one paragraph essay about early computing device​

Answers

Answer 1

Alternatively, most modern computational devices are “digital”. One of the earliest implementations of a digital system is attributed to Joseph-Marie Jacquard of France in 1801, the Jacquard Loom. He used a punched card to control the weaving actions of a loom, which introduced much more intricate patterns in woven cloth. Jacquard’s approach was a variation on the original punched-card design of Jacques de Vaucanson in 1745. de Vaucanson was a toy maker (most famous for his mechanical duck), and his idea of automating the weaving process was not well accepted by weavers (a situation not unlike that of the modern day computer ink and paint process in traditional animation.)

The punched-card idea was adopted later by Charles Babbage in about 1830 to control his Analytical Engine, and later by Herman Hollerith for tabulating the 1890 census. The Babbage Analytical engine (which was never completed by him) was designed to use Jacquard’s punched cards to control an automatic calculator, which could make decisions based on the results of previous computations. It was intended to employ several features later used in modern computers, including sequential control, branching, and looping.

An assistant to Babbage was Augusta Ada Lovelace (or Lady Lovelace), the daughter of the English poet Lord Byron, and a mathematician, who created a “program” for the Analytical Engine to compute a mathematical sequence known as Bernoulli numbers. Based on this work, Ada is now credited as being the first computer programmer and, in 1979, a modern programming language was named ADA in her honor.

In 1878, Oberlin Smith devised a crude magnetic recording device made of a silk thread covered with steel dust. In theory, when exposed to a magnetic field, the steel dust particles would align with the magnet, creating a digital pattern. Smith applied for a patent, but never followed through with the application. He concluded that he wouldn’t be able to establish a useful pattern on the strings, published his results in 1888, but dropped his investigations.

Further contributions to magnetic recording were few, until Fritz Pfleumer developed the magnetic tape, which was a strip of paper covered with magnetic dust (the first paper tape used was covered with high grade ferric oxide barn paint (rust red), and a cloud of red dust sprayed the air as the tape was used). The German General Electric company bought the patents from Pfluemer and marketed the first true tape recorder, the Magnetophon (meaning “tape recorder” in French) in 1936.

The U.S. Census Bureau was concerned about the difficulty of tabulating the 1890 census. One of its statisticians, Herman Hollerith, envisioned a machine that could automate the process, based on an idea similar to that used in the Jacquard Loom. Hollerith designed punches for his system, which he called the Hollerith Electric Tabulating System. A pin would go through a hole in the census card to make an electrical connection with mercury placed beneath. The resulting electrical current activated a mechanical counter and the information would be tabulated. The tabulating system was featured in an 1890 issue of  Scientific American magazine.

1890 Scientific American cover

The 80 column punch card introduced by Hollerith in 1928 became the standard input medium for computers until the late 1970s when interactive systems became usable. It was sized at 7 3/8 inches wide by 3 1/4 inches high by .007 inches thick. Prior to 1929, this was a standard size for many U.S. banknotes, and Hollerith apparently chose it so that he could store cards in boxes made for the Treasury Department.

“IBM” Card

What became known as the “IBM card” was the source of a popular phrase which became the topic for a great article by Steven Lubar of the Smithsonian in 1992, titled “Do not fold, spindle or mutilate: A cultural history of the punch card.”[2]

Hollerith obtained over 30 patents for his research, but he was not a marketer. He felt he had a choke hold on the census tabulating machine, and he charged the Census Bureau more than it would have cost to do it by hand. As a result, they developed, and in fact patented their own version of the machine. Hollerith almost closed the doors on his company, but he was able to attract a brilliant business mind, Thomas J. Watson, to run it, and his company survived; it would later become International Business Machines (IBM).

If you found this helpful, please mark me brainliest and rate it and thank me thru that button!


