write a program named makechange that calculates and displays the conversion of an entered number of dollars into currency denominations—twenties, tens, fives, and ones. for example, if 113 dollars is entered, the output would be twenties: 5 tens: 1 fives: 0 ones: 3.

Answers

Answer 1

A program named makechange that calculates and displays the conversion of an entered number of dollars into currency denominations—twenties, tens, fives, and ones is given below:

The Program

public static Dictionary<string, int> Denominations(int amount)

{

   var denominations = new Dictionary<string, int>();

   denominations["twenties"] = amount / 20;

   amount = amount % 20;

   denominations["tens"] = amount / 10;

   amount = amount % 10;

  denominations["fives"] = amount / 5;

   amount = amount % 5;

   denominations["ones"] = amount;

  return denominations;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1


Related Questions

Nesting can be used with an if function to decide between more than two different results. According to the course notes, how many levels of nesting can be used with the if function?.

Answers

The number of outcomes that can be tested and the number of criteria that can be examined are both increased by using nested IF functions, or one IF function inside another. Excel gives you the option to layer up to 64 different IF functions, but doing so is not at all advised.

By setting value if false to IF B2 higher than or equal to 80, return B, we can nest an IF function. In order to test for grades of C, D, and F, we add more nested IF functions.

I'm using the same formula. B2 more than or equal to 90 must first be tested in this formula before moving on to B2 greater than or equal to 80, and so forth.

Learn more about nested IF function:

https://brainly.com/question/17041438

#SPJ4

Write a Pseudo-code that will prompt the user for a name. Output the name

Answers

Answer:

start a function

ask the user what his/her name is and save it to a variable

output the variable

close the function

call the function

Explanation:
Pseudocode
is actually quite easy. You should look at the lesson as it gives alot on this topic.

Michael is using the internet to download images and to find information about his topic for a school project. When Michael is done, he will save his project and turn off the computer. In order to do this, Michael needs

Answers

Michael need a finger to be successful

meistertask provides a free online service to manage any project collaboratively. anyone can create two projects for free and share them with anyone for collaboration. a user can upgrade to the pro package for $9/month and receive unlimited integrations, projects, and status reporting. meistertask is an example of an augmented service that:

Answers

Based on the above, the meistertask is an example of an augmented service that increases revenue per customer.

Why is increasing revenue important?

An increase in revenue is known to be a form of a positive thing that can ever happen to any business. This is due to the fact that if revenue is said to increases so will the profits be likely to increase

Note that an Increasing revenue is one that gives room for a business to be able to get past its break-even point (BEP) as well as boost its margin of safety by selling a lot of their products.

Customer Revenue is seen as the revenue that is known to be linked with the customer or customer contract and as such, Based on the above, the meistertask is an example of an augmented service that increases revenue per customer.

Learn more about revenue  from

https://brainly.com/question/16232387
#SPJ1

Select the correct answer.
Which kind of food service outlets utilizes an intercom system for customers to order food?

Answers

Answer:fast food

Explanation:

5. Writing Write an article for an online newslet-
ter or blog about the importance of supply and
demand in determining the prices to charge
when opening a new restaurant. Be sure to
include an explanation of how supply relates to
competitors and demand relates to customers.


PLEASE help

Answers

Answer:

eu também tô com dúvida

Explanation:

k

assume an 8-bit, 256 position stack (filo / lifo), where each location can store 1 byte. similar to the rpn (reverse polish notation) calculator seen in class, we want to perform the following operation (operands are all decimal):

Answers

One byte is equal to eight bits. A bit is considered to be the least unit of data height. A bit can be either 0 or 1.

What does a computer's byte represent?Digital information is stored in units called bytes, which typically have eight bits each. The byte is the smallest addressable unit of memory in various computer systems because it was historically the amount of bits needed to encode a single character of text in a computer. The fundamental unit of information in computer processing and storage is the byte. Eight consecutive binary digits (bits) make up a byte, each of which can be either a 0 or a 1. In the past, a byte was any collection of bits longer than one that made up a straightforward piece of data, such as a single character.

To learn more about byte, refer to:

https://brainly.com/question/14927057

#SPJ4

(a) draw the schematic which uses 4 instances of the entity nha to output the 2’s complement s[3:0] of the 4-bit input y[3:0]. both y and s are std logic vector(3 downto 0). keep it simple—draw instances of nha as a box labelled nha.

Answers

Arrays of std logic variables and signals are represented by the std logic vector type. These types define the fundamental VHDL logic operations: and, and, or, nor, xor, and xnor. These operate on each place and return another array; they require two identically sized arrays.

