Write a python program that will accept monthly salary amounts greater than zero but less

than or equal to 400,000.00 until the user enters the character ‘e’. After the user

enters the character ‘e’, calculate the net pay of all salaries by deducting income tax at

a rate of 25%, pension of 5% and housing contribution of 2% from each salary

entered. Additionally, print the number of salaries that were entered in the program

along with the number of salaries that exceed 300,000.00

Answers

Answer 1

Answer:

b=0

c=0

lol=list()

while True:

   salary=input("Enter your salary: ")

   if salary=="e" or salary=="E":

       print("Thankyou!!")

       break

   else:

       a=int(salary)

       if a>=300000 and a<=400000:

            c=c+1

       if a<0 or a>400000:

           print("Your salary is either too small or too big ")

       if a>0 and a<=400000:

           a=a-(25/100*a)-(5/100*a)-(2/100*a)

           lol.append(a)

           b=b+1

           if a>=300000:

                c=c+1

print(lol)

print("The number of salaries entered is: "+ str(b))

print("The number of salaries that exceeded 300000 is: "+str(c))

Write A Python Program That Will Accept Monthly Salary Amounts Greater Than Zero But Lessthan Or Equal

Related Questions

High-level modulation is used: when the intelligence signal is added to the carrier at the last possible point before the transmitting antenna. in high-power applications such as standard radio broadcasting. when the transmitter must be made as power efficient as possible. all of the above.

Answers

Answer:

Option d (all of the above) is the correct answer.

Explanation:

Such High-level modulation has been provided whenever the manipulation or modification of intensity would be performed to something like a radio-frequency amplifier.Throughout the very last phase of transmitting, this then generates an AM waveform having relatively high speeds or velocity.

Thus the above is the correct answer.

evaluate (0.999)^8, to six places of decimal​

Answers

Answer:

Here is your answer 0.99202794407

Given the declaration: char a[] = "Hello"; char *p = a, *q; what operations are valid syntactically? Select all that apply. Group of answer choices q = &&a[0]; q = &&a; *q = *(&a[0]); q = &(*p);

Answers

Answer:

The valid operations are:

*q = *(&a[0]);  and q = &(*p);

Explanation:

Given

The above declarations

Required

The valid operations

*q = *(&a[0]);  and q = &(*p); are valid assignment operations.

However, q = &&a[0]; q = &&a; are invalid because:

The assignment operations intend to implicitly cast the char array a to pointer q. C++ does not allow such operation.

Hence, *q = *(&a[0]);  and q = &(*p); are valid

Another way to know the valid operations is to run the program and look out for the syntax errors thrown by the C++ compiler

Write a program that accepts a date in the form month/day/year and outputs whether or not the date is valid. For example, 5/24/1962 is valid, but 9/31/2000 is not. (September has only 30 days.)

Answers

Answer:

Here is the code.

Explanation:

#include <stdlib.h>

#include <stdio.h>

int check_month(int month);

int check_date(int year, int month, int day);

void display_date(int year, int month, int day);

int check_year(int year);

int main (void)

{

int year, month, day;

int valid;

printf("\t\t\t\tEnter Date \n");

printf("\nyear (yyyy): ");

scanf("%d",&year);

printf("month: ");

scanf("%d",&month);

printf("day: ");

scanf("%d", &day);

valid = check_month(month);

if (valid)

{

valid = check_date(year, month, day);

}

if (valid)

{

display_date(year, month, day);

printf("is a valid date. \n");

}

else

{

display_date(year, month, day);

printf("is a illegal date. \n");

}

system ("pause");

return 0;

}

int check_month(int month)

{

int flag;

if (month>=1 && month<=12)

flag = 1;

else

flag = 0;

return flag;

}

int check_date(int year, int month, int day)

{

int valid;

int leep_year;

switch (month)

{

case 1:

case 3:

case 5:

case 7:

case 8:

case 10:

case 12:

if (day>=1 && day<=31)

valid = 1;

else

valid = 0;

break;

case 2:

leep_year = check_year(year);

if (leep_year)

{ if (day>=1 && day<=29)

valid = 1;

else

valid = 0;

}

else

{ if (day>=1 && day<=28)

valid = 1;

else

valid = 0;

}

break;

case 4:

case 6:

case 9:

case 11:

if (day>=1 && day<=30)

valid = 1;

else

valid = 0;

break;

