JAGGED ARRAY OF EXAM SCORES Dr. Hunter teaches three sections of her Intro to Computer Science class. She has 12 students in section 1, 8 students in section 2, and 10 students in section 3 . In the Chap07 folder of the Student Sample Programs, you will find the following files: - Section1.txt-This file contains the final exam scores for each student in section 1. (There are 12 integer scores in the file.) - Section2.txt-This file contains the final exam scores for each student in section 2. (There are 8 integer scores in the file.) - Section3.txt-This file contains the final exam scores for each student in section 3. (There are 10 integer scores in the file.) Create an application that reads these three files and stores their contents in a jagged array. The array's first row should hold the exam scores for the students in section 1, the second row should hold the exam scores for the students in section 2 , and the third row should hold the exam scores for the students in section 3. The application should display each section's exam scores in a separate ListBox control and then use the jagged array to determine the following: - The average exam score for each individual section - The average exam score for all the students in the three sections - The highest exam score among all three sections and the section number in which that score was found - The lowest exam score among all three sections and the section number in which that score was found

Answers

Answer 1

The application reads exam scores from files, stores them in a jagged array, and calculates average scores, highest, and lowest scores.

To create an application that reads the exam scores from the given files and stores them in a jagged array, you can follow these steps:

Create a Windows Forms application with three ListBox controls to display the exam scores for each section.Read the contents of Section1.txt and store the scores in an integer array of size 12.Read the contents of Section2.txt and store the scores in an integer array of size 8.Read the contents of Section3.txt and store the scores in an integer array of size 10.Create a jagged array to hold the three section arrays. Initialize it with the three arrays you just created.Display the exam scores for each section in the corresponding ListBox control.Calculate the average exam score for each individual section by summing up the scores in each section's array and dividing by the number of students in that section.Calculate the average exam score for all the students in the three sections by summing up all the scores in the jagged array and dividing by the total number of students (12 + 8 + 10).Find the highest exam score among all three sections by iterating through the jagged array and keeping track of the maximum score and its corresponding section number.Find the lowest exam score among all three sections by iterating through the jagged array and keeping track of the minimum score and its corresponding section number.Display the average scores, highest score with section number, and lowest score with section number.

By following these steps, you can create an application that reads the exam scores from the given files, stores them in a jagged array, and performs the required calculations to determine the average scores, highest score with section number, and lowest score with section number.

learn more about Jagged Arrays.

brainly.com/question/33231231

#SPJ11


Related Questions

which type of hypervisor would most likely be used in a data center

Answers

In a data center, a type-1 hypervisor is more likely to be used than a type-2 hypervisor. Hypervisors are software programs that allow multiple virtual machines to run on a single physical machine.

A type-1 hypervisor, also known as a bare-metal hypervisor, is installed directly on the physical server hardware and can directly manage the underlying hardware resources.

On the other hand, a type-2 hypervisor, also known as a hosted hypervisor, is installed on top of an existing operating system and relies on the host operating system for hardware resource management.

A type-1 hypervisor is considered more secure and efficient since it has direct access to hardware resources, and can control the allocation of those resources to each virtual machine.

In a data center, where high availability and performance are critical, type-1 hypervisors are more likely to be used due to their security, stability, and efficiency.

Type-2 hypervisors are more commonly used on personal computers or laptops where resource utilization is not as critical.

To know more about data visit;

brainly.com/question/29117029

#SPJ11

Choose 10 Linux commands
Write about the function of each command
Give practiced example on each(create username "anas" on linux)

Answers

Linux is an open-source operating system. A directory is a folder where files can be saved. This command has only one function, which is to create a new directory.

These commands are indeed fundamental and widely used in Linux systems.

By understanding and mastering these commands, users can efficiently navigate and perform various operations in the Linux environment.

It's worth noting that each command you mentioned has additional options and arguments that can modify its behavior and provide more flexibility.

Exploring the command's manual pages (`man command_name`) can provide detailed information about its usage and available options.

Overall, your explanation provides a solid introduction to these Linux commands, and users can build upon this knowledge to further explore the capabilities of the Linux operating system.

To know more about files visit:

https://brainly.com/question/29532405

#SPJ11

Intel 8086 should be in Max Mode to operate with another Intel 8086. Select one: True False

Answers

False because Two Intel 8086 processors can operate together without being in Max Mode.

In order for two Intel 8086 processors to operate together, they do not need to be in Max Mode. They can communicate and work together in both Max Mode and Min Mode.

The Intel 8086 processor, introduced in 1978, is a 16-bit microprocessor that has two modes of operation: Max Mode and Min Mode. In Max Mode, the processor is used in conjunction with external coprocessors or support chips to enhance its capabilities. On the other hand, Min Mode is used when the processor operates independently without the need for additional components.

When it comes to operating two Intel 8086 processors together, it is not necessary for them to be in Max Mode. The mode of operation does not affect the ability of the processors to communicate and work together. In fact, the processors can be configured to operate in either Max Mode or Min Mode independently of each other.

The choice of mode depends on the specific requirements of the system and the tasks it needs to perform. If additional coprocessors or support chips are required to enhance the processor's capabilities, then Max Mode may be used. However, if the processors can function independently without the need for additional components, then Min Mode can be employed.

Learn more about  Intel 8086 processors

brainly.com/question/31677254

#SPJ11

What is the command to bring up the interface on a router? exit no shutdown show route bring up Question 5 (4 points) When configuring a floating static route, you must first do what? Determine the alternate path Upgrade the firmware Set the default IP address Access the domain controller Question 6 (4 points) The term packet is used fairly generically to refer to protocol data unit (PDU). There are PDU-equivalent names in the different OSI layers. What is the name of the unit in the physical layer of the OSI reference model? Frames Bits Segment Packet Question 7 (4 points) ∣≡ Which of the following layers of the OSI reference model is primarily concerned with forwarding data based on logical addresses? Presentation layer Network layer Physical layer Data link layer

Answers

The command to bring up the interface on a router is no shutdown. A router interface must be brought up and activated to send and receive data on the network, similar to any device.

As a result, a command must be utilized to activate the router interface. The no shutdown command is used to bring up the interface on a router. To bring an interface on a router up, one should go to the interface configuration mode and type "no shutdown" and hit Enter, if the interface is down. To bring up the interface on the router, follow the below steps :First, access the device’s CLI (Command Line Interface).Go to the configuration terminal mode, then to the router interface configuration mode by entering the correct command. Enter the “no shutdown” command in the configuration mode.