Related Questions

Within the the Assignment05.java file, you must define the following static methods. In the main method, you may program any code that wish to test the methods you have been asked to define.
1) Write (define) a static method named displayGreeting, that takes no arguments and returns no value. When this function is called, it should print the text "Hello, and welcome!".
Example:
displayGreeting() will print Hello, and welcome!
2) Write (define) a static method named displayText, that takes a single String argument and returns no value. When this function is called, it should print the value of the argument that was passed to it.
Examples:
displayText("Hello") will print Hello
displayText("123") will print 123
displayText("abc" + "123") will print abc123
3) Write (define) a static method named printTotal, that takes three int arguments. When this function is called, it should print the sum of the three arguments passed to it. This function should return no value.
Examples:
printTotal(0, 0, 0) will print 0
printTotal(0, 1, 3) will print 4
printTotal(100, 23, 2) will print 125
4) Write (define) a static method named getTotal, that takes three int arguments. When this function is called, it should return the sum of the three arguments passed to it as an int.
Examples:
getTotal(0, 0, 0) will return 0
getTotal(0, 1, 3) will return 4
getTotal(100, 23, 2) will return 125
5) Write (define) a static method named getAverage, that takes three int arguments. When this function is called, it should return the average of the three arguments passed to it as a double.
Examples:
getAverage(0, 0, 0) will return 0.0
getAverage(0, 1, 3) will return 1.33333...
getAverage(100, 13, 7) will return 40.0
6) Write (define) a static method named averageLength, that takes three String arguments. When this function is called, it should return the average length (number of characters) of the String arguments passed to it as a double.
Examples:
averageLength("a", "abc", "ab") will return 2.0
averageLength("hello", "goodbye", "monday") will return 6.0
averageLength("wednesday", "tuesday", "monday") will return 7.33
7) Write (define) a static method named lengthOfShortest, that takes two String arguments. When this function is called, it should return the length (number of characters) of the shortest String argument passed to it as an int.
Examples:
lengthOfShortest("abc", "ab") will return 2
lengthOfShortest("hello", "goodbye") will return 5
lengthOfShortest("thursday", "friday") will return 6
8) Write (define) a static method named stringOfStars, that takes one String argument. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument passed to it.
Examples:
stringOfStars("abc") will return "***"
stringOfStars("Hello, world!") will return "*************"
stringOfStars("0123456789") will return "**********"
9) Write (define) a static method named maxStringOfStars, that takes two String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the longest string argument passed to it.
Examples:
maxStringOfStars("a", "abc") will return "***"
maxStringOfStars("hello", "goodbye") will return "*******"
maxStringOfStars("thursday", "friday") will return "********"
10) Write (define) a static method named midStringOfStars, that takes three String arguments. When this function is called, it should return a String of asterisks (*) that is the same length as the string argument with the length that would be in the middle if the lengths of the arguments were arranged in ascending order.
Examples:
midStringOfStars("a", "abc", "ab") will return "**"
midStringOfStars("hello", "goodbye", "yes") will return "*****"
midStringOfStars("123456", "12", "1234") will return "****"

Answers

import java.util.Arrays;

public class Assignment05{

   public static void displayGreeting(){

       System.out.println("Hello, and welcome!");

   }

   public static void displayText(String txt){

       System.out.println(txt);

   }

   public static void printTotal(int a, int b, int c){

       System.out.println(a+b+c);

   }

   public static int getTotal(int a, int b, int c){

       return a+b+c;

   }

   public static double averageLength(String a, String b, String c){

       return (a.length() + b.length() + c.length())/3;

   }

   public static double getAverage(int a, int b, int c){

       return (a + b + c)/3;

   }

   public static int lengthOfShortest(String a, String b){

       if (a.length() > b.length()){

           return b.length();

       }

       else{

           return a.length();

       }

   }

   public static String stringOfStars(String txt){

       String newTxt = "";

       while (newTxt.length() < txt.length()){

           newTxt += "*";

       }

       return newTxt;

   }

   public static String maxStringOfStars(String txt, String txt1){

        String newTxt = "";

       if (txt.length() >= txt1.length()){

         

           while (newTxt.length() < txt.length()){

               newTxt += "*";

       }

           return newTxt;

       }

       else{

             while (newTxt.length() < txt1.length()){

           newTxt += "*";