}

return valid;

}

int check_year(int year)

{

int leep_year;

if (year%4==0)

{

if (year%100==0)

{

if (year%400==0)

leep_year = 1; // 1600, 2000

else

leep_year = 0; // 1700, 1800, 1900, 2100

}

else

{

leep_year = 1; // 2004, 1996

}

}

else

{

leep_year = 0; // 2003, 2011

}

return leep_year;

}

void display_date(int year, int month, int day)

{

if (month == 1)

printf("January");

else if (month == 2)

printf("February");

else if (month == 3)

printf("March");

else if (month == 4)

printf("April");

else if (month == 5)

printf("May");

else if (month == 6)

printf("June");

else if (month == 7)

printf("July");

else if (month == 8)

printf("August");

else if (month == 9)

printf("September");

else if (month == 10)

printf("October");

else if (month == 11)

printf("November");

else if (month == 12)

printf("December");

else

printf("The Month enter is not valid.\n");

printf(" %d, %d ",day,year);

}

go sub to VolleyBall_chan on y.o.u.t.u.b.e

Answers

okkkkkkkkkkkkkkkkkkk God bless you!

Answer go to y o u t u b e type in volleyball_chan hit the sub button

Explanation:

Use the drop-down menus to complete the steps for rearranging the layout of a form.

1. Open the form in
✔ Design
view.

2.
✔ Press Ctrl+A
to highlight all of the fields.

3. Under Form Design Tools, select the
✔ Arrange
tab.

4. Choose the Remove Layout button.

5. Reorder and arrange the layout as desired.

6. Review the changes in the
✔ Layout
view.

7. Click Save.

Just did it.

Answers

Answer:

1. Open the Form

2. Arrange tabs

3. Layout view

4. Reoder and arrange the Layout as desired

5. Press Ctrl + A

6. Choose the remove Layout button

7. Click Save

I am not sure

The complete steps for rearranging the layout of a form are in the order:

1, 2, 3, 4, 5, 6, and 7.

What is a form layout?

A form layout is the arrangement of all elements, components, and attributes of your form and the placement of the form on a specific page.

When rearranging the layout of the form, the steps to take are as follows:

Open the form in Design View (this means that the form needs adjustment and rearrangement.Press Ctrl+A (this control all function) helps to highlight all the features in the form layout fields.Under Form Design Tools, select the Arrange tab.Choose the Remove Layout button.Reorder and arrange the layout as desired.Review the changes in the Layout view.Click Save.

Learn more about form layout arrangement here:

https://brainly.com/question/9759966

#SPJ2

how can you explain that algorithm and flowchart are problem solving tools?​

Answers

Answer:

Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.

NO LINKS
Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules.

Rules

1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise,

Example 1:

Enter a value: 11222

Output: Input number is valid

Example 2:

Enter a value: 1234

Output: Input number is invalid​

Answers

Answer:

#include <iostream>

#include <string>

#include <regex>

using namespace std;

int main()

{

   cout << "Enter a 5-digit number: ";

   string number;

   cin >> number;

   bool valid = regex_search(number, regex("^\\d{4}[02468]$"));

   if (valid) {

       valid = stoi(number.substr(0, 1)) + stoi(number.substr(1, 1))  

           < stoi(number.substr(3, 1)) + stoi(number.substr(4, 1));

   }

   cout << number << (valid ? " is valid" : " is invalid");

}

Explanation:

Regular expressions can do all of your checking except for the sum of digits check. The checks are i.m.o. easiest if you don't treat the input as a number, but as a string with digits in it.

The regex means:

^ start of string

\d{4} exactly 4 digits

[02468] one of 0, 2, 4, 6 or 8 (this is what makes it even)

$ end of string

Suppose that in a 00-11 knapsack problem, the order of the items when sorted by increasing weight is the same as their order when sorted by decreasing value. Give an efficient algorithm to find an optimal solution to this variant of the knapsack problem, and argue that your algorithm is correct.

Answers

Answer:

Following are the response to the given question:

Explanation:

The glamorous objective is to examine the items (as being the most valuable and "cheapest" items are chosen) while no item is selectable - in other words, the loading can be reached.

Assume that such a strategy also isn't optimum, this is that there is the set of items not including one of the selfish strategy items (say, i-th item), but instead a heavy, less valuable item j, with j > i and is optimal.

