Matlab

K = 92

how do i do
AK= u * s * v'
with this value?

u = 1
s = 12.0048
v = 1

Answers

Answer 1

Answer:

Explanation:

AK = u*s*v

u = 1

s = 12.0048

v=1

K = 92

92A = 1 * 12.0048 * 1

92A = 12.0048             Divide by 92

A = 12.0048/92

A = .1304


Related Questions

Write code that assigns bigValue with the return value of calling the function GetBiggestValue passing number1 and number2 as arguments (in that order). Then, assign bigValue with the return value of calling GetBiggestValue passing bigValue and number3 as arguments (in that order).

Answers

Code:

Function GetBiggestValue(integer value1, integer value2) returns integer result
if value1 > value2
result = value1
else
result = value2

Function Main() returns nothing
integer userVal1
integer userVal2
integer userVal3
integer bigValue

userVal1 = Get next input
userVal2 = Get next input
userVal3 = Get next input

bigValue = GetBiggestValue(userVal1, userVal2)
bigValue = GetBiggestValue(bigValue, userVal3)

Put "Max value: " to output
Put bigValue to output

What cable is used to connect devices together on a network?

Answers

Answer:

Ethernet crossover cable

Explanation:

.

Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.

Answers

if (sales >= 10000)
commission = 0.2;

How can I have a private conversation with no one knowing on my iPhone

Answers

Answer:

Just share a note by making one.

Explanation:

Thank you

what is a computer software

Answers

Software is the digital operations performed by a computer’s hardware.

Answer:

Software is a collection of instructions that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.

Explanation:

Please mark as brainliest

what is the keyboard shortcut to display formulas on the worksheet : a. CTRL+ B. CTRL+: C. CTRL+; D. ALL THE ABOVE

Answers

girl i dont know figure it out pookie

PLZ ANWER FAST!!!!

Use the drop-down tool to select the correct word or phrase.

How fast data travels on the network:

The ability of a network to recover after any type of failure:

Text within a document that is linked to other information available to the reader:

The way the network is laid out, including all the interconnections:

When all computers in a network are connected in a “star” formation:

A type of network that does not use a router but shares data directly between computers:

A unique location for a computer on the network:

Rules for how routers communicate with one another and send data:

Answers

It should be noted that the speed of fast data on a particular network is known as bandwidth.

The ability of a network to recover after any type of failure is known as fault tolerance.

Text within a document that is linked to other information available to the reader is called hypertext.

The way the network is laid out, including all the interconnections is known as network topology.

When all computers in a network are connected in a “star” formation, it's known as a star topology.

A type of network that does not use a router but shares data directly between computers is known as peer-to-peer.

A unique location for a computer on the network is known as the IP address.

Rules for how routers communicate with one another and send data are known as the router protocols.

Learn more about bandwidths on:

https://brainly.com/question/8154174

Answer:

Text within a document that is linked to other information available to the reader is called

✔ hypertext

.

A unique location for a computer on the network is its

✔ IP address

.

The

✔ fault tolerance

is the ability of a network to recover after any type of failure.

The computer that responds to requests from the client computer is known as the

✔ server

.

A

✔ queue

is an ordered list of tasks waiting to be performed.

Explanation:

just did it.

Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a total capacity of 512 words

Answers

size of block = 1 word = 8 bytes

number of blocks = size of cache / size of word

= 512 word /1 word = 512 blocks

In a two-way set associative cache, 2 blocks will form 1 set. So number of index = 512/2=256=2^8

Size of offset = 3 bits

size of index = 8 bits

Size of tag = 64-11=53 bits

Which part of the computer is responsible for managing memory allocation for all applications


A. Word processor


B. Operating system


C. Web browser


D. Intergrated development environment


I think it’s B but I’m not sure so I want to see if I’m right before answering

Answers

Answer:

Option B

Explanation:

The operating system is the type of software that is responsible for managing the processor time and also the memory allocation in the system. The operating system mainldeals with the processor time by scheduling the processor work done in the system.

The OS mainly controls the system and then schedule the execution of various types of function by the central processing unit (CPU). It also controls the memory allocation in the system.

The part of the computer responsible for managing memory allocation for all applications is the operating system. The correct option is B.

What is an operating system?

The operating system is the kind of software in charge of controlling the system's memory allocation and CPU usage. By scheduling the system's processor work, the operating system primarily manages processor time.