       }

           return newTxt;

       }

   }

   public static String midStringOfStars(String a, String b, String c){

       String arr[] = {a, b, c};

       Arrays.sort(arr);

       String txt = "";

       while (txt.length() <  arr[1].length()){

           txt += "*";

       }

       return txt;

   }

   public static void main(String[] args){

       displayGreeting();

       displayText("hello");

       printTotal(1,2,3);

       System.out.println(getTotal(2,2,43));

       System.out.println(getAverage(100,13,7));

       System.out.println(averageLength("a", "abc", "ab"));

       System.out.println(lengthOfShortest("abc", "ab"));

       System.out.println(stringOfStars("abcd"));

       System.out.println(maxStringOfStars("a", "bbbbb"));

       System.out.println(midStringOfStars("aaa","aa", "abcedas"));

       

       

   }

}

I hope this helps!

(100 Points!)
The ___ search engine is the most common in use today.
A Boolean-based
B Crawler-based
C algorithm-based
D government-based

Answers

Answer:

B

Explanation

just did it on egd 2020

Answer:

Crawler-based

Explanation:

Just took the review

: process that monitors system traffic and adds resources as needed, within set limits


: process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource


: process to determine what volume a system can handle by comparing its performance to standards in the industry

Answers

Process that monitors system traffic and adds resources as needed, within set limits : Auto scaling

Process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource:  Load balancing

Process to determine what volume a system can handle by comparing its performance to standards in the industry : Benchmarking

What is performance?

Performance is the measure of how effectively a particular task is done or in other words maximum output can be obtained from the input.

The process which monitors system traffic and adds resources as needed, within set limits is called as Auto scaling.

Process that allocates tasks to resources to increase efficiency and avoid overloading any one resource is known as Load balancing.

Process to determine what volume a system can handle by comparing its performance to standards in the industry termed as Benchmarking.

Thus, all the terms are defined.

Learn more about performance.

https://brainly.com/question/15466511

#SPJ2

Which feature transfers a slide show into a word-processing document?
O Video from Website
O Broadcast Slide Show
O Create Handouts
O Format Painter
Hurry
I need help

Answers

Answer:

Create Handouts

Explanation:

Answer:

C    Create Handouts

Explanation:

IM JUST BUILT DIFFRENT

When Nico di Angelo met Mr. D he talked on and on about what?

Answers

Answer:

his mythologic game

Explanation: idk i think

Answer:

The first time he met Mr. D, he called him "The Wine Dude", which irritated the god, but he forgot about it soon after as Nico complimented him.

What type of tool enforces access privileges and helps verify that systems are not being accessed by the unauthorized, or in suspicious ways

Answers

Answer:

Access control tools

Explanation:

Access control tools are used to enforce security measures in the use of computers and computerized systems. These tools ensure that unauthorized people are not allowed to get access to systems or certain places.

Passwords, biometrics, and security tokens are some means that help to regulate access to reserved places and systems. These tools evaluate the identity of users authenticate them and either grant or deny them access to the sites they wish to gain entrance to.

Write a function convert (int n, int base) that uses stack to convert a positive integer n to any base between 2 and 9. You may use simple iteration continually divides the decimal number by base and keeps track of the remainder by using a stack. Please use the methods from ADT Stack below. Write a program to test your function.

Answers

Answer:

import java.util.*;

public class DemoStack {

  public static void convert(int n, int base) {

      Stack<Integer> st = new Stack<Integer>();

      int temp = n ;

      while(n !=0) {

         st.push(n % base);

         n = n / base ;

      }

      System.out.printf("The number %d in base %d : ", temp, base);

      while(!st.isEmpty()) {

          System.out.print(st.pop());

      }

  }

  public static void main(String{} args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter number : ");

      int n = sc.nextInt();

      System.out.print("Enter base : ");

      int base = sc.nextInt();

      convert(n, base);

  }

}

Explanation:

Code is written in JAVA.