As [tex]W_i < w_j[/tex], the i-th item may be substituted by the j-th item, as well as the overall load is still sustainable. Moreover, because [tex]v_i>v_j[/tex] and this strategy is better, our total profit has dropped. Contradiction.

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: Group of answer choices cybervandalism. driveby downloading. war driving. sniffing. driveby tapping.

Answers

Answer:

war driving.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Generally, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.

War driving can be defined as a form of cyber attack which typically involves having eavesdroppers in a moving vehicle drive by buildings or park outside so as to avail them the opportunity of intercepting a wireless network traffic using a smartphone or laptop computer and illegitimately obtain sensitive user informations for further unauthorized use or to perform other fraudulent activities.

Write a method that accepts a string as an argument and checks it for proper capitalization and punctuation. The method should determine if the string begins with an uppercase letter and ends with a punctuation mark. The method should return true if the string meets the criteria; otherwise it should return false .

Answers

Answer:

The method in Python is as follows:

def checkStr(strng):

   if strng[0].isupper() and strng[-1] == "?":

       return True

   else:

       return False

Explanation:

This defines the method

def checkStr(strng):

This checks if the first character i upper and if the last is "??

   if strng[0].isupper() and strng[-1] == "?":

If the condition is true, the function returns true

       return True

Else, it returns false

   else:

       return False

1. Design pseudocode for a program that will permit a user to store exactly 75 numbers in an array. Create an array big enough to hold the numbers and store each number in the array as it's entered. Be sure to PROMPT the user for each number before it's entered. You do not need to initialize the array. HINTS: Make sure you use a named constant when you declare the array (the number inside the brackets should be a named constant that you declared before the array declaration.) Use a for loop (or while loop if you'd like) to get each number from the user. The module has an example of pseudocode very similar to this problem. You're free to use this pseudocode as you create your program. 2. Identify three advantages of arrays. For each advantage, write at least one complete sentence explaining why the advantage you listed is an advantage. More detail is better. You may use outside resources but be sure to CITE those resources using APA format.

Answers

Answer:

Question 1: The pseudocode is as follows:

int n = 70;

   int intArray[n];

   for(int i = 0; i< n; i++){

       print("Input "+(i+1)+": ")

       input intArray[i];

   }

Question 2: Advantages of array

Indexing in arrays in easyIt can be used to store multiple values of the same typeIt can be used for 2 dimensional inputs

Explanation:

Question 1

This declares and initializes the length of the array

int n = 70;

This declares the array

   int intArray[n];

This iterates through the length of the array

   for(int i = 0; i< n; i++){

This prompts the user for inputs

       print("Input "+(i+1)+": ")

This gets input for each element of the array

       input intArray[i];

   }

Question 2

Indexing: Elements of the array can easily be accessed through the index of the element.

For instance, an element at index 2 of array intArray can be accessed using: intArray[2]

Multiple Values: This is illustrated in question 1 above where we used 1 array to collect input for 70 values.

2 dimensional inputs: Literally, this means that array can be used to represent matrices (that has rows and columns).

An illustration is:

intArray[2][2] = {[0,1],[3,5]}

The above array has 2 rows, 2 columns and 4 elements in total.

What are TWO examples of soft skills?
computer programming
o responsibility
certification
communication
troubleshooting

Answers

Computer programming and throubleshooting

A wireless router is what kind of networking device?
Select one
a. End device
b. Intermediary device
c Peripheral Device
d. Connecting Device​

Answers

Answer:

D, routers enable us to connect to the internet.

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
O No messages will ever be blocked from the user's mailbox.
O Messages can still be blocked at the server level
O Messages cannot be blocked at the network firewall
O Most obvious spam messages will still reach the client computer
ANSWER IM TIMED

Answers

Answer: Most obvious spam messages will still reach the client computer

Explanation:

It should be noted that by default, usually the junk email filter is already set to No Automatic Filtering.

When a user configures No Automatic Filtering in Junk Mail Options, it should be noted that most obvious spam messages will still reach the client computer.

Therefore, the correct option is D.

Any action that causes harm to your computer is called a
1.Security harm
2.Security damage
3.Security risk
4.Security crime​

Answers

Answer:

Security risk.

Explanation:

It is making your computer vulnerable to attacks and less secure.

Any action that causes harm to your computer is called a security risk. That is option 3.

What is security risk in computer?

A computer is an electronic device that can be used to prepare, process and store data.

Security risk in computer is any action undertaken by a computer user that can lead to the loss of data or damage to hardware or software of the computer.

Some of the security risks that predisposes a computer to damage include the following:

unpatched software,

misconfigured software or hardware, and

bad habits such as keeping fluid close to the computer.

Therefore, any action that causes harm to your computer is called a security risk.

Learn more about security risks here:

https://brainly.com/question/25720881

why absolute reference is used in spreadsheet

Answers

Answer:

Absolute reference is used especially to keep the value or content of a column or row constant.

Explanation:

Cell referencing is one common and important concept in spreadsheets. A cell reference or cell address is a value, mostly alphanumeric, used to identify a specific cell or cell range in a worksheet.

In spreadsheets such as that of Microsoft - excel - there are basically two types of referencing.

i. relative referencing

ii. absolute referencing

iii. mixed referencing

Relative reference is the default cell reference. When a relative reference is copied and pasted across multiple cells, it changes depending on its relative position. This type of reference is especially useful when there is a need to apply same formula across multiple rows or columns.

Absolute reference, on the other hand, will not change even though it is copied across multiple cells. It is used especially to keep the value or content of a column or row constant.

Mixed reference is a hybrid of the relative and absolute references.

space bar in computer​

Answers

Answer: Its the one in the middle the really long thingy it looks like a rectangle

Explanation:

ITS IN THE MIDDLE

Horizontal Navigation List Styles
Go to the Horizontal Navigation List Styles section. Karen has added a second navigation list that she wants to display horizontally. For all list items within the horizontal navigation list, create a style rule that displays the items as blocks with a width of 12.5% floated on the left margin.
Here is my code:
/* Horizontal Navigation List Styles */
.horizontal li {
display: block;
width: 12.5%;
float: left;
}
It's coming through as just a line and I have no idea how to fix it, please help!

Answers

Answer:

Explanation:

The best way to do this would be to use the following line of code

clear: left;

This would make sure that there are no floating elements (li's in this scenario) on the left side of each element. Which in this navigation list would be each individual element, causing it to move each element underneath the previous element. Therefore the entire CSS code would be

.horizontal li {

   display: block;

   width: 12.5%;

   float: left;

   clear: left;

   }

An example can be seen in the attached picture below.

A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are taken in the steady state for this system with the following results:

Average packet waiting time in the buffer = 0.05 seconds
Average number of packets in residence = 1 packet
Average packet length = 1000 bits

The distributions of the arrival and service processes are unknown and cannot be assumed to be exponential.

Required:
What are the average arrival rate λ in units of packets/second and the average number of packets w waiting to be serviced in the buffer?

Answers

Answer:

a) 15.24 kbps

b) 762 bits

Explanation:

Using little law

a) Determine the average arrival rate (  λ  ) in units of packets/s

λ  = r / Tr  --- 1

where ; r = 1000 bits , Tr = Tw + Ts = 0.05 + (( 1000 / (64 * 1000 ))  = 0.0656

back to equation 1

λ = 1000 / 0.0656 = 15243.9 = 15.24 kbps

b) Determine average number of packets w to be served

w =  λ * Tw =  15243.9 * 0.05 = 762.195 ≈ 762 bits

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam.
What should he do?
O Configure a safe recipient.
O Configure a blocked sender.
O Configure a safe sender
O Do nothing.

Answers

Answer:

Configure a safe sender

Explanation:

The Safe Sender List in Outlook, is a list of domain names and email addresses that are not managed in the manner spam and junk messages are filtered out and placed in the spam or junk folder. The emails of contacts added to the Safe Senders list are always received in the inbox

Therefore, to ensure that messages from his colleague are never treated as spam, Walt should;

Configure a safe sender.

C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in an expression.#include using namespace std;double FindMax(double num1, double num2) { double maxVal; // Note: if-else statements need not be understood to complete this activity if (num1 > num2) { // if num1 is greater than num2, maxVal = num1; // then num1 is the maxVal. } else { // Otherwise, maxVal = num2; // num2 is the maxVal. } return maxVal;}int main() { double numA; double numB; double numY; double numZ; double maxSum; cin >> numA; cin >> numB; cin >> numY; cin >> numZ; /* Your solution goes here */ cout << "maxSum is: " << maxSum << endl; return 0;}

Answers

Answer:

Replace the comment with:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

Explanation:

Required

The statement to add up the two maximum from the functions

To do this, we have to call FindMax for both arguments i.e.