The operating system (OS) primarily manages the system and schedules the central processor unit's performance of many types of functions. Additionally, it manages the system's memory allocation.

The CPU is the brain of the computer. It manages all the functions of the computer. It is a small rectangle chip-like structure present inside the box with other parts.

Thus, the part of the computer that is responsible for managing memory is the operating system. The correct option is B.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ2

Is majority intent determined by how many times the same type of result is shown on the search engine result page?

Answers

According to the search engine algorithm, it is True that the majority intent is determined by how many times the same result is shown on the search engine result page.

What is Search Intent?

Search Intent is a term used to describe a user's reason when typing a question or words into a search engine.

Generally, if a user found that no search results match his wants, he would likely not click on any link before performing a similar query search. This would make search engines return with more links that have higher clicks.

Different types of Search IntentInformationalCommercialNavigationTransactional

Hence, in this case, it is concluded that the correct answer is True.

Learn more about Search Engine here: https://brainly.com/question/13709771

Explain why you do not need expensive equipment to take pictures or record video?

Answers

Explanation:

Expensive equipment is not necessary because from a technical perspective as long as the device has a lens and a mic it should be able to take photos and videos.

Answer: No, you don't not need an expensive camera . It may have better quality or worst quality . A phone car record and take pictures. Using a Light Stand Can give you a better lighting and better angle so you don't have to hold it or put it on your table, lap, or desk.

Explanation: A lot of people think you need to own a good camera to take a good photograph. A more expensive camera can help, but certainly is not essential. To answer the question though, it is 'no' – the equipment really doesn't make any difference to the end result, but does affect the process of getting there.

Byeeeeeee Remember to stan BTS , Wear Your Mask, And Drink Water

Write a program that lets the user enter four quarterly sales figures for six divisions of a company. The figures should be stored in a two-dimensional array. Once the figures are entered, the program should display the following data for each quarter: - A list of the sales figures by division - Each division's increase or decrease from the previous quarter (this will not be dis- played for the first quarter) - The total sales for the quarter - The company's increase or decrease from the previous quarter (this will not be dis- played for the first quarter) - The average sales for all divisions that quarter - The division with the highest sales for that quarter Input Validation: Do not accept negative numbers for sales figures.

Answers

Answer: Buisness calendars

Explanation:

Mark’s friends told him about an automated program that sends unsolicited messages to multiple users. Which type of program were Mark’s friends referring to?

Answers

Answer:

Spambots.

Explanation:

Spambots send thousands of messages world wide once they get your information things like email and such and send out unsolicited things out constantly. 

when i use python idle to execute a command, i get this message in shell

RESTART: C:/something something

Answers

Answer:

yes it always come whenever u execute a command

It comes with everyone

The NYC_Bicycle_Counts_2016_Corrected.csv gives information on bike traffic across a number of bridges in New York City. In this path, the analysis questions we would like you to answer are as follows: 1. You want to install sensors on the bridges to estimate overall traffic across all the bridges. But you only have enough budget to install sensors on three of the four bridges. Which bridges should you install the sensors on to get the best prediction of overall traffic

Answers

The ideal would be to install sensors on bridges at the main points of the city, to get a general idea about the traffic in the city.

We can arrive at this answer because:

The bridges that lead to the main points of the city tend to have more movement of people and vehicles.In this case, we can say that these bridges have more intense and constant traffic, which can promote a generalized view of traffic on other bridges.Therefore, by installing sensors to analyze traffic on these bridges, it would be possible to project the data collected from the sensors on less busy bridges, according to the context in which they apply.

In this case, the bridges that lead to commercial centers, highways, tourist places, and other important points of the city, must receive the censors.

You can find more information about traffic at this link:

https://brainly.com/question/10961490

Explain Importance of flowchart in computer programming

Answers

Answer:

Flow charts help programmers develop the most efficient coding because they can clearly see where the data is going to end up. Flow charts help programmers figure out where a potential problem area is and helps them with debugging or cleaning up code that is not working.

creds to study.com (please don't copy it work by word, make sure to paraphrase it. otherwise plagiarism is in the game.)

Explanation:

how is integrating approach in done in teaching

Answers

Answer: Integrative learning is an approach where the learner brings together prior knowledge and experiences to support new knowledge and experiences.

Explanation:

Research.

Making data secure means keeping it secret

Answers

Answer:

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

A company purchases a flood insurance policy for its data center. What is its risk

management decision?