This code displays:

1) Enter number : 'x'

2) Enter base : 'y'

3) The number 'x' in base 'y' : abcdefg

write a program to find whether the given number of three digits is an integer such that the sum of the cubes of its digits is equal to the number itself. For example, 371 is since 3**3 7**3 1**3

Answers

Answer:

Written in Python

userinp = int(input("Input: "))

strinp = str(userinp)

total = 0

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

if userinp == total:

    print("True")

else:

    print("False")

Explanation:

This line prompts user for input

userinp = int(input("Input: "))

This line converts user input to string

strinp = str(userinp)

This line initializes total to 0

total = 0

The following iteration sums the cube of each digit

for i in range(0, len(strinp)):

    total = total + int(strinp[i])**3

This if statement checks if the sum of the cube is equal to the user input

if userinp == total:

    print("True") This is executed if true

else:

    print("False") This is executed if false

How many keys are required, if you are to ensure a secret communication for every possible pair of communicating parties

Answers

Answer:

7140 pairs of key

Explanation:

In calculating the number of pairs of keys required, the formula to be used is

n * (n−1) / 2

So for example, if we're to consider 120 users. This means our n is 120, and thus applying it in the formula would yield the calculation

120 * (120-1) / 2 =

120 * 119 / 2 =

14280 / 2 =

7140 key pairs.

Therefore, we boldly state that be number of pairs of key required is 7140

Write a program that accepts the names of three political parties and the number of votes each received in the last mayoral election. Display the percentage of the vote each party received.

Answers

Answer:

Written in Python

parties = []

votes = []

total = 0

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

    total = total + vote

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

Explanation:

This declares an empty list for parties

parties = []

This declares an empty list for votes

votes = []

This initializes total votes to 0

total = 0

The following iteration allows user to enter details for party and corresponding votes

for i in range(0,3):

    party = input("Party: ")

    vote = int(input("Vote: "))

    parties.append(party)

    votes.append(vote)

This calculates the total vote

    total = total + vote

The following iteration prints the required details

for i in range(0,3):

    print(parties[i]+"\t\t\t"+str(votes[i])+"\t\t\t"+str(round((votes[i])*100/total,2))+"%")

__________ is the insertion of bits into gaps in a data stream to frustrate traffic analysis attempts.

Answers

Answer:

Traffic padding

Explanation:

Traffic padding is a way of inserting draw randomly in such a manner that it would be difficult to make traffic analysis by any intruder. It hides the traffic pattern through the insertion of dummy traffic into the network and then the intruder sees it as a different traffic pattern. But what the intruder observes is a cover mode which actually hides the systems real operation mode.

Suppose your user entered a weight of 115.6. What will be the result of the following code?

strWeight = input("Enter your weight in pounds: ")
weight = int(strWeight)
print (weight)

115

115.6

116

An error occurs.

Answers

The answer is 115.

An integer cannot contain decimals points and it rounds down to the nearest whole number.

Answer:

An error occurs.

Explanation:

Answer on edge 2020

PLEASE HURRY!!!
Look at the image below!

Answers

The correct answer is overweight

Discuss briefly the history of ccomputer hardware​

Answers

Answer:

The history of computing hardware covers the developments from early simple devices to aid calculation to modern day computers. ... Early mechanical tools to help humans with digital calculations, like the abacus, were referred to as calculating machines or calculators (and other proprietary names).

Explanation:

Explanation:

Brief History Of Computer. The computer as we know it today had its beginning with a 19th century English mathematics professor name Charles Babbage. ... Other developments continued until in 1946 the first general– purpose digital computer, the Electronic Numerical Integrator and Computer (ENIAC) was built

A ____ database is a storage model in which common entities are stored within separate tables that use unique key identifiers to build relationships among these entities. a.network b.hierarchical c.flat d.relational

Answers

Answer:

Relational Database

Explanation:

The above description explains the relational database. Hence, from the list of given options, option D answers the question.

Analyzing each options:

Flat database makes use of text files to store data

Hierarchical database makes use of tree like structure

Network database makes use of nodes

Only the relational database database organize data in form of table

A variables _____is the part of the program that has access to the variable

Answers

Answer to this is scope

Answer:

A variable's scope is the part of the program that has access to the variable.