FindMax(numA,numB) and FindMax(numY,numZ) respectively

Next, use the + sign to add up the returned value.

So, the complete statement is:

maxSum =FindMax(numA,numB)+FindMax(numY,numZ);

See attachment for complete program

Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age > 2] 3 print(greater_than_2) Let's return to our DataFrame of missing puppies, which is loaded as mpr. Let's select a few different rows to learn more about the other missing dogs. 5 # Select the dogs whose Status is equal to Still Missing 6 still_missing = mpr[mpr. Status == 'Still Missing'] 7 print (still_missing) Instructions 100 XP • Select the dogs where Age is greater than 2. 9 # Select all dogs whose Dog Breed is not equal to Poodle 10 not-poodle = mpr [mpr.Dog Breed != 'Poodle'] 11 print(not_poodle) • Select the dogs whose Status is equal to Still Missing. • Select all dogs whose Dog Breed is not equal to Poodle. Run Code Submit Answer * Take Hint (-30 XP) IPython Shell Slides Incorrect Submission Did you correctly define the variable not_poodle ? Expected something different. # Select all dogs whose Dog Breed is not equal to Poodle not_poodle = mpr[mpr.Dog Breed != 'Poodle'] print(not_poodle) File "", line 10 not_poodle = mpr [mpr.Dog Breed != 'Poodle'] Did you find this feedback helpful? ✓ Yes x No SyntaxError: invalid syntax

Answers

Answer:

# the dog dataframe has been loaded as mpr

# select the dogs where Age is greater than 2

greater_than_2 = mpr [mpr. age > 2]

print(greater_than_2)

# select the dogs whose status is equal to 'still missing'

still_missing = mpr[mpr. status == 'Still Missing']

print(still_missing)

# select all dogs whose dog breed is not equal to Poodle

not_poodle = mpr [mpr.breed != 'Poodle']

print(not_poodle)

Explanation:

The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.

The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.

A Key Factor in Controlling Your Anger Is Using Passive behaviour.T/F

Answers

Answer:

The answer is "True".

Explanation:

Assertiveness means that others are encouraged to be open, honest about their thoughts, wishes and feelings so how they can act properly. Assertive behavior: be open and communicate wishes, ideas and feelings, as well as encourage others to do likewise. Please visit our Emotional Regulation page. A major aspect is the ability to control your anger. Once you are quiet or aggressive, work very hard.

The small flash memory used in
protable device like Laptop

Answers

Answer: flash drive

Explanation:

Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.

Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.

write short notes about monitor printer and speaker​

Answers

Answer:

A computer monitor is an electronic device that shows pictures for computers. Monitors often look similar to televisions. The main difference between a monitor and a television is that a monitor does not have a television tuner to change channels. Monitors often have higher display resolution than televisions.

A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.

Speakers receive audio input from the computer's sound card and produce audio output in the form of sound waves. Most computer speakers are active speakers, meaning they have an internal amplifier which allows you to increase the volume, or amplitude, of the sound.

Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
least important to her in designing the company's network?
the tasks performed by each computer on the network
the number of hours each employee works
O the number of computers that will be on the network
the way in which business documents are shared in the organization
TURN IT IN
NEXT QUESTION
ASK FOR HELP

Answers

The way the documents are shared

explain about primary memory?​

Answers

Answer:

Primary memory is computer memory that a processor or computer accesses first or directly. It allows a processor to access running execution applications and services that are temporarily stored in a specific memory location. Primary memory is also known as primary storage or main memory.

Explanation:

In Python, you can specify default arguments by assigning them a value in the function definition.

Answers

Answer:

use the input function to ask them their name like name = input(" enter name?: ") or

def greet(name, msg):

    # This function greets to  the person with the provided message

 print("Hello", name + ', ' + msg)  

greet("Andy", "Good morning!")

def greet(name, msg="Good morning!"):

   # This function greets to

     the person with the

     provided message.  

     If the message is not provided,

     it defaults to "Good

     morning!  

   print("Hello", name + ', ' + msg)

greet("Kate")

greet("Bruce", "How do you do?")