What is schematic diagram?Schematic refers to a model, plan, or outline. A concise, understandable graphical representation of a plan or model is what a schematic diagram is. Simple lines and symbols are used in schematics to convey details like what, how, and where. They are schematic, graphical, and wiring diagrams. A schematic diagram is a basic, two-dimensional representation of a circuit that demonstrates the operation and connectivity of various electrical components. The schematic symbols used to represent the components on a schematic diagram must be familiar to a PCB designer. Schematic diagrams display control elements in the order of their electrical connections, regardless of their physical placement.

To learn more about schematic, refer to:

https://brainly.com/question/28152656

#SPJ4

Which actions allow you to access the internet on your laptop via a cellular network?

Answers

Answer:

The action that allows u to access the internet on your laptop via a cellular network is to connect you laptop to the RJ11

Explanation:

Connect the laptop to the RJ11 jack in your office.

what is inter page hyperlink

Answers

Answer:

This is a link that allows you to navigate within the same web page.

Explanation:

Here's an example:

<!DOCTYPE html>

<html>

<head>

</head>

<body>

 <a href="#lession1">Lession.1</a><br />

 <a href="#lession2">Lession.2</a><br />

 <br />

 <a id="lession1">Introduction of Lession.1</a>

 <p>This is sub topic.1</p>

 <p>This is sub topic.2</p>

 <br />

 <br />

 <div id="lession2">Introduction of Lession.2</div>

 <p>This is sub topic.1</p>

 <p>This is sub topic.2</p>

 <br />

 <br />

</body>

</html>

PLEASE HELP I NEED THIS DONE VERY VERY SOON LIKE ANSWER THIS WEEK PLEASE. tho I have to put it as something else on here because its not on here THIS IS FOR Digital Photography


1. Describe the mechanics of early photographic systems, analyzing how they differ from the systems of today.


2. The list of photographers who have contributed to the development of photography is long and diverse. Select at two photographers that you feel made essential contributions to the field and tell why.


3. Explain and evaluate photography as an invention rather than an art form.



4. How have the uses of photography changed over the years? What era in photography would you have liked to live in as a photographer?

Answers

1.) The earlier commercial camera was based on the Camera Obscura which is a portable room that was made by the Arabians in the 10th century.

In the 18th century, this model became more reduced and more portable and had a lens attached to the camera for making an image sharpener for drawing.  Lucida of the 19th C.E was used for travel and used as a tracing device.

Thus today camera has evolved from the earlier models the camera to a light sand captivating fragile tool.

2.) I'm going to go with Henri Cartier-Bresson and Carrie Mae Weems.

French photographer, Henri Cartier-Bresson, was the father of the "decisive moment" and a master of creating clean, compelling compositions with action and movement. The idea behind the decisive moment is that there is a fleeting fraction of a second in any action or scene that can best capture the essence of it in a photograph. He began work in the mid-1900s and passed away in 2004. There is also a famous quote attributed to him that is one of my favorites to share with new students. He said, "Your first 10,000 photographs are your worst." That can sound discouraging, but really, I just think of it as driving home the importance of taking way more photos than you need to get to your golden images!

Black American photographer, Carrie Mae Weems has been an amazing influence on artists and offered compelling commentary on race, gender, art, and politics in her pioneering work. She began her published work in the 1980s and continues to exhibit today. I had the honor of attending a talk she gave a couple of years ago at the University of North Carolina at Chapel Hill.

I also love the work of William Eggleston, Cindy Sherman, Gordon Parks, and Diane Arbus.

Regarding the changing uses of photography over the years, I would first mention that photography was not originally accepted as an art form worthy of museum exhibitions until really the early 1900s. Alfred Stieglitz was one of the early photography-as-art pioneers. Later, color photography was not seen as art and was considered vulgar by purists. William Eggleston was one of the photographers who helped to shake that up. We've continued to use photography as a document, and photojournalism remains crucial today. The photographers employed by the Farm Security Administration during the dust bowl of the 30s in the U.S. like Dorothea Lange and Walker Evans, as well as Gordon Parks, come to mind as documentary photography greats. Another photography great, Annie Liebowitz, makes me think of the lines between advertising and fine art has become increasingly blurred.

3.) Nicéphore Niépce is the father of photography.  In around 1816. Niépce became interested in the new technique of lithography and began to explore ways of using light-sensitive materials to produce images directly onto the printing plate or stone. The first successful photo was taken in 1826. Niépce used his heliography process to capture the first photograph but was soon overshadowed by the invention of the daguerreotype. The place of the shot was taken in Niépce's estate in Burgundy.

