consider a memory system with a memory access time of 150 ns and a cache access time of 20ns. If the effective access time is 20% greater than the cache access time, what is the hit ratio H g

Answers

Answer 1

Answer:

H = 0.7333333

Explanation:

Given that:

The memory access time ([tex]T_m[/tex]) = 150 ns

The cache access time [tex](T_c)[/tex] = 20 ns

Effective access time [tex](T_e)[/tex]  = 20% > [tex](T_c)[/tex]

Then, it implies that:

= [tex](T_c)[/tex] + 20% of

=[tex](T_c)[/tex](1+20%)

=[tex](T_c)[/tex](1+ 0.2)

= 20ns × 1.2

= 24ns

To determine the hit ratio H;

Using the formula:

[tex]T_e = T_c \times H+(1-H) \times (T_c + T_m) \\ \\ T_e = HT_c + T_c + T_m -HT_c -HT_m \\ \\ T_e = T_c +T_m - HT_m \\ \\ T_c -T_e = T_m (H-1) \\ \\ H-1 = \dfrac{T_c -T_e}{T_m} \\ \\ H = 1+ (\dfrac{T_c -T_e}{T_m})--- (1)[/tex]

Replacing the values; we have:

[tex]T_c - T_e = 20ns - 24 ns \\ \\ T_c - T_e = -4 ns \\ \\ \dfrac{T_c - T_e }{T_m} = \dfrac{-4 ns}{150} \\ \\ \dfrac{T_c - T_e }{T_m} = -0.02666667[/tex]

From (1)

[tex]H = 1+ (-0.2666667) \\ \\ H = 1 - 0.2666667 \\ \\ \mathbf{H = 0.7333333}[/tex]


Related Questions

Consider the efficiency of locating the kth element in a singly-linked list. How does that compare to locating the kth element in a doubly-linked list

Answers

Answer:

Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list

Explanation:

Assuming that  both lists have firs_t and last_ pointers.

For a singly-linked list ; when locating a kth element, you have iterate through a number of k-1 elements which means that locating an element will be done only in one ( 1 ) direction

For a Doubly-linked list : To locate the Kth element can be done from two ( directions ) i.e. if the Kth element can found either by traversing the number of elements before it or after it . This makes finding the Kth element faster because the shortest route can be taken.

Finding kth element is more efficient in a doubly-linked list when compared to a singly-linked list

Which best describes the condition under which the Unicode output is the same as plain text?

when the text contains no punctuation

when the text contains only characters that are part of Unicode

when the text contains only characters that are part of ASCII

when the text contains no numbers

Answers

Answer:

the answer is c

Explanation:

when the text contains only characters that are part of ASCII- on edge

HAGS

Answer:

when the text contains only characters that are part of ASCII

Explanation:

Which of the following tools helps ensure your document will open in older versions of word

Answers

Answer:

Compatibility Check

Explanation:

Select File > Info.

In the Inspect Document section, select Check for Issues > Check Compatibility.

Click Select versions to show. A check mark that appears next to the name of the mode that the document is in.

Write the recursive method printNumber. The public static method named printNumber takes two parameters. The first parameter is an integer array called nums, and the second is parameter is an even int called index. The return value is an integer that is the product of the even index values in nums whose index is less than or equal to index. Assume that the array nums has length >

Answers

Answer:

The function is as follows:

public static void printNumber(int nums[],int index){

if (index < 0) {

 System.out.print(nums[0]);

 return;  }

if (index % 2 == 0){

    if(index!=0){

 nums[index-2]*=nums[index];}  }

printNumber(nums, index - 1);

}

Explanation:

To do this, we need to save the required product in the 0 index element of the array.

This defines the function

public static void printNumber(int nums[],int index){

If the index variable < 0,

if (index < 0) {

Print the 0 index as the product [i.e. the calculated product]

 System.out.print(nums[0]);

This ends the recursion

 return;  }

If the current array index is even

if (index % 2 == 0){

Check if index is not 0

    if(index!=0){

If both conditions are valid, calculate the product and save the result in index - 2 element. The final result is then saved in the 0 index

 nums[index-2]*=nums[index];}  }

Call the function while the base case has not been executed

printNumber(nums, index - 1);

}

What are the objects in object-oriented programming language?

Answers

Answer:

An object is an abstract data type with the addition of polymorphism and inheritance. Rather than structure programs as code and data, an object-oriented system integrates the two using the concept of an "object". An object has state (data) and behavior (code). Objects can correspond to things found in the real world.

hope it helps ya mate.

ses
te whether the following statements are True or False
LOGO is programming language.
The full form of LOGO is Language Of Great Object.
The turtle in logo is Moving Triangle.
LOGO was designed by Bill Gates.
School Level Computer Science, Grade-4​

Answers

Answer:

Amoung us

Explanation:

When the imposter is sus

(2) What are the limitations of portable computer? ​

Answers

Answer:

Most portable computer are not upgradable and they have a lower specification than most desktop systems

Blockchain technology provides what main benefits for the SUber dApp? The ability to link disparate users The ability to connect users with providers The ability to communicate with other smart devices the ability to communicate with other users

Answers

Answer: The ability to communicate with other users

Explanation:

Blockchain technology refers to a structure which help in the storage of transactional records of people in databases, which is referred to as the chain. It is connected in a network by peer-to-peer nodes.

One main benefit of the Blockchain technology for the SUber dApp is that it gives one the ability to communicate with other users.

Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention

Answers

Answer:

11 bit slot will be needed

Explanation:

The number of prime numbers between 1 through 16

= 2, 3 , 5, 7, 11 and 13

hence we can say 6 stations are to use the shared channel

Given that all the stations are ready simultaneously

The number of bit slots that will be needed to handle the contention will be 11 bits :

slot 1 : 2, 3, 5 , 7, 11 , 13

slot 2 : 2,3, 5, 7

slot 3 : 2, 3

slot 4 : 2 .   slot 5 : 3 .  slot 6 : 5,7.   slot 7 : 5 .   slot 8 : 7.  slot 9: 11,13.  

slot 10 : 11.   slot 11 : 13

All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer

Answers

Answer: Dereferencing a variable that is not a pointer

Explanation:

The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.

Some of the reasons for a fatal execution-time error include:

• Dereferencing a pointer that has not been initialized properly

• Dereferencing a null pointer

• Dereferencing a pointer that has not been assigned to point to a specific address.

It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.

Write a function gcd in assembly language, which takes two parameters, calculates and returns the gcd of those two numbers. You do not need to write the whole program. Just write the function part. The function should use the standard Linux registers for parameters and return values. Add additional comments to describe how you are doing the calculation.

Answers

Answer:

Explanation:

The following is written in Java. It creates the function that takes in two int values to calculate the gcd. It includes step by step comments and prints the gcd value to the console.

       public static void calculateGCD(int x, int y) {

           //x and y are the numbers to find the GCF which is needed first

           x = 12;

           y = 8;

           int gcd = 1;

           //loop through from 1 to the smallest of both numbers

           for(int i = 1; i <= x && i <= y; i++)

           {

               //returns true if both conditions are satisfied

               if(x%i==0 && y%i==0)

                   //once we have both values as true we store i as the greatest common denominator

                   gcd = i;

           }

           //prints the gcd

           System.out.printf("GCD of " + x + " and " + y + " is: " + gcd);

       }

Which attribute is used to specify the URL of a web page in a hyperlink?
O head
O href
O anchor
O img

Answers

Answer:

href

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.

A website refers to the collective name used to describe series of web pages linked together with the same domain name while a webpage is the individual HTML document (single page) that makes up a website with a unique uniform resource locator (URL).

In Web design, the attribute which is used to specify the uniform resource locator (URL) of a web page in a hyperlink is href.

Href is an abbreviation for hypertext reference and it's typically used with the anchor tag to link to another portion of the same web page or other web page of the same website.

For example, the syntax for href is;

<a href="https://www-brainly-com">My Assignment Page </a>

i cant tell if tubbo is a bee or a goat
or could he be human in the smp

Answers

Answer:

Tubbo is a goat or ram on the Dream SMP.

Explanation:

Since Jschlatt was his father and he's a ram, Tubbo is a ram.

Answer:

yes, the first person`s answer is correct! On the dsmp, Tubbo is a goat, since is father was one as well. The only place he is a bee is the osmp, or Origins smp. when Tubbo first joined the dsmp, he was known for his obsession with bees, which carried into his reputation entirely.

:]

You are writing a device driver for an audio device connected to your computer. Your code needs to determine if the device is busy or ready to accept a new command. How can the driver determine this

Answers

Answer: hello the options related to your question is missing attached below is the complete question and options

answer : Read the status register ( A )

Explanation:

To determine if the device is busy or ready to accept a new command the line of action is to write a code that will Read the status register. A status register   is a hardware register which contains the information about the processor of the device ( i.e. whether the processor is busy or ready )

Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.

Answers

Answer:

The program is as follows:

import java.util.*;

public class Main{

public static void backward(int [] Rndarray, int lnt){

    System.out.print("Reversed: ");

    for(int itm = lnt-1;itm>=0;itm--){

        System.out.print(Rndarray[itm]+" ");     } }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int lnt = input.nextInt();

 Random rd = new Random();

 int [] Rndarray = new int[lnt];

 for (int itm = 0; itm < lnt; itm++) {

        Rndarray[itm] = rd.nextInt();

        System.out.print(Rndarray[itm]+" ");

     }

     System.out.println();

 backward(Rndarray,lnt); }}

Explanation:

This defines the backward() method

public static void backward(int [] Rndarray, int lnt){

This prints string "Reversed"

    System.out.print("Reversed: ");

This iterates through the array

    for(int itm = lnt-1;itm>=0;itm--){

Each element is then printed, backwards

        System.out.print(Rndarray[itm]+" ");     } }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This gets the array length

int  n = input.nextInt();

This creates a Random object

Random rd = new Random();

This declares the array

 int [] Rndarray = new int[lnt];

This iterates through the array for input

 for (int itm = 0; itm < lnt; itm++) {

This generates a random number for each array element

        Rndarray[itm] = rd.nextInt();

This prints the generates number

        System.out.print(Rndarray[itm]+" ");

     }

This prints a new line

     System.out.println();

This passes the array and the length to backward() method

 backward(Rndarray,lnt); }}

Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor. (Page EX9-3).

Answers

Answer:

//class declaration

public class Rectangle{

   

   //declare the instance variables - width and height

   double width;

   double height;

   

   

   //the constructor

  public Rectangle(double width, double height){

       

       //initialize the width of the rectangle

       this.width = width;

       

       //initialize the height of the rectangle

      this.height = height;

       

   }

   

   

   //method get_perimeter to compute the perimeter of the rectangle

   public double get_perimeter(){

       

       //compute the perimeter

       //by using the formula 2(width + height)

      double perimeter = 2*(this.width + this.height);

       

       //return the perimeter

       return perimeter;

   }

   

   //method get_area to compute the area of the rectangle

   public double get_area(){

       

       //compute the area

       //by multiplying the width and height of the rectangle

       double area = this.width * this.height;

       

       //return the area

      return area;

   }

   

   

   //method resize to resize the rectangle

   public void resize(double factor){

       

       //resize the width of the rectangle

       //by multiplying the width by the factor

       this.width = this.width * factor;

       

       //resize the height of the rectangle

       //by multiplying the height by the factor

      this.height = this.height * factor;

     

   }

   

}  //end of class declaration

Explanation:

The code above has been written in Java. In contains comments explaining every part of the program.

What is the benefit of using WYSIWYG editor

Answers

A WYSIWYG editor is a program with a rich text editing interface that allows your users to see what the end result will look like (more or less) while they're typing. Without one, users would have to edit raw HTML, which can get in the way of the writing process, to say the least.

Hope it helps! :)

what is a web browser​

Answers

Answer:

web browser

Explanation:

.........;)

difference between a lesson plan and scheme of work​

Answers

SORRY BUT THERE IS No difference at all

It is about that list of topics to be taught and learned for a specific period or programme, while scheme of work is drawn from the syllabus and broken into pieces to be taken on a termly basis. The lesson plan is a further breaking down of work to be done. ... Yet teachers are the key to effective learning

Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data

10
6
6
6
6
6
6
6
6
6
6
Output data
1

Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.

Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0

Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.

Answers

Answer:

???????????

Explanation:

??????:& oh??

Consider the following sequence of page references: 1 2 3 3 4 4 1 4 1 3 4. Determine how many page faults will occur with LRU(Least Recently Used) for each of the following algorithms, assuming there are only 2 physical page frames and that both are initially empty.

Answers

Answer:

7 page faults

Explanation:

I have created a small Java program that can be seen in the attached picture below. This Java program uses an LRU algorithm in order to find the number of page faults within an array of page references from the references given in the question. Using these references, and the java program we can see that there are a total of 7 page faults. This can be seen in the output highlighted by red in the picture below.

Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. Your program compared an equal number of male and female drivers. You could modify the program to allow the user to enter the data. It is important to test your program with a small enough set of data that you can know what the result should be. A different set of observations might result in a larger portion of male drivers being on the phone.

Answers

Answer: A different set of observations might result in a larger portion of male drivers being on the phone.

You could modify the program to allow the user to enter the data.

Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results.

It is important to test your program with a small enough set of data that you can know what the result should be.

Explanation: Got it right

Powerpoint can use existing documents of
A. Word
B. Excel
C. Access
D. All of the Above

Answers

Your answer is:



Your answer is B

Which of these is true of blackhat and whitehat hackers?

Answers

Answer:

Like all hackers, black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems.

Explanation:

that's all. c:

Answer:

c is the answer i hope help you

What factors do network consultants consider when determining the network needs of a business? Use the space provided below to answer this question in five to ten sentences.

Answers

Answer:

1.Support

In most cases, the simpler the network design, the less technical support you'll require for both installation and maintenance. If you need a complex, high-speed network, consider the level of technical assistance available locally. Many small businesses can't justify the cost of full-time IT personnel. Designing a simple network that can be serviced quickly by local technicians should be a primary consideration. If your business demands a complex network beyond the capabilities of local service, design sufficient redundancy in critical network elements to ensure a minimum level of service until repairs can be made.

2.Expansion

Planning for growth in the initial stages can save future expenditures. The price difference, for example, between a 16-port switch and a 32-port switch can be negligible when compared to the cost of purchasing an new switch to replace one that is too small. Most network devices are designed to provide several years of service.

3.Outside Access

Internet access has become all but mandatory for most modern businesses. It's a good idea to consider the type of Internet connection required and the amount and type of support you will receive from your Internet service provider before designing the rest of your network. Some ISPs will provide support and advice on connection speed requirements and security concerns for commercial accounts before installation.

4.Security

Securing a network from outside intrusion or data theft is a primary concern for many companies. While it is possible to eliminate the expense of Ethernet cabling by opting for a wireless network solution, Wi-Fi networking is the least secure method of sharing data and connections. The encryption methods built into most commercial routers, Wireless Encryption Protocol (WEP), Wireless Protected Access (WPA) and the more recent WPA2, can be cracked by skilled hackers. Designing a network with hard-wired Ethernet connections eliminates the risk of intrusion to only those with physical access to the network.

5.Cost

Equipment and maintenance costs are often the first consideration in network design. Fortunately, the cost of hubs, routers and switches are relatively low when compared to the early days of networking.

Write a recursive method called printNumPattern() to output the following number pattern.Given a positive integer as input (Ex: 12), subtract another positive integer (Ex: 3) continuallyuntil 0 or a negative value is reached, and then continually add the second integer until therst integer is again reached. For this lab, do not end output with a newline.

Answers

Answer:

Explanation:

The following is written in Java and prints out the pattern to and from the first num parameter that is passed to the function. Meaning it goes from num1 to 0 and then from 0 to num1 again. It prints all of the values in a single line seperated by a space and a test case was used using the values provided in the question. The output can be seen in the attached picture below.

static void printNumPattern(int n1,int n2){

       System.out.print(n1 + " ");

       if(n1<=0) {

           return;

       } else {

           printNumPattern(n1-n2,n2);

       }

       System.out.print(n1 + " ");

   }

Counting the character occurrences in a file
For this task you are asked to write a program that will open a file called “story.txt”
and count the number of occurrences of each letter from the alphabet in this file.
At the end your program will output the following report:
Number of occurrences for the alphabets:
a was used – times.
b was used – times.
c was used – times…. …and so, on
Assume the file contains only lower-case letters and for simplicity just a single
paragraph. Your program should keep a counter associated with each letter of the
alphabet (26 counters) [Hint: Use array]
Your program should also print a histogram of characters count by adding
a new function print Histogram (int counters []). This function receives the
counters from the previous task and instead of printing the number of times each
character was used, prints a histogram of the counters.

Answers

Answer:

hope this helps!

Explanation:

#include <iostream>

#include <fstream>

using namespace std;

void print_histogram(int counter[26])

{

   for(int i = 0; i < 26; ++i){

       cout << (char)(i+97) << " ";

       for(int j = 0; j < counter[i]; ++j){

           cout << (char)254;

       }

       cout << endl;

   }

}

int main()

{

   int counter[26] = {0};

   string filename = "data.txt";

   char byte = 0;

   // opens file in read mode

   ifstream input_file(filename);

   if (!input_file.is_open()) {

       cerr << "Could not open the file - '"

            << filename << "'" << endl;

       return EXIT_FAILURE; // exit if not opened

   }

   // reads every character from the file

   while(input_file.get(byte)){

       if(byte >= 97 && byte <= 122){

           ++counter[byte-97];

       }

   }

   print_histogram(counter); // required print histogram function

   return 0;

}

real-time system needs to handle two voice calls that each run every 5 msec and consumes 1 msec of CPU time per burst, plus one video at 25 frames/sec, with each frame requiring 20 msec of CPU time. Is the system schedulable

Answers

Answer:

The explanation has follow

Explanation:

The time for a bit smaller than 1 second is one that can try if task can complete the work within second such as

Voice runs every 5 ms may be

1/0.005 that is 200 second

Similarly is a vedio run for 25 frame then it is equal to 25 time per second.

Voice that need 1 ms then it run in 200 ms per second.

Two voice task with one video = 200 ms * 2 + 500ms = 900ms

Two voice may have equall value but high then vedio. It allwoing the task to runa and need a fifo order.

PC GAMER HELP!

What is -everything- I need to have a -GOOD- gaming area for a pc gamer?

Answers

Weird way to ask a question, and my reply is really late but here.

A pretty wide desk so that you have space to move around, see that beautiful pc do it's job, and to add that nice aesthetic to wherever you'd like to put it, (Preferably RGB) Mouse, and Mousepad, RGB keyboard (mechanical if you want), 144hz monitor maybe 1440p but 60hz 1080p is completely fine, you could add a normal office chair for comfort (believe me if you go cheap your back will pay the price after a long gaming session), headset/or speakers whichever you prefer (surround sound is awesome), led lights on the back of your monitor or behind your desk, and that's about all you need.

*SIMPLIFIED BUDGET FRIENDLY VERSION*

L shaped desk, monitor of choice, keyboard/mouse, led lights, and that's it. You could even add a shelf and decorate it if that matters. (I doubt anybody will even read this answer but it's ok because I like talking about electronics)

what is the value of 2020/20×20​

Answers

Answer:.5.05

Explanation:...maths

Answer:

5.05

Explanation:

2020/400= 5.05

HOPE IT HELPED AND GOOD LUCK!!