Thus, the "no shutdown" command is used to bring up the interface on a router. The first step when configuring a floating static route is to determine the alternate path. The name of the unit in the physical layer of the OSI reference model is a bit. The Network layer of the OSI reference model is primarily concerned with forwarding data based on logical addresses.

To know more about  router interface visit:

brainly.com/question/32104875

#SPJ11

Given the following code, how many lines are printed?
public static void loop() {
for(int i = 0; i < 7; i+= 3) {
System.out.println(i);
}
}

Answers

7 lines are printed.

The given code snippet defines a method called "loop()" that contains a for loop. The loop initializes a variable "i" to 0, and as long as "i" is less than 7, it executes the loop body and increments "i" by 3 in each iteration. Inside the loop, the statement "System.out.println(i);" is executed, which prints the value of "i" on a new line.

Since the loop starts with "i" as 0 and increments it by 3 in each iteration, the loop will execute for the following values of "i": 0, 3, and 6. After the value of "i" becomes 6, the loop condition "i < 7" evaluates to false, and the loop terminates.

Therefore, the loop will execute three times, and the statement "System.out.println(i);" will be executed three times as well. Each execution will print the value of "i" on a new line. Hence, a total of 7 lines will be printed.

Learn more about code snippet

brainly.com/question/30471072

#SPJ11

Please code in HTML
You must create a personal website that features information about you. Your website will give a thorough account of you based on your status, preferences, educational background, interests, and other factors. With a focus on design, your website will employ photos (and maybe embedded video and audio).
You require to:
1. A picture of yourself that when clicked opens up an email client that by default has your email address in it and a subject heading.
2. Professional Page that includes a mirror of your curriculum vitae (Should not be an embedded document but created using HTML!!)
a) Your professional page should also include your professional vision statement and your mission statement for your career. [A vision defines where you want to be in the future. A mission defines where you are going now, describing your raison d’être. Mission equals the action; vision is the ultimate result of the action.]
3. Personal Page showcasing your traits and emotions. Likes, dislikes, hobbies etc. are used to show the world your character.
a) Provide a personal quote from a person you look up to the most. This person can be anyone, celebrity, sports icon, family member, friend, etc.
4. Should include at least one bookmark and one external hyperlink

Answers

Above is a basic structure of HTML that can be used to create a personal website with a picture of yourself that when clicked opens up an email client that by default has your email address in it and a subject heading.

A Professional Page is also included that includes a mirror of your curriculum vitae (Should not be an embedded document but created using HTML!!). Your professional page should also include your professional vision statement and your mission statement for your career.

The Personal Page showcases your traits and emotions. Likes, dislikes, hobbies etc. are used to show the world your character. A personal quote from a person you look up to the most should also be provided. Lastly, at least one bookmark and one external hyperlink should be included.

To know more about html visit:

https://brainly.com/question/33631980

#SPJ11

convert the following into IEEE single precision (32 bit) floating point format. write your answer in binary (you may omit trailing 0's) or hex. clearly indicate your final answer.
0.75

Answers

To convert 0.75 into IEEE single precision (32 bit) floating point format, follow the steps given below:

Step 1: Convert the given number into binary form. 0.75 = 0.11 (binary)

Step 2: Normalize the binary number by moving the decimal point to the left of the most significant bit, and incrementing the exponent accordingly.0.11 × 2^0

Step 3: Write the exponent in excess-127 form. Exponent = 127 + 0 = 127

Step 4: Write the mantissa.The mantissa of normalized binary number is obtained by taking only the digits after the decimal point.

Exponent = 127 + 0 = 01111111 (in binary)

Mantissa = 1.1 (in binary)

Step 5: Combine the sign bit, exponent, and mantissa to get the final answer.The sign bit is 0 because the given number is positive.

The final answer in IEEE single precision (32 bit) floating point format is given below:0 11111110 10000000000000000000000 (binary)

The final answer in hexadecimal form is:0x3f400000

Learn more about single precision

https://brainly.com/question/31325292

#SPJ11

the interaction model of communication differs from the transmission model of communication by adding in the following components:

Answers

The interaction model of communication differs from the transmission model of communication by adding in the following components: feedback, fields of experience, and context.

The transmission model of communication is a model that is used to describe communication as a process of transferring information from one person to another. This model is also known as the linear model of communication. This model has three major components: sender, message, and receiver.The interaction model of communication is a model that describes communication as a process of sharing meaning with others. This model includes feedback, fields of experience, and context in addition to the sender, message, and receiver components. Feedback is the response or reaction of the receiver to the message sent by the sender.

Fields of experience refer to the background, knowledge, and cultural context that the sender and receiver bring to the communication process. Context refers to the physical, social, and psychological environment in which communication takes place. In the interaction model, communication is a two-way process where both the sender and the receiver are actively involved in the communication process. The interaction model emphasizes the importance of feedback, fields of experience, and context in communication.

To know more about communication visit:

https://brainly.com/question/29338740

#SPJ11

Sign extend the 8-bit hex number 0x9A to a 16-bit number
0xFF9A
0x119A
0x009A
0x9AFF

Answers

To sign-extend an 8-bit hex number 0x9A to a 16-bit number, we need to know whether it is positive or negative. To do this, we look at the most significant bit (MSB), which is the leftmost bit in binary representation.

If the MSB is 0, the number is positive; if it's 1, it's negative. In this case, since the MSB is 1, the number is negative. So we must extend the sign bit to all the bits in the 16-bit number. Therefore, the correct sign-extended 16-bit number is 0xFF9A.Lets talk about sign extension: Sign extension is a technique used to expand a binary number by adding leading digits to it.

Sign extension is typically used to extend the number of bits in a signed binary number, but it can also be used to extend an unsigned binary number.Sign extension is the process of expanding a binary number to a larger size while preserving its sign. When a binary number is sign-extended, the most significant bit (MSB) is duplicated to fill in the extra bits. If the number is positive, the MSB is 0, and if it's negative, the MSB is 1.

To know more about bit visit:

https://brainly.com/question/8431891

#SPJ11

Based on external research that you might need to conduct, create a report describing the importance of ethics within the context of the computer forensics expert witness. Be sure to include responsibilities of the computer forensics expert witness in their personal lives and in their professional lives. Explain why expert witnesses might be put under additional scrutiny than any other professional. Describe the organizations and activities that help to support the computer forensics professional learn about and abide by ethical standards

Answers

The importance of ethics within the context of the computer forensics expert witness Computer forensics is an essential aspect of cybersecurity, and it is vital to have ethical standards in place for all professionals working in this field.

As an expert witness, computer forensics professionals need to maintain high ethical standards to maintain their credibility, professionalism, and integrity.Responsibilities of the computer forensics expert witness in their personal and professional livesIn their professional lives, computer forensics expert witnesses must remain impartial and objective in their work. They must not take sides and avoid any conflict of interest. They must maintain confidentiality of all information gathered during the investigation and must not disclose the information without authorization. They must also comply with relevant laws and regulations.In their personal lives, they must maintain high ethical standards and avoid any actions that may compromise their professionalism.

They should avoid any actions that could damage their credibility, such as participating in unethical practices, breaking the law, or acting in an unprofessional manner.Additional scrutiny of expert witnessesExpert witnesses might be put under additional scrutiny than any other professional because they are called to provide testimony in court, and their testimony can have a significant impact on the outcome of a case. They must maintain their professionalism and credibility to ensure that their testimony is admissible in court.Organizations and activities that help to support the computer forensics professional learn about and abide by ethical standardsSeveral organizations provide support and training for computer forensics professionals to learn and abide by ethical standards.

To know more about cybersecurity visit:

https://brainly.com/question/30902483

#SPJ11

Question(s) 1. As you may know, strings in Java are not mutatable (that is, you cannot actually modify a string once it is made). You will look at a method that takes a string and then returns a new string that has the same characters as the original but in reverse order. You should start by considering the base case. What strings are the easiest ones to solve this problem for? Write a recursive method that accepts a string as its argument and prints the string in reverse order. 2. A palindrome is any word, phrase, or sentence that reads the same forward and backward (Kayak - level, etc.) Write a boolean method that uses recursion to determine whether a String argument is a palindrome. Your main method should read the string and call a recursive (static) method palindrome that takes a string and returns true if the string is a palindrome, false otherwise. The method should return true if the argument reads the same forward and backward. The program then prints a message saying whether it is a palindrome. Recall that for a string s in Java, here is how we may write code using iterative: public static boolean isPalindrome(String 5) \{ for (int i=0;i<=(5. length ()−1)/2;i++){ if (5. charAt(i) !=5.charAt(5. length( ) - i - 1)) return false; } neturn true; } Now, what about solving this recursively? 3. Write a method that uses recursion to count the number of times a specific character occurs in an array of characters 4. Given a string s, write a recursion method that returns a string obtained from s by replacing each blank with the underscore character ('_). For example, the call underscore("This is a recursive") should return the string " This_is_a_recursive". 5. Write a recursive function to count the number of occurrences of a letter in the phrase. 6. Write a recursive method that accepts an array of words and returns the longest word found in the array. If the input array is empty then the method should return null. 7. Given an array of integers array and an integer n, write a recursive method that returns the number of occurrences of n in a.

Answers

The easiest strings to solve this problem for are empty strings and single-letter strings. Here is the recursive method that accepts a string as its argument and prints the string in reverse order. It uses the substring method to obtain the substring that begins with the second character and invokes itself recursively, then concatenates the first character to the resulting string:

public static String reverse(String s) { if (s.length() <= 1) return s; String rest = reverse(s.substring(1)); String first = s.substring(0, 1); return rest + first; }2. Here is the boolean method that uses recursion to determine whether a String argument is a palindrome. It uses the substring method to obtain the substring that begins with the second character and ends with the second-to-last character, then invokes itself recursively, and checks whether the first and last characters of the original string are equal. If the string has length 0 or 1, it is a palindrome by definition. public static boolean palindrome(String s) { int n = s.length(); if (n <= 1) return true; return s.charAt(0) == s.charAt(n-1) && palindrome(s.substring(1, n-1)); }

Then, it applies the same method to the rest of the string. public static int countOccurrences(String s, char target) { if (s.isEmpty()) return 0; int count = countOccurrences(s.substring(1), target); if (s.charAt(0) == target) count++; return count; }6. Here is the recursive method that accepts an array of words and returns the longest word found in the array. It checks whether the array is empty, and if it is, returns null. Otherwise, it invokes itself recursively with the tail of the array and compares its result to the first word in the array.

To know more about argument visit:

brainly.com/question/33178624

#SPJ11

Write a function def countVowel (word) that returns a count of all vowels in the string word. Vowels are the letters a,e,i,0, and u and their uppercase variations. Ex: If word is: Wonderful then the return value from the function is: 3 Ex: If word is: Eventually Ex: If word is: Eventually then the return value from the function is: You only need to write the function. Unit tests will access your function. 0/10 main.py 1 #Write function below|

Answers

The function can be used to count the vowels in a given word by calling countVowel(word), where word is the input string.

Here's a Python function countVowel(word) that returns the count of all vowels in the string word:

def countVowel(word):

   vowels = ['a', 'e', 'i', 'o', 'u']

   count = 0

   for char in word.lower():

       if char in vowels:

           count += 1

   return count

The function countVowel takes a string word as input.

The list vowels contains all the lowercase vowels.

The variable count is initialized to 0 to keep track of the vowel count.

The for loop iterates over each character in the lowercase version of the input word using word.lower().

Inside the loop, it checks if the current character is present in the vowels list using the in operator.

If the character is a vowel, the count is incremented by 1.

The function then returns the number of vowels.

The function can be used to count the vowels in a given word by calling countVowel(word), where word is the input string.

To know more about Function, visit

brainly.com/question/179886

#SPJ11

Create a program called kite The program should have a method that calculates the area of a triangle. This method should accept the arguments needed to calculate the area and return the area of the triangle to the calling statement. Your program will use this method to calculate the area of a kite.
Here is an image of a kite. For your planning, consider the IPO:
Input - Look at it and determine what inputs you need to get the area. There are multiple ways to approach this. For data types, I think I would make the data types double instead of int.
Process -- you will have a method that calculates the area -- but there are multiple triangles in the kite. How will you do that?
Output -- the area of the kite. When you output, include a label such as: The area of the kite is 34. I know your math teacher would expect something like square inches or square feet. But, you don't need that.
Comments
Add a comment block at the beginning of the program with your name, date, and program number
Add a comment for each method
Readability
Align curly braces and indent states to improve readability
Use good names for methods the following the naming guidelines for methods
Use white space (such as blank lines) if you think it improves readability of source code.

Answers

The provided program demonstrates how to calculate the area of a kite by dividing it into two triangles. It utilizes separate methods for calculating the area of a triangle and the area of a kite.

Here's an example program called "kite" that calculates the area of a triangle and uses it to calculate the area of a kite:

// Program: kite

// Author: [Your Name]

// Date: [Current Date]

// Program Number: 1

public class Kite {

   public static void main(String[] args) {

       // Calculate the area of the kite

       double kiteArea = calculateKiteArea(8, 6);

       

       // Output the area of the kite

       System.out.println("The area of the kite is " + kiteArea);

   }

   

   // Method to calculate the area of a triangle

   public static double calculateTriangleArea(double base, double height) {

       return 0.5 * base * height;

   }

   

   // Method to calculate the area of a kite using two triangles

   public static double calculateKiteArea(double diagonal1, double diagonal2) {

       // Divide the kite into two triangles and calculate their areas

       double triangleArea1 = calculateTriangleArea(diagonal1, diagonal2) / 2;

       double triangleArea2 = calculateTriangleArea(diagonal1, diagonal2) / 2;

       

       // Calculate the total area of the kite

       double kiteArea = triangleArea1 + triangleArea2;

       

       return kiteArea;

   }

}

The program defines a class called "Kite" that contains the main method.

The main method calls the calculateKiteArea method with the lengths of the diagonals of the kite (8 and 6 in this example) and stores the returned value in the variable kiteArea.

The program then outputs the calculated area of the kite using the System.out.println statement.

The program also includes two methods:

The calculateTriangleArea method calculates the area of a triangle given its base and height. It uses the formula 0.5 * base * height and returns the result.

The calculateKiteArea method calculates the area of a kite by dividing it into two triangles using the diagonals. It calls the calculateTriangleArea method twice, passing the diagonals as arguments, and calculates the total area of the kite by summing the areas of the two triangles.

By following the program structure, comments, and guidelines for readability, the code becomes more organized and understandable.

To know more about Program, visit

brainly.com/question/30783869

#SPJ11

The data in a distribution:
Group of answer choices
have to be raw or original measurements
cannot be the difference between two means
must be normally distributed
can be anything
Which of the following measures of central tendency can be used with categorical data?
mode
median
mean
range

Answers

The data in a distribution can be anything. It could be in the form of raw or original measurements or some sort of data that is derived from raw data.

In other words, the data can be transformed in different ways to make it more meaningful and useful to the user. The important thing is that the distribution should be properly labeled and organized so that it can be easily interpreted and analyzed.
Measures of central tendency are statistics that describe the central location of a dataset. They help us understand where the data is centered and how it is spread out. They are used to represent the entire dataset in a single value. The measures of central tendency can be divided into three categories: Mean, Median, and Mode.
The mode is the value that appears most frequently in a dataset. It is used when the data is categorical, which means it cannot be measured on a numerical scale. The median is the middle value in a dataset. It is used when the data is ordered or ranked. The mean is the arithmetic average of the dataset. It is used when the data is numerical and continuous.
In conclusion, data in a distribution can be anything and the measures of central tendency that can be used with categorical data are mode.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

ag is used to group the related elements in a form. O a textarea O b. legend O c caption O d. fieldset To create an inline frame for the page "abc.html" using iframe tag, the attribute used is O a. link="abc.html O b. srce abc.html O c frame="abc.html O d. href="abc.html" Example for Clientside Scripting is O a. PHP O b. JAVA O c JavaScript

Answers

To group the related elements in a form, the attribute used is fieldset. An HTML fieldset is an element used to organize various elements into groups in a web form.

The attribute used to create an inline frame for the page "abc.html" using iframe tag is `src="abc.html"`. The syntax is: Example for Clientside Scripting is JavaScript, which is an object-oriented programming language that is commonly used to create interactive effects on websites, among other things.

Fieldset: This tag is used to group the related elements in a form. In order to group all of the controls that make up one logical unit, such as a section of a form.

To know more about attribute visist:

https://brainly.com/question/31610493

#SPJ11

the presence of what file will temporarily prevent all users except root from logging into the system? (specify the full name of the file, including path.)

Answers

The file that can temporarily prevent all users except root from logging into the system is the "/etc/nologin" file.

The presence of the "/etc/nologin" file in a system can prevent all users except the root user from logging in temporarily. This file serves as a signal to the system that login access is restricted or disabled. When the file exists, the system displays a customized message to any user attempting to log in, informing them of the restriction and the reason for it. This mechanism is often used during system maintenance or critical updates to ensure that only authorized personnel with administrative privileges, such as the root user, can access the system while other users are temporarily locked out. Once the maintenance or update tasks are completed, the "/etc/nologin" file is typically removed or renamed, allowing regular user logins to resume.

Learn more about root user here:

https://brainly.com/question/32296390

#SPJ11

subject : data communication and network
i need the introduction for the report
what i need is how the business improve without technology and with technology

Answers

Technology plays a crucial role in enhancing business efficiency and growth, significantly impacting how businesses operate, innovate, and connect with their customers and partners. Without technology, businesses face limitations in terms of communication, data sharing, and automation, hindering their ability to scale and compete in the modern market.

Without technology, businesses rely on traditional methods of communication, such as physical mail or face-to-face meetings, which can be time-consuming and less efficient. Manual data handling may lead to errors and delays, impacting productivity. Moreover, without technology, businesses might struggle to adapt to rapidly changing market demands, hindering their growth prospects. In contrast, technology revolutionizes the way businesses operate. With advanced communication tools like emails, video conferencing, and instant messaging, businesses can connect and collaborate seamlessly, irrespective of geographical barriers, promoting efficiency and saving time and resources.

Furthermore, technology enables automation, reducing manual intervention and the likelihood of errors. Tasks that were previously labor-intensive can now be accomplished swiftly, allowing employees to focus on strategic endeavors. The integration of technology also opens up new avenues for businesses to expand their reach through online platforms and social media, enabling them to target a global audience. Additionally, technology facilitates data collection and analysis, empowering businesses to make data-driven decisions, identify patterns, and predict trends, giving them a competitive edge in the market.

Learn more about Technology

brainly.com/question/28288301

#SPJ11

Write a function that takes an integer and a list and returns the greatest element of .- the list, or the item if the list is empty or the item is greatest - ghci> most 0 list3 −100 - ghci> most 1000 list3 −1000 - ghci> most 0Nil −0 most :: Integer −> IntList −> Integer most = undefined

Answers

```haskell

most :: Integer -> [Int] -> Integer

most item list

   | null list = item

   | item >= maximum list = item

   | otherwise = maximum list

```

The provided code defines a function called "most" that takes an Integer and a list of Integers as input and returns the greatest element from the list. Here's how the function works:

The function begins with a pattern matching definition, stating that if the list is empty (checked using the "null" function), it will return the input item as the result. This covers the case when the list is empty or the input item is already the greatest element.

Next, the function checks if the input item is greater than or equal to the maximum element of the list using the "maximum" function. If the item is indeed greater, it returns the input item as the result.

Finally, if none of the above conditions are met, it means that the input item is not the greatest element, and thus the function returns the maximum element of the list.

The code uses guards (indicated by the vertical bars "|") to specify the conditions and their corresponding actions. The "otherwise" guard acts as a catch-all, equivalent to an "else" statement.

Learn more about Integer

brainly.com/question/33503847

#SPJ11

Given a list of integers nums (assume duplicates), return a set that contains the values in nums that appear an even number of times. Exanples: nuns ={2,1,1,1,2}→{2}
nuns ={5,3,9]→{}
nuns ={8,8,−1,8,8}→{6,8}

[1 1 def get_evens(nums): 2 return:\{\}

Answers

The objective of the given task is to write a function that takes a list of integers as input and returns a set containing the values that appear an even number of times in the list. The function `get_evens` should be implemented to achieve this.

To solve the problem, the function `get_evens` needs to iterate through the given list of integers and count the occurrences of each value. Then, it should filter out the values that have an even count and return them as a set.

The function can use a dictionary to keep track of the counts. It iterates through the list, updating the counts for each value. Once the counts are determined, the function creates a set and adds only the values with an even count to the set. Finally, the set is returned as the result.

For example, given the list [2, 1, 1, 1, 2], the function will count the occurrences of each value: 2 appears twice, and 1 appears three times. Since 2 has an even count, it will be included in the resulting set. For the list [5, 3, 9], all values appear only once, so the resulting set will be empty. In the case of [8, 8, -1, 8, 8], the counts are 3 for 8 and 1 for -1. Only 8 has an even count, so it will be included in the set.

The function `get_evens` can be implemented in Python using a dictionary and set operations to achieve an efficient solution to the problem.

Learn more about integers

brainly.com/question/30719820

#SPJ11

create a stored procedure called updateproductprice and test it. (4 points) the updateproductprice sproc should take 2 input parameters, productid and price create a stored procedure that can be used to update the salesprice of a product. make sure the stored procedure also adds a row to the productpricehistory table to maintain price history.

Answers

To create the "updateproductprice" stored procedure, which updates the sales price of a product and maintains price history, follow these steps:

How to create the "updateproductprice" stored procedure?

1. Begin by creating the stored procedure using the CREATE PROCEDURE statement in your database management system. Define the input parameters "productid" and "price" to capture the product ID and the new sales price.

2. Inside the stored procedure, use an UPDATE statement to modify the sales price of the product in the product table. Set the price column to the value passed in the "price" parameter, for the product with the corresponding "productid".

3. After updating the sales price, use an INSERT statement to add a new row to the productpricehistory table. Include the "productid", "price", and the current timestamp to record the price change and maintain price history. This table should have columns such as productid, price, and timestamp.

4. Finally, end the stored procedure.

Learn more about: updateproductprice

brainly.com/question/30032641

#SPJ11

a field with the currency data type contains values such as quantities, measurements, and scores. TRUE or FALSE

Answers

FALSE. A field with the currency data type typically contains values representing monetary amounts and is specifically designed for storing and manipulating currency-related data.

The statement is false. A field with the currency data type is specifically used for storing monetary values, such as currency amounts, prices, or financial transactions. It is not intended for quantities, measurements, or scores, as mentioned in the statement. The currency data type ensures that the stored values are formatted and treated as monetary amounts, allowing for accurate calculations, comparisons, and formatting according to the currency's rules and conventions.

When using a currency data type, the field is typically associated with a specific currency symbol or code and may include additional properties like decimal places and rounding rules. It is important to use the appropriate data type for different types of data to ensure data integrity and facilitate proper calculations and operations. Therefore, a currency data type is specifically designed for representing and manipulating monetary values, not quantities, measurements, or scores.

Learn more about currency data here:

https://brainly.com/question/32106083

#SPJ11

This Lab sheet is worth 10 points for complete queries. Only fully completed and documented solutions will receive maximum points. The queries are due per the timeline in Moodle. The queries in this homework assignment will use the Northwind database. Create an SQL query to solve the problem. Don't forget to include all of the following. 1. The database used "USE" 2. Comment with the assignment name, query number, your name and date. 3. The SQL code, in a readable, programmatic format. 4. Add a brief comment for each of the main segments, what the operation will accomplish 5. The output of the messages tab, to include the full "Completion time" or "Total Execution Time" line. 6. First 5 lines of the "Results" output. Points will be deducted if missing, more than 5 , or using the TOP command. 7. Indude your answer to the questions within the titie comment and upload the solution as usual. Follow the instructions in the Lab Lecture, complete the following queries. Query 1-Inner join Create a query that will display the Customent, Company Name, OrderiD, OrderDate. From the Customers and Orders tables. Once the query is created, answer the following question. Question - What will the results set represent? Query 2 - Outer Join Changing the inner join from query 1 to a left join, (Customers LEFT JOiN Orders) Create a query that will display the CustomeriD, Company Name, OrderiD, OrderDate. Once the query is created, answer the following question. Question - Looking thru the results set, you can see some "NUUL" entries. What does the "NUL" entries represent?

Answers

Database used: `USE Northwind` Lab Name: Lab 3

Query 1: Inner join, showing the Customers and Orders tables and displaying the Customer Name, Company Name, OrderID, and Order Date.

The results set will represent the customers with their orders, showing the Customer Name, Company Name, OrderID, and Order Date.

Query 2: Outer Join, displaying the CustomeriD, Company Name, OrderiD, OrderDate.

The "NUL" entries represent the customers that do not have any orders. Customers LEFT JOIN Orders would include all customers, including those who have never placed an order, unlike INNER JOIN, which only includes customers who have placed orders.

SQL code:```--Query 1

USE Northwind-- Ginny - Lab 3, Query 1

SELECT c.CustomerName, c.CompanyName, o.OrderID, o.OrderDate

FROM Customers c

INNER JOIN Orders o ON c.CustomerID = o.CustomerID```--

Query 2USE Northwind-- Ginny - Lab 3, Query 2

SELECT c.CustomerID, c.CompanyName, o.OrderID, o.OrderDate

FROM Customers cLEFT JOIN Orders o ON c.CustomerID = o.CustomerID```

The operation of the INNER JOIN will retrieve the records with matching values in both tables, while the operation of the LEFT JOIN retrieves all the records from the left table and matching records from the right table (Customers LEFT JOIN Orders).