4.) Technically, photography has changed in that digital imaging has matured and advanced image-making creativeness possibilities and quality beyond what most people could conceive 20 years ago.

Professionally, the advent of easy-to-use digital cameras and unlimited shooting for essentially free has basically destroyed the professional photographers’ ability to charge a relatively living wage for workers. A few still command decent prices, but digitization has created commoditization, which always equals pricing deterioration.

The way we view images has changed from open and inviting prints on refrigerators, desks, and walls; to email snapshots that must be opened to participate and that we invest 5 seconds in viewing before terminating them.

As with every industry that has been impacted by digitization, great disruption has occurred. Sometimes for the better as in expanding the top one percent of creatives and in potential image quality. Most times diluting image quality by diluting the talent pool with mediocre uncommitted practitioners. (Like adding water to good wine, the more water the less desirable the wine. Taste, personality, and care are wasted by the dilution.)

Socially, the so-called democratization of photography through digital has diluted the commitment to quality image-making. Many people are just happy to get an image, even when they are beyond mediocre.

What is the value of z after the following statements have been executed? int x = 4, y = 33; double z; z = (double) (y / x); group of answer choices

Answers

The value of z after the below statements have been executed: int x = 4, y = 33; double z; z = (double) (y / x) is 8.0

What is coding?

The term Coding is known to be often called called computer programming, and it is said to be the ways that people do talk or communicate with computers.

Note that  Code tells a computer the right actions to take, and based on the above, the value of x is doubled and so it will be 8.

Therefore, The value of z after the below statements have been executed: int x = 4, y = 33; double z; z = (double) (y / x) is 8.0

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

our goal is to simplify the numerator and denominator of a fraction. does the code snippet work as expected? if it doesnt, provide test cases to demonstrate when it doesnt work as expected and provide an easy fix. if it does, provide test cases and reason about how you owuld prove that it works as expected

Answers

Expected Use the numerator and denominator's highest common factor to fill in the gaps in a simplified fraction. There are several factors listed.

What makes up a fraction's denominator?The denominator sometimes referred to as the divisor of a fraction, is the lowest number in a fraction. It specifies how many equally sized pieces are broken up into one object. The lower number in a fraction is known as the denominator. It demonstrates the equal division of something into portions. Four would be the denominator, for instance, if the fraction was 3/4. Any digit of equal elements is represented by a fraction, which also represents a part of a full. A fraction, such as one-half, eight-fifths, or three-quarters, indicates how many components of a particular size there are when stated in ordinary English.

To learn more about denominator of a fraction, refer to:

https://brainly.com/question/15545823

#SPJ4

Some liquid in a jar can be separated by physical means into two separate liquids, which can then be separated no further. the liquid is a(n)? a) compound b) element c) mixture d) pure substance

Answers

A mixture is which is made up of two or more substances combined in a fixed ratio and will not be further separated by physical or chemical means. Thus, the correct option for this question is C.

What are the properties of liquid?

The properties of the liquid are as follows:

Liquid has a definite volume but does not possess a fixed shape.Liquids can be compressed with the help of large pressure.This state of matter has less density as compared to solids.The intermolecular forces of attraction are weaker as compared to solids.They possess considerable space between particles.

The components of a mixture can be easily separated by virtue of numerous principles and technologies. Each of these dissolved components keeps its original properties during the course of time. In a mixture, the ratio of two components may vary accordingly.

Therefore, a mixture that can not be separated further. Thus, the correct option for this question is C.

To learn more about Mixtures, refer to the link:

https://brainly.com/question/24869423

#SPJ1

Someone who violates computer or internet security maliciously or for illegal personal gain is known as a(n) _______.

Answers

Someone who violates computer or internet security maliciously or for illegal personal gain is known as a(n) black hat hacker.

What is a black hat hacker?

A black hat hacker is known to be a kind of a function or system where one is known to be engage in the act of different kinds of cybercrime operations and it is one that often uses hacking as a tool for any form of  financial benefits.

It is one that often uses it for cyber espionage aims or other form of malicious intent, such as the implanting malware into the computer systems of companies or people.

Note that Black Hat hackers are said to be any kind of criminals who are known to often break into any computer networks and this is because of malicious intent.

Therefore, since they can be able to  release malware that destroys files and others, one can say that, Someone who violates computer or internet security maliciously or for illegal personal gain is known as a(n) black hat hacker.

Learn more about black hat hacker from

https://brainly.com/question/20355851
#SPJ1

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.

a. black hat hacker

b. industrial spy

c. hacