventory records for Marvin Company revealed the following: Date Transaction Number of Units Unit Cost Mar. 1 Beginning inventory 990 $ 7.27 Mar. 10 Purchase 520 7.77 Mar. 16 Purchase 426 8.37 Mar. 23 Purchase 500 9.07 Marvin sold 1,830 units of inventory during the month. Ending inventory assuming FIFO would be: The respiratory structure that contracts and relaxes to allow air to flow in and out of the lungs is the: Group of answer choices Larynx Epiglottis Diaphragm Alveoli After having read a book on parenting styles, if you wished to raise a friendly and self-reliant child, you would try to adopt a(n) _____ parenting style. What is the product of (56i)(23i) What is the slope of the line graphed below?OA. -OB.312O c. //C.O D. 23/010(-3,-1)(0, 1) The price of a bungalow in 1990 was $850000. If there was a 125% increase in 2000, followed by a 30% decrease in 2013, what was the price in 2013? The question is down below what is the length of each leg of the triangle below? On October 23, 2011, one U.S. dollar was worth 13.65 Mexican pesos.(a) On that date, how many pesos was 81.35 dollars worth?Round your answer to the nearest hundredth of a peso.0 pesos(b) On that date, how many dollars was 91.03 pesos worth?Round your answer to the nearest hundredth of a dollars. I need help with both of these math problems. Use the Law of Cosines to find the specified missing value. Approximate your answer to the nearest tenth.If A = 60, b = 20 ft, c = 30 ft, find B. PLEASE I BEG HELP ASAP PLEASEClaus used this picture to explain why the area of a circle is equal to 2r2. What is NOT true about the parallelogram he formed? Given a fixed level of sales and a constant profit margin, an increase in the accounts payable period can result from: an increase in the cash cycle. a decrease in the operating cycle. an increase in the ending accounts payable balance. an increase in the cost of goods sold account value. a decrease in the average accounts payable balance. 5,679 is invested, part at 12% and the rest at 7%. If the interest earned from the amount invested at 12% exceeds the interest earned from the amount invested at 7% by $407.50, how much is invested at each rate? (Round to two decimal places if necessary.) change the following a voice to passive ,, 1 he has submmited the assignment2 food damage buildings3 food damage do4 she cleans the office 5 She cleaned the office The line on the graph passes through the points A (0, 6) and B (3, 0).YAa) Calculate the gradient of line AB.b) Find the gradient of a line perpendicularto AB.c) Find the equation of the line passingthrough point A and perpendicularto AB.B pls help - Which number is the additive inverse of 5? One-fifth0Negative one-fifth5