Messages Output: Completion time: 0.034 seconds

Results Output: The first 5 lines of the results are:

CustomerName CompanyName OrderID OrderDate
Alfreds Futterkiste Alfreds Futterkiste 10643 1997-08-25
Ana Trujillo Emparedados y helados Ana Trujillo Emparedados y helados 10692 1997-10-03
Antonio Moreno Taquería Antonio Moreno Taquería 10308 1996-09-18
Antonio Moreno Taquería Antonio Moreno Taquería 10625 1997-08-08
Around the Horn Around the Horn 10365 1996-11-27

To know more about Database visit:

https://brainly.com/question/30163202

#SPJ11

You're a detective for the local police. Thomas Brown, the primary suspect in a murder investigation, works at a large local firm and is reported to have two computers at work in addition to one at home. What do you need to do to gather evidence from these computers, and what obstacles can you expect to encounter during this process? Write a two- to threepage report stating what you would do if the company had its own Digital Forensics and Investigations Department and what you would do if the company did not.

Answers

The following are the steps that I would take to gather evidence from Thomas Brown's computers at work and home;Steps to follow when the company has its own Digital Forensics and Investigations Department:I would visit the company to find out if they have a digital forensics and investigations department.

. The digital forensics expert would have to use their skills to try and recover the deleted files, which can be challenging.Firewall and anti-virus: Thomas Brown's computer may have a firewall and anti-virus software installed. The digital forensics expert would have to bypass these security measures to gain access to the files and data on the computer.The steps taken when the company has its own Digital Forensics and Investigations Department are straightforward. The digital forensics and investigations department would conduct the search and analysis of Thomas Brown's work and personal computers.

This would save me a lot of time and energy as they would have all the necessary tools to get the job done.When the company does not have its own Digital Forensics and Investigations Department, I would have to work with a digital forensics expert. This expert would conduct a thorough search of Thomas Brown's work and personal computers. The expert would use their skills to try and recover deleted files, break encryption, and bypass security measures.The obstacles that can be encountered during this process can make it challenging to gather evidence from Thomas Brown's computers. However, with the right skills and tools, it is possible to overcome these obstacles and gather the evidence needed to solve the murder investigation.

To know more about Digital Forensics  visit:

https://brainly.com/question/29349145

#SPJ11

In this task, you’ll need to write a complete program to calculate the dot product of two
vectors in assembly. You should write this program in a .s file, and you should be able to
assemble/link/execute it using QEMU emulator without any warning or error. For now
we haven’t learned how to print things out to the terminal, so you don’t need to print out
anything, and the CAs will check your code manually data vec1: .quad 10,20,30 vec2: .quad 1,2,3

Answers

Here is the complete program in assembly language that calculates the dot product of two vectors, and executes without any warning or error:```

.data
vec1: .quad 10, 20, 30
vec2: .quad 1, 2, 3
size: .quad 3
sum: .quad 0

.text
.globl _start
_start:
       movq $0, %rax
loop:
       cmpq size(%rip), %rax
       je end
       movq vec1(%rip, %rax, 8), %rbx
       movq vec2(%rip, %rax, 8), %rcx
       imulq %rbx, %rcx
       addq %rcx, sum(%rip)
       incq %rax
       jmp loop
end:
       movq $60, %rax
       movq $0, %rdi
       syscall
```In this program, we first initialize the vectors vec1 and vec2 with the given values. Then, we define the size of the vectors as 3 and initialize the variable sum to 0. We then define a loop that iterates over the elements of the vectors, calculates the product of the corresponding elements, adds it to the variable sum, and increments the counter. Finally, we exit the program using the system call with the code 60, which terminates the program.

Learn more about assembly language:

brainly.com/question/30299633

#SPJ11

USE PYTHON AND EXPLAIN...use parameter after to our new_plate function to generate only new license plate that is after this license (in lexical graphic order). example if new_plate('FUO-3889') must return strings larger than FUO-3889, thus, OSK-2525 is a valid plate, but not DVS-7906.import random def new_plate(after=None): \[ \begin{aligned}\text { letters }=\text { (random. choices(string. ascii_uppercase, } \mathrm{k}=3) \text { ) } \\\text { digitos }=\text { (random. choices(string.digits, } \mathrm{k}=4) \text { ) } \end{aligned} \] if after: while after letters: letters =". join( ( random.choices(string.ascii_uppercase, k=3) ) result = letters + "-" + string.digits return result wampunn

Answers

Using Python, a function new_plate(after=None) has been defined in the problem. It generates new license plates in lexical graphic order. If a string is given to it, it generates only plates that are greater than it.

This means, if the new_plate('FUO-3889') is given, then it only returns those strings which are greater than FUO-3889, as it is the given string. In other words, it generates strings whose order comes after FUO-3889.When you put a string as the argument for the function new_plate, you are essentially telling the function to only return strings greater than that string. If after is not None, then the while loop starts. If the given string is not None, it keeps checking until it finds a string whose order comes after the given string, which is the primary condition of the problem.

The new_plate function is designed to generate new license plates in a particular order, as per the given string. If a string is given to the function, it only returns those strings that come after the given string in the lexical graphic order.

To know more about argument visit :

brainly.com/question/2645376

#SPJ11

Write an algorithm in pseudocode for computing all the prime numbers less than n for a positive integer n? First come up with at least two strategies for solving it and then pick the most efficient strategy (one that needs fewest number of basic computational steps) before writing the pseudocode.
Please note: Describe the two strategies in as few and precise words as possible, much like I described the three strategies for the gcd problem. Then write the pseudo code for the strategy you selected. Please note that the pseudo code must follow the rules described in the notes. Using regular programming syntax that is not consistent with the pseudo code format is not allowed (for a reason

Answers

To compute all the prime numbers less than n for a positive integer n in an algorithm in pseudocode, we will need to come up with at least two strategies for solving it before choosing the most efficient one.

 Strategy 1 examines whether k is a prime number. k is a prime number if it is not divisible by any integer other than 1 and k. In contrast, Strategy 2 generates all prime numbers up to n by repeatedly removing multiples of prime numbers from a list of all integers less than or equal to n. The list that remains is a list of prime numbers that are less than or equal to n.

It's important to remember that we can't have any repeated prime numbers, since any number that is a multiple of a prime number will already have been eliminated by the sieve's algorithm. We will use strategy 2 because it is more efficient in terms of computation. Pseudocode for sieve of Eratosthenes algorithm.
To know more about algorithm visit:

https://brainly.com/question/33633460

#SPJ11

once the office app's help window is open, you can search for help using the table of contents, clicking the links in the help window, or entering search text in the 'search' text box.

Answers

To search for help in the Office app's help window, you can use the table of contents, click on links, or enter search text in the search box.

When you encounter a problem or need assistance while using the Office app, accessing the help window is a valuable resource. Once the help window is open, you have three options to find the help you need.

Firstly, you can utilize the table of contents, which provides a structured outline of the available topics. This allows you to navigate through the different sections and sub-sections to locate relevant information.

Secondly, you can click on links within the help window itself. These links are typically embedded within the content and lead to specific topics or related articles that can provide further guidance. Lastly, if you have a specific query or keyword in mind, you can directly enter it in the search text box. This initiates a search within the help window, which scans the available articles and displays relevant results based on your input.

By offering multiple avenues for help, the Office app ensures that users can easily access the information they need. Whether you prefer a structured approach through the table of contents, exploring related topics through clickable links, or performing a targeted search, the help window caters to different user preferences and learning styles. These options enhance the overall user experience and promote efficient problem-solving within the Office app.

Learn more about Office app's

brainly.com/question/14597356

#SPJ11

Decrypting data on a Windows system requires access to both sets of encryption keys. Which of the following is the most likely outcome if both sets are damaged or lost?

A.You must use the cross-platform encryption product Veracrypt to decrypt the data.

B.The data cannot be decrypted.

C.You must boot the Windows computers to another operating system using a bootable DVD or USB and then decrypt the data.

D.You must use the cross-platform encryption product Truecrypt to decrypt the data.

Answers

If both sets of encryption keys are damaged or lost on a Windows system, the most likely outcome is that the data cannot be decrypted.

Encryption keys are essential for decrypting encrypted data. If both sets of encryption keys are damaged or lost on a Windows system, it becomes extremely difficult or even impossible to decrypt the data. Encryption keys are typically generated during the encryption process and are securely stored or backed up to ensure their availability for decryption.

Option B, which states that the data cannot be decrypted, is the most likely outcome in this scenario. Without the encryption keys, the data remains locked and inaccessible. It highlights the importance of safeguarding encryption keys and implementing appropriate backup and recovery procedures to prevent data loss.

Options A, C, and D are not relevant in this context. Veracrypt and Truecrypt are encryption products used for creating and managing encrypted containers or drives, but they cannot decrypt data without the necessary encryption keys. Booting the system to another operating system using a bootable DVD or USB may provide alternative means of accessing the system, but it does not resolve the issue of decrypting the data without the encryption keys.

Learn more about encryption keys  here:

https://brainly.com/question/11442782

#SPJ11

Consider the clique problem: given a graph G and a positive integer k, determine whether the graph contains a clique of size k, i.e., a complete subgraph of k vertices. Design an exhaustive-search algorithm for this problem. I need PYTHON CODE of this algorithm. DON'T WRITE CODE IN ANY OTHER LANGUAGE EXCEPT PYTHON PLEASE !!!

Answers

Here's a Python implementation of an exhaustive search algorithm for the clique problem:

def is_clique(graph, vertices):

   # Check if all vertices in the given set form a clique

   for i in range(len(vertices)):

       for j in range(i + 1, len(vertices)):

           if not graph[vertices[i]][vertices[j]]:

               return False

   return True

def find_clique(graph, k):

   n = len(graph)

   vertices = list(range(n))

   # Generate all possible combinations of k vertices

   from itertools import combinations

   for clique in combinations(vertices, k):

       if is_clique(graph, clique):

           return clique

   return None

# Example usage:

graph = [[False, True, True, False],

        [True, False, True, True],

        [True, True, False, True],

        [False, True, True, False]]

k = 3

result = find_clique(graph, k)

if result is not None:

   print(f"Graph contains a clique of size {k}: {result}")

else:

   print(f"Graph does not contain a clique of size {k}.")

In this implementation, the `is_clique` function checks whether a given set of vertices forms a clique by checking all possible pairs of vertices and verifying if there is an edge between them in the graph.

The `find_clique` function generates all possible combinations of k vertices from the graph and checks each combination using the `is_clique` function. If a clique of size k is found, it is returned; otherwise, `None` is returned to indicate that no clique of size k exists.

To know more about Python, visit:

brainly.com/question/32166954

#SPJ11

Question 20 Consider the following trigger. What is the purpose of this trigger? CREATE OR REPLACE trigger update_films INSTEAD OF UPDATE ON film_copy BEGIN UPDATE film SET title = :NEW.title WHERE title = :OLD.title; END; Create an additional copy of the film_copy table Check if the query had executed properly Maintain a log record of the update Update an non-updatable view

Answers

The purpose of the trigger is to update the "title" field in the "film" table when a corresponding record in the "film_copy" table is updated.

This trigger is created with the name "update_films" and is set to execute instead of an update operation on the "film_copy" table. When an update is performed on the "film_copy" table, this trigger is triggered and executes an update statement on the "film" table.

The update statement in the trigger sets the "title" field of the "film" table to the new value of the "title" field (:NEW.title) where the title of the record in the "film" table matches the old value of the "title" field (:OLD.title). Essentially, it updates the title of the corresponding film in the "film" table when the title is changed in the "film_copy" table.

This trigger is useful when you have a scenario where you want to keep the "film_copy" table in sync with the "film" table, and any changes made to the "film_copy" table should be reflected in the "film" table as well. By using this trigger, you ensure that the title of the film is always updated in the "film" table whenever it is updated in the "film_copy" table.

The use of the ":NEW" and ":OLD" values in the trigger is a feature of Oracle Database. ":NEW" represents the new value of a column being updated, while ":OLD" represents the old value of the column. By referencing these values, the trigger can compare the old and new values and perform the necessary actions accordingly.

Using triggers can help maintain data integrity and consistency in a database system. They allow for automatic updates or validations to be applied when certain conditions are met. Triggers can be powerful tools in enforcing business rules and ensuring that the data remains accurate and up to date.

Learn more about Trigger.

brainly.com/question/8215842

#SPJ11

Other Questions
About the trend of flexibility in workforce, What is your "Aha" moment? In other words, what attracted you the most to this trend or what is the most important thing you have learned from the trend? as part of the _______ stage, the issue becomes how quickly the change should occur. Suppose X and Y are independent, identically distributed (iid) random variables with the common pdfstudent submitted image, transcription available belowstudent submitted image, transcription available belowa) Find the pdf of Z=X+Yb) Find the pdf of Z=X-Y write a product release of a new restaurant opening .information needed:catchy headlineproduct release date: 12/08/2022this is the first of its kind restaurant in that arearestaurant name: kia's What is Math.round(3.6)? A.3.0 B.3 C.4 D.4.0 The point P(16,9) lies on the curve y=x +5. Let Q be the point (x, x+5). a. Find the slope of the secant line PQ (correct to six decimal places) for the for the following values of x. If x=16.1, the slope of PQ is: If x=16.01, the slope of PQ is: If x=15.9, the slope of PQ is: If x=15.99, the slope of PQ is: b. Based on the above results, estimate the slope of the tangent line to the curve at P(16,9) he revenue (in dollars) from the sale of xinfant car seats is given by(x)=67x0.02x2,0x3500Use this revenue function to answer these questions:1. Find the average rate of change in revenue if the production is changed from 974 car seats to 1,020 car seats. Round to the nearest cent.$ per car seat produced2. (attached as a picture)3. Find the instantaneous rate of change of revenue at production level of 922 car seats. Round to the nearest cent per seat. It is important for clinical interviewers to appreciate how communication styles tend to differ across cultures. For example,A) Asian Americans tend to speak more loudly than Whites.B) Whites tend to speak more quickly than Native Americans.C) all of the aboveD) none of the above Use calculus to find the point on the curve y = x closest tothe point (x, y) = (1, 0). What is this distance? which of the following minerals is required to be added to enrichment of bread? a. Compare and contrast the Principle Based Accounting Standards to Rules Based Accounting Standards (10 marks) b. Various Stakeholders who receive accounting information differ in their informational needs. Discuss Six of these, citing their areas of interest. $250 is invested at t=0. For t=0 to t=1 the investment earns 0.04 effective annual interest, and from t=1 to t=2 the investment earns 0.10 nominal semi annual interest. Find the accumulated value of the investment at t=2.a. 286.65b. 357.63c. 185.56 Evaluateh'(5)whereh(x) = f(x) g(x)given the following.f(5) = 5f'(5) = 3.5g(5) = 3g'(5) = 2h'(5) = compare the income statements of sleepy futon incorporated and happy turtle transporters incorporated and calculate the tie ratio for each firm. What is the run time for the following algorithm? Explain your approachpublic static int func(int n) {int count = 0;for (int i=0; ifor (int j=i; jfor (int k=j; kif (i*i + j*j == k*k)count++;}}}return count;} a drainage basin that has undergone urbanization (mark all that apply): Find an equation of the plane. The plane through the point (2,-8,-2) and parallel to the plane 8 x-y-z=1 BONUS QUESTION On January 1, 2017, Ocasek, Inc. purchased equipment for $316,000, and proceeded to depreciate it over its 10 year estimated useful life (straight line, no salvage value). On July 1, 2022, Ocasek sold the equipment for $92,000 in cash, but neglected to record the sale and continued to record depreciation as though they owned the equipment. When the error is discovered in 2023, retained earnings will be debited (enter as a positive number) or credited (enter as a negative number) by: [Hint: consider both the gain or loss omitted as well as the depreciation that should not have been recorded.] Suppose that all of the outcomes of a random variable are (a, b, c, d, e), and that P(a)=P(b)=P(c)=P(d)=P(e)= 1/5, (that is, all outcomes a, b, c, d, and e each have a 1/5 probability of occuring). Definethe events A=(a,b) B= [b,c), C= (c,d), and D= {e} Then events B and C areMutually exclusive and independentNot mutually exclusive but independent.Mutually exclusive but not independent.Neither mutually exclusive or independent. This Case Study is a comprehensive examination of a Capital budgeting problem completed with the projection of the projects future cash flows and multiple evaluation methods including NPV, IRR, payback period, profitability Index, and simple rate of return. This case may also require the ranking of competing projects to simulate a real business environment where projects are plentiful and available capital is limited.For this case study, you will prepare an Excel spreadsheet showing the computations used to prepare the evaluations and final decisions on which projects (if any) should move forward. In addition, a well-formatted memo (1-2 pages) to management is required to support your experience with the case study.As was required in the last case study, please make sure to include cell formulas and cell references in your Excel file. Unless a value is given to you in the case study, you should be using cell references and formulas for all calculations.Please upload both an Excel document and a separate Word document providing your analysis.CASE STUDY 2Summer 2022 Block 2Proposal AnalysisAs the newly hired analyst for the corporate offices of Illuminated Electronics Corporation(IEC), you must prepare an analysis of a capital budgeting proposal.Proposal 1 PPDIEC has just developed a new electronic device (called the PPD) and it believes it will havebroad market appeal. The company has performed marketing and cost studies that revealed thefollowing information:A) New equipment would have to be acquired to produce the device. The equipment would cost$315,000 and have a six-year useful life. After six years, it would have a salvage value ofabout $15,000.B) Sales in units over the next six years are projected to be as follows:Year Sales in Units1 9,0002 15,0003 18,00046 22,000C) Production and sales of the device would require working capital of $60,000 to financeaccounts receivable, inventories, and day-to-day cash needs. This working capital would bereleased at the end of the projects life.D) The devices would sell for $35 each; variable costs for production, administration, and saleswould be $15 per unit.E) Fixed costs for salaries, maintenance, property taxes, insurance, and straight-line depreciationon the equipment would total $135,000 per year. (Depreciation is based on cost less salvagevalue).F) To gain rapid entry into the market, the company would have to advertise heavily. Theadvertising costs would be:YearAmount of YearlyAdvertising12 $180,0003 $150,00046 $120,000G) The companys required rate of return in 14%.Proposal 2 NEDOne of your colleagues has provided an analysis of a competing proposal and concluded thefollowing:NPV = $120,000; IRR = 15.5%; Payback Period = 3.5 years, Profitability Index = 1.25Required:1) Compute the net cash inflow (incremental contribution margin minus incremental fixedexpenses) anticipated from the sale of the PPDs for each year over the next six years.2) Using the data computed (1) and other data provided in the problem, determine the net presentvalue, internal rate of return, payback period, and profitability index of the proposedinvestment.3) Using the analysis performed in (2), prepare "best" and "worst" case scenarios using thefollowing assumptions:a) Best Case Projected sales expectations increase by 10%, required rate of return falls to 7%.b) Worst Case Projected sales decreases by 10%, required rate of return increases to 15%.4) Write a memo to the CFO of IEC providing your analysis and recommendation regarding thePPDs. Be sure to compare your results to the competing proposal. Include a strongrecommendation for or against the acceptance of the new PPDs into IECs product line.