Explanation:

it's one of these three but not sure

Consider the following class, which uses the instance variable balance to represent a bank account balance.

public class BankAccount {

private double balance;


public double deposit(double amount) {

/* missing code */

}

}
The deposit method is intended to increase the account balance by the deposit amount and then return the updated balance. Which of the following code segments should replace /* missing code */ so that the deposit method will work as intended?
a.
amount = balance + amount;
return amount;
b.
balance = amount;
return amount;
c.
balance = amount;
return balance;
d.
balance = amount;, , return balance;,
balance = balance + amount;
return amount;
e.
balance = balance + amount;
return balance;

Answers

Answer:

e.

balance = balance + amount;

return balance;

Explanation:

Required

Code to update account balance and return the updated balance

The code that does this task is (e).

Assume the following:

[tex]balance = 5000; amount = 2000;[/tex]

So, code (e) is as follows:

balance = balance + amount; [tex]\to[/tex]

[tex]balance = 5000 + 2000[/tex] [tex]\to[/tex]

[tex]balance = 7000[/tex]

Here, the updated value of balance is 7000

So: return balance

will return 7000 as the updated account balance

Other options are incorrect

Other Questions
Rotate triangle P 90 clockwise about the point (2, -1). An individual who expects to receive more than $250 of income from sources other than wages meets the requirements for having to file quarterly estimated tax payments.a. Trueb. False The transmission control protocol (TCP) and internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?A-To ensure that communications between devices on the Internet are above a minimum transmission speedB-To ensure that common data is Inaccessible to unauthorized devices on the InternetC- To establish a common standard for sending messages between devices on the IntemetD- To validate the ownership of encryption keys used in Internet communication A department store buys 100 shirts at a cost of $2000 and sells them at a selling price of $25 each. Find the percent markup. Attempt justification of the title of Neto's poem in relation to its content. 4 is a common factor of 28 and 32.O A. TrueO B. False Identify the diameter of the circle. Then find the circumference. Round to two decimal places. (C = 2*pi*r) A population of bacteria contains 150 bacteria in generation 1 and triples inpopulation every generation. This sequence represents the number ofbacteria for the first few generations: Help please please please The Treaty of Versailles signed by Germany and the Allied Powers A closely followed the model of Wilsons 14 points B granted Germany control of the Rhineland C) kept German national borders the same as before the war D) required Germany to accept responsibility for the war. What materials absorb the most solar energy?(Sand, Water, Oil) why is deyy so good at the game its not fair who is the fathers of plants cell Claude holds a large number of shares of Bayou Beauty, a regional brewing company that is considered a likely takeover target by a major international brewer. It would probably be in Claude's financial interest if Bayou Beauty's owners: Group of answer choices looked for smaller brewers to acquire instead of selling to the larger brewer. resisted selling at any price. sold the company to the larger brewer. designed a poison pill to discourage a takeover. 5. An entrepreneur who continues to find new and better ways of doing things is ____.A. Confident B. InnovativeC. PersistentD. Wholesale in what ways were Africans affected by the slave trade? Please help!! This is timed!! For the pair of similar triangles, find the value of x. A pool was filled with 8.2 times 10 Superscript 3 gallons from one hose and 9.4 times 10 Superscript 3 gallons from another hose.What is the total amount of water in the pool? Express the answer in scientific notation.1.76 times 10 Superscript 2 gallons17.6 times 10 Superscript 2 gallons17.6 times 10 Superscript 3 gallons1.76 times 10 Superscript 4 gallons Founded nearly 50 years ago by Alfred Lester-Smith, Beautiful Clocks specializes in developing and marketing a diverse line of large ornamental clocks for the finest homes. Tastes have changed over the years, but the company has prospered by continually updating its product line to satisfy its affluent clientele. The Lester-Smith family continues to own a majority share of the company and the grandchildren of Alfred Lestef-Smith now hold several of the top managerial positions. One of these grandchildren is Meredith Lestef-Smith, the new CEO of the company. Meredith feels a great responsibility to maintain the family heritage with the company. She realizes that the company needs to continue to develop and market exciting new products. Since the 50th anniversary of the founding of the company is rapidly approaching, she has decided to select a particularly special new product to launch with great fanfare on this anniversary. But what should it be?