The Apple iPhone includes a settings menu where you can toggle various accessibility options on or off:
Bold Text
oo
Button Shapes
What is the minimum number of bits that can represent those 2 options?

Answers

The minimum amount of bits that can represent these two options is 2 bits.

The minimum amount of bits that can represent the two options is 2 bits.

What are accessibility options?

This is known to be the various accessibility features such as text-to-speech, etc. that can be found on any system or mobile phones.

Conclusively, there is the use of these features in a lot of technologies as it serves as  assistive technology. Note that lowest amount of bits that can represent these two options above is 2 bits as that is the only lowest point it can go.

Learn more about bits from

https://brainly.com/question/19667078

Which type of competition features many firms, some variety of goods, low barriers to entry, and little control over prices?

Answers

Answer:

Monopolistic competition

Monopolistic competition is characterized by many firms, some variety in products, few barriers to entry, and little control over prices.

Explanation:

Answer: pure competition

Explanation:

Has protection for proprietary software gone too far, as some critics suggest? (b) If not, why? (c) If so, what are the implications for innovation and competition in the computer industry? (d) How can we achieve an appropriate balance between those who hold legal rights to proprietary information and ordinary users who wish to access, share, and communicate that information? Defend your answer. Please elaborate (beyond a yes or no answer) and provide your "theoretical" rationale in support of your responses. (knowledge)

Answers

Answer:

In the clarification section following, the definition of the query is mentioned.

Explanation:

I acknowledge with maybe some opponents that patent security has gone too far. As tech manufacturers say, they already lost a lot of money in future sales in developed countries owing to software piracy. In reality, most consumers living in developed countries also couldn't manage to spend the rates set by certain tech firms, so firms did not lose any actual sales because, even in some developing countries, their pricey tech would essentially not sell mostly on the free market.So then, due to the extremely insufficient need for individuals, the consequences for creativity and competitiveness in the computing industry are restricted. Only the owners of copyright as well as the users with the resources to manage to offer for the pricey software have the opportunity to use it, as both a consequence of increasingly innovating, the market is restricted and weak.We ought to defined as the tendency doctrines: equal use as well as the first sale, to reach an acceptable compromise between someone who has legitimate rights to confidential information against common people who want to view, distribute, and interact the information. The first selling happens after the artist's concept has indeed been purchased out during the first occasion, during which stage the rightful owner loses ownership of the act's work.

In recent times, innovators including adversaries have focused on the use of reverse engineering, supported either by the reasonable-use doctrine of both the copyright Act.

The stages in the testing process in order are: ___________

a. Customer testing
b. System testing
c. Component testing.

Answers

I’m pretty sure the answer is B

Answer:

The stages in the testing process in order are: ___________

c. Component testing

b. System testing

a. Customer testing .

Explanation:

The first test is the component test (unit test) when the different components of a software are tested by the system developers to measure the individual components are working properly as intended.  This is closely followed by the System testing, usually conducted by the Project Manager.  Finally, the user or customer testing is conducted to ensure that user requirements are met.  It is also called the acceptance test.

Generally, testing is the process of evaluating a system or its component(s) with the intention to finding whether it satisfies the specified user requirements or not.  Testing executes a system in order to identify any gaps, errors, or missing requirements when compared to the actual user requirements.

define operating system

Answers

Answer:

the software that supports a computer's basic scheduling tasks.

Answer:

The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.

Explanation:

Question #3
Dropdown
What type of data is the result of each of the following lines of code?

str(2.34)
O float
O this causes an error
O int
O string

int('2')
O float
O this causes an error
O int
O string

float(2)
O float
O this causes an error
O int
O string

Answers

Answer:

string, int, float

Explanation:

just took it. have a good one!

Answer: string, int, float

Explanation: got it right on edgen

Which programming language hides the complexity of data objects and provides a simplified interface?
A.
machine language
B.
assembly language
C.
procedural language
D.
object-oriented language
E.
RAD

Answers

Answer:

D. Object-Oriented Langauge

Explanation:

Answer:

Your answer is D!

Explanation:

From PLATO!

Suppose there are two links between a source and a destination. The first link has transmission rate 50 Mbps and the second link has transmission rate 10 Mbps. If the only traffic in the network comes from the source, what is the throughput for a large file transfer?

Answers

Answer:

10 Mbps

Explanation:

In this situation, the throughput for a large file transfer would be 10 Mbps. This is because in situations where there are more than one entries going into a single destination the throughput will be the lowest transmission rate as this rate would be the one that is bottlenecking the entire transfer. That is because the other links would be able to handle the speed of the lowest transmission rate but the lowest rate cannot handle the speeds of the other links, thus limiting the throughput.

Question 3 (1 point)
What function would you use to find the average rating I gave a video?
Count
Max
Sum
Min
Average
I think it's average but I want to double check

Answers

It says average in the question so it’s most likely not that, and is probably min.

What's the minimal number of checking bits that are required for the detection and correction of all single-bit errors for 1024 data bits

Answers

Answer:

n>10

Explanation:

In other to get the minimal number of checking bits that are required for the detection and correction of all single-bit errors for 1024 data bits, we will use the expression

2^n - 1 ≥ 1024 + n where:

n is the minimal number of checking bits needed

Let's assume n = 10 to check whether the inequality will be true for the value

Left hand side:

2^n-1

= 2^10-1

= 1024-1

= 1023

For the right Hand of the equation

1024+n

= 1024+10

= 1034

We can see that 2^n - 1 ≥ 1024 is not true for value of n = 10, since 1023<1034.

Hence for the inequality to be true, n must be values greater than 10 i.e n>10 e.g 11 checking bits, etc.

Hence the minimal amount of checking bit required is 11, n>10 means we can also have other values greater than 10.

Write C11 statements that accomplish the following. (6, 7) a. Declare int variables x and y. Initialize x to 25 and y to 18

Answers

Answer:

int x, y;

x = 25;

y = 18;

Explanation:

Programming language: C++

This line declares both variables

int x, y;

This line initializes x to 25

x = 25;

This line initializes y to 18

y = 18;

write a function that will prompt the user for his/her age, // weight, and midicholrean count. Then calculate and return their // jedi level (returns a double). Remember to assign the retuned value // to the variable 'jedi_level'.

Answers

Answer:

Explanation:

Assuming that the jedi_level is calculated by adding the age and weight of the individual and then dividing by the midicholrean count we can use the following Java function to grab all the required info from the user and calculate and return the jedi_level.

public static double JediLevel () {

           Scanner in = new Scanner(System.in);

           System.out.println("Enter age: ");

           double age = in.nextDouble();

           System.out.println("Enter weight: ");

           double weight = in.nextDouble();

           System.out.println("Enter midicholrean count: ");

           double midi = in.nextDouble();

           double jedi_level = (age + weight) / midi;

           return jedi_level;

       }

Explain how it would give a potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack.

Answers

Normally, the attack comes from an intruder who already studied the victim's behavior.

> The attacker can create a database from the history of browsing of the possible victim and then create an attack based on the victim's behavior of browsing.

> If the attacker has access to the user directory he can put the executables files in those folders.

> If the wi-fi is not secured, the attacker can check the network in order to spread a possible worm.

It is possible to see that are several ways which the attacker can use in order to obtain more information from the victims. But that depends on how deeply the attacker studied the victim.

If an  attacker had watched the behaviors of the users on the computer and has plans to attack, they can:

What is an intruder in cyber security?

The person called an Intruder is known to be a kind of online vulnerability scanner that is said to be a form of cyber security weaknesses that a person may have an exposed systems and  data breaches.

Learn more about attacker from

https://brainly.com/question/24956493

Anna is a high school senior who plans to go to UT in the fall. Her parents have saved up some money
for her college education, but it will not be enough to pay for her tuition all four years. She does not
believe she will qualify for need based assistance. What advice would you give Anna?