1) Mitigation

2) Acceptance

3) Avoidance

4) Transference

Answers

When a company purchases a flood insurance policy for its data center, the risk management decision it took is: 4) Transference.

Risk management can be defined as a process which involves identifying, evaluating, analyzing and controlling potential risks (threats) that are present in a business, which can serve as an obstacle to its capital, revenues and profits.

Basically, risk management decision typically involves prioritizing cause of action or potential threats, so as to avoid, mitigate or transfer the risk that are likely to arise from such business decisions.

The risks or threats that are faced by a business firm can be transferred to a third-party such as an insurance agency, especially to protect its assets and resources in the event of a natural disaster such as flood, fire, earthquake, etc.

In conclusion, transference is a risk management decision that occurs when  a company purchases a flood insurance policy for its data center.

Read more on risk management here: https://brainly.com/question/13760012

software that converts program written in other language into machine language​

Answers

Software Development Tools

Compiler which is a part of software development tools,converts High level programming language into binary code.(machine language)

why the computer is known as versatile and diligent device ? explain.

Answers

Answer:

Computer is called versatile and diligent device because it is used in almost all the fields for various purposes and it can perform the task repeatedly without loosing its speed and accuracy for long time.

100 POINTS!!!
what kind of laptop is compatible with my pc lol i want to do a dual pc setup and my budget is $500.
PC specs:
AMD Ryzen 7 1700X Eight-Core Processor 3.40 GHz
16 GB DIMM 1400 MHz RAM
Radeon RX580 Series

Answers

Answer:

Hmm.. Try researching, I'm sure you'll find something there..

PLEASE HELP I NEED TO CHECK MY ANSWER ASAPPP

8. Based on the following syntax, what is a likely output for this code snippet if "number" was 35.555

return count(amount_owed. 2)

O 35.555
O 35.55
O 36
O 40

Answers

Functions are code segments that are executed when called or invoked

The function definition is not given; so, the output of the program cannot be outrightly determined.

However, the following are the possible scenarios.

The program would return 35.55 if the 2 represents the digits after decimal.The program would return 36 if the 2 represents the significant digits.

It is unlikely for the program to return (a) 35.555 and (d) 40

Read more about functions at:

https://brainly.com/question/14284563

In Scratch, what is used to create a picture that lies behind the characters in your game?
backgrounds
backdrops
rearviews
landscapes

Answers

Answer:

the answer to this queston is backdrops


Which two of these can be stored in a float variable?
1
C
3.4
true
"hello"

Answers

Answer:

3.4

Explanation:

A float variable can only store a floating-point number which means it can store a number that has a decimal place or a decimal number.

Answer:

float variable is

3.41

Sarah is a detall-oriented programmer. While testing her program, what other skill would she have to apply in order to detect all bugs?

Answers

The answer is Troubleshooting

I ate five M&Ms: red, green, green, red and yellow. Only these three colors are possible. I assume that p(yellow)=3p(green)
What is the estimated probability of green color?

Answers

Answer:

Below is code written in a free CAS (WxMaxima):

The above code creates the probability of 19 or more brown in the sample of 48 for population sizes from 5*19 to 10000 in steps of 5.

Here’s a plot of that data:

The horizontal blue line is the probability for an infinite population size (or, choosing each of the 48 M&Ms with replacement, which I infer is not what you meant). It is calculated using the binomial cdf:

The red curve approaches the blue line asymptotically as the population gets larger.

At population 10000, the red curve is

.

Marci enjoyed the restaurant's meatloaf so much, she asked for the recipe. She wants to make 1/6 of the recipe. How much garlic powder does Marci need?

Answers

Answer:

she needs 1/6 of the garlic powder in the original recipe

Hope This Helps!!!

what is computer hardware part​

Answers

Answer:

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

Explanation:

Answer:

Computer hardware is the physical parts of a computer system that is visible.

The parts of computer hardware is Central processing unit, Monitor, Mouse, Keyboard, Computer data storage, Motherboard, Speakers and Mouse.

Hope that helps. x

Which item would a small business most likely used to meet its daily operational needs ?