Other Questions
Which explains how the judiciary can remain independent? Help me rn if any one plz I need help ASAP bro What is the 9th row of Pascal's Triangle?Group of anwers1,10,45,120,200,252,200,120,45,10,11,8,28,56,70,56,28,8,11,9,36,84,126,126,84,36,9,1Pascal's Triangle does not have 9 rows. ANSWER ASAP DONT SEND A FILE WHATS THE TRANSFORMATION?? g Name and describe two possible pathogens that could be responsible. The spinal tap reveals the presence of Gram-negative cocci in the CSF. What would be the likely diagnosis PLESE QUICKLY SOLVE URGENT Charles's Law: This law essentially states that gas volume has a direct relationship to temperature. If a football is inflated indoors during winter and then taken outside, what volume will be occupied inside the football if indoors the football is inflated at 26c taking up 100 cm3, and it is 13c outside? Which conclusion does this excerpt best support? Write in Spanish a minimum of 5 sentences about how todays technology helps you communicate with your friends and family. Use at least four words from the list. Give specific examples that show how you use technology today compared to what you used to do to communicate.Explain how technology helps you get in touch with people.Explain how technology affects the way you relate to others around you. Word Bank referenceYour options are: ayudarse, comunicarse, hablarse, llamarse, para, por CVP analysiswhat-if questions; sales mix issue Miller Metal Co. makes a single product that sells for $32 per unit. Variable costs are $20.80 per unit, and fixed costs total $47,600 per month.Required: Calculate the number of units that must be sold each month for the firm to break even. Assume current sales are $418,000. Calculate the margin of safety and the margin of safety ratio. Calculate operating income if 7,000 units are sold in a month. Calculate operating income if the selling price is raised to $47 per unit, advertising expenditures are increased by $8,000 per month, and monthly unit sales volume becomes 7,600 units. Assume that the firm adds another product to its product line and that the new product sells for $22 per unit, has variable costs of $14 per unit, and causes fixed expenses in total to increase to $83,000 per month. Calculate the firm's operating income if 7,000 units of the original product and 4,300 units of the new product are sold each month. For the original product, use the selling price and variable cost data given in the problem statement. Calculate the firm's operating income if 3,500 units of the original product and 7,800 units of the new product are sold each month. Why operating income is different in parts e and f, even though sales totaled 11,300 units in each case. 23. Which sentence is written with the correct capitalization?a. We couldn't think of anything to do yesterday, so we went to the museum.b. We couldn't think of anything too do yesterday, so we went too the museum.c. We couldn't think of anything two do yesterday, so we went two the museum.d. We couldn't think of anything to do yesterday, so we went too the museum.Ok Please explain which answer is correct and why. Thank you! Tres amigos han corrido una carrera de 20 corredores, sus 3 dorsales eran nmeros de 2 cifras consecutivos y su producto era 2.730 que nmero llevavan los tres amigos ne sus dorsales? Villi are finger-like projections richly supplied with _____. They help in _____ in the small intestine. A) mucus, digestion, food B) blood vessels, digestion of food C) HCI, absorption of food D) blood vessels, absorption of food I think abt my OCs from day to night and now I'm tired of thinking abt them.. any tips, ideas, or opinions? Given the coordinates of the endpoints of line segment GH as the following, G(4, 10)and H(2, 6). Mohamed was trying to find the coordinates of the midpoint of line segment GH.Below is his answer, check whether he is correct or not, if not, spot his mistakes.Mohameds Answer:The formula of the midpoint is: M = x1+ x22, y1+ y22M = 4 +(-2)2, 10 + 62M = (1, 8) 5. Ustedesandar en el gimnasio.limpiar la casa.6. YoUnderline the error in each sentence; then write the corrected sentence out to the right in the space provided.1. Mgusto la clase de Sra. Wayman.2. Mario les gustamos jugar al ftbol en los lunes y martes.3. Vosotros vos gustan los deportes (sports).4. Ella y yo gusta escribir en espaol.5. Mariana y t gustis hacer la tarea.Answer the following questions in COMPLETE SENTENCES in Spanish.1. Qu te gusta hacer?2. A ti te gustan las clases en la escuela?Translate the following question into Spanish.1. Do you all (familiar) like to study a lot? What motivates Victor Frankenstein? Anyone wanna be mutuals? Which of the pairs of angles are vertical angles and thus congruent? A and G A and B C and F D and H