Answers

Since Anna  does not believe she will qualify for need based assistance, the  advice that I would  give Anna is that she should be hopeful and not worry and then I will tell her also that since her parents cannot afford the fees, then she is more than qualified for it.

What is a need-based aid?

If you have a financial need and meet other eligibility requirements, you may be eligible for need-based funding. More need-based aid than what you actually need is not permitted.

Therefore,   the best advice one can give a person who is having financial issues is that they need to be confidence and also have the courage to believe that when they source for college funds, they will get it.

Learn more about assistance from

https://brainly.com/question/26641539
#SPJ1

Other Questions
PLS HELP HURRY ILL MARK AS BRAINLESS WHATS THE ANSWER TO THESE 3 QUESTIONS A friend tells you she has saved for 7 years and has a present sum of $10,000, which earned at the rate of 8% per year, compounded quarterly. Determine the equivalent amount she had to start with 7 years ago. Which of the following is the best objective summary of the excerpt? by"Opening Ceremonies of the New York and Brooklyn Bridge" expressions that are equivalent to 3^8 x 27 State the x-values where the limit does not exist. A fruit basket is filled with 888 bananas, 333 oranges, 555 apples, and 666 kiwis.For every 333 kiwis, there are 444 ________\_, \_, \_, \_. Jonah bought a 1.5 liter bottle of seltzer. He used 0.8 liter of seltzer in some punch. Which is greater, the amount he used or the amount he has left? Explain how you decided. Replicate the following strand of DNA: Original DNA-- A T G A A C C A T T C A G T A T G G YALL THE ANSWER WAS TRUEE!!!!Question 5 (True/False Worth 1 points) (03.01 MC) Select True or False. The expression 5x 3(2x 4) is equivalent to the expression 12 x. True False Help me please its due today at 12:00 whats the answer to 4.23872345.25135x4446.56559= The sum of twice a number and a larger number is 145. The difference between the numbers is 55. Let x represent the smaller number and y represent the larger number. Which equations represent the situation? Check all that apply. Are fast food companies to blame for the rising obesity population and if people had a better understanding of how bad diet and poor nutrition affects them, would people make more of an effort to eat healthy? 5 paragraphs Always true, sometimes true, or never true: When dividing a dividend that has decimal values I have to move the decimal point. To save water, a household decides to install one large and one smaller water tank. The smaller tank will hold 180 liters less than thelarger tank, and when the larger tank is full, it will be able to completely fill the smaller tank.Solve for m, the capacity of the smaller tank Find the future value at the end of year 3 of the following stream of cash flows received at the end of each year, assuming the firm can earn 17 percent on its investments. A. $16,320 B. $20,127 C. $23,548 D. $27,551 I'll give brainliest to the correct answer so please please please please help me I need these answer to be correct I've already filled out a blank but I need you to fill out the rest, pleaseWrite a two-column proof.Given : KM = 60Proven : KL= 27 Statements Reasons1. KM = 60 1. Given2. KL + LM = KM 2. Segment Addition Postulate3. KL + LM = ___ 3. Substitution Property, (Steps 1, 2)4. KL = 3x - 6, 4. Given LM = 3x 5. 3x - 6 + 3x = 30 5. ______________6. ___ = 60 6. Combine like terms.7. ___x = ___ 7. Addition Property of Equality8. x = ___ 8. Division Property of Equality9. KL = ___ 9. Substitution Property, (Steps 4, 8) Solve for x 16-x=-2 give me the answer HELP :((( PLS ILL MAKE U BRAINLIEST Determine whether each sentence displays agreement between subject and verb or contains an agreement error. Subjects and verbs are boldfaced. Subjects and verbs must agree in number. That is, if the subject of the sentence is singular, the verb must also be singular. If the subject is plural, the verb must be plural. Agreement: The student (singular) with the most votes wins (singular). Agreement Error: The baseball player (singular) wearing the red hat bat (plural) next. ITEM BANK: Move to Bottom I gets to choose the next song.He talks with his mouth full all the time.Popeye eat all his spinach.I can't stand to wait in line anymore!My dog eats too many treats each day.