Answers

They could use a Budget software

Answer:

Commercial, ready-to-use software

Explanation:

Other Questions
A Biology test has 20 questions and is worth a total of 100 points. The testconsists of True/False questions worth 2 points each and multiple choice questionsworth 7 points each. How many of the test questions are multiple choice and howmany of the test questions are True/ False?.# of true/false questions =# of multiple choice questionsPLEASE HELP ME I WILL GIVE BRAINLY A shirt costing $34 is on sale for 30% off. What is the new price of the shirt after the discount? For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used? Check all that apply. mention the provisional set out the constitution to respect the lingual difference according to the different caste and community Y=-3x+1 y+5=-3(x-2) what do the following two equations represent A)The same line B)Distinct parallel lines C)Perpendicular Lines D)Intersecting, but not perpendicular lines Please give a complete answer to all questions, citing the legal principle to support your answer.I. John owns a clothing store. He sees Jack put several items of clothing into his bulky jacket and then walk past all cash registers on his way out the door without paying for the clothes. He has his security people restrain Jack and put him in a locked room while he calls the police. The police arrive in five minutes and place Jack under arrest for shoplifting. Jack sues John civilly for the tort of unlawful imprisonment. Will Jack win or lose this lawsuit?2. Sarah, Lisa and Adriana are accountants and decide to form the limited liability partnership of SLA Accountants, LLP. They register the partnership with the state. Adriana then conducts an audit of the financial statements of DEF, Inc. and her audit team includes Anna, an audit manager who is under the supervision of Adriana during the course of the audit. Anna makes a major mistake in checking the assets of DEF with the result that the assets listed on the financial statements are overvalued and the liabilities are undervalued. DEF is a publicly traded stock and when the market finds out about this mistake, the value of the shares goes from $50/share to $5/share. The shareholders sue Sarah, Lisa and Adriana for negligence. Sarah and Lisa did not participate in this audit. Adriana states that her personal assets cannot be reached in this lawsuit. Is Adriana right or wrong?3. Sam is a member of the U.S. Armys Special Forces. He owns a Ford GT, the most expensive sports car made by Ford. He has received orders to deploy to the Middle East for a secret assignment that he realizes will be highly dangerous. He has a favorite nephew, Andrew, and he brings the car and the key fob over to Andrews house before he leaves. He tells Andrew that if he does not come back, the car is his. He does come back but when he comes over to see Andrew and asks for the car back, Andrew refuses, claiming this is a completed inter vivos gift and as such, he does not have to give it back. Is Andrew right or wrong? Select the correct answerPart of social health means that you make positive contributions to your community.A.TrueB.False please show work10. If the area of a parallelogram is 690.84 m2 and the height is 20.2 m, what is the length of the base? why did buddhism appeal to many people in various parts of asia? Which of the following groups is affected by tobacco use?A.tobacco usersB.societyC.families of tobacco usersD.all of the above HELP ME PLEASE..!!!!!! Thank youuuuuu What is the purpose of long-term disability insurance? PLEASE HELP ME WITH THIS I WILL MARK BRAIINLIST!! Yoga is mastery over the fluctuations of the mind according to the translation in our book living the sutras. Explain what sutra means to you and how does one achieve yoga in your opinion The illustration shows a light ray striking an object. In the illustration, the light ray striking the object is-. Consider a box divided in half. One side is filled with 1 mol Ne at 300. Kelvin, and the other is filled with 1 mol Rn at 300. Kelvin. A small hole is opened in the divider between the sides, allowing the gases to mix. Suppose it takes 4.0 minutes for the Rn pressure to equilibrate between the two sides. How long (min) will it take the Ne pressure to equilibrate? Enter your answer to 1 decimal place. InstructionsRead the question carefully and select the best answer.Which of the following occurrences is the best example of Wiesel's use of foreshadowing in Chapter 2?O A. the crowded train cars that are rolling towards an unknown destinationO B. the young couples who caress each other on the train as if no one else is thereO C. the selection process where some people are sent immediately to death in the crematoriumO D. Mrs. Schchter's repeated demands that the Jews look at terrible fire that no one can see but her Which major cities share a time zone?A) London and HonoluluB) Washington and DallasC) Washington DC and BostonCD) New York and Fort WorthWhich is it Graph all solutions on a number line and provide the corresponding interval notation. 1. 3x + 5>-4 2. 2x+1> -1 3.5-6y < -1 4.7-9y> 43 5.6-a6 Identifying Errors on a Number Line Find the product using the number line. 3(-6) = A number line going from negative 7 to positive 3. An arrow goes from negative 6 to negative 4, from negative 4 to negative 2, and from negative 2 to 0. What error(s) are shown here? Select three options. The arrows should be a length of 2. The arrows should be a length of 6. The arrows should be pointing in the positive direction. The arrows should start at zero. The arrows should point in the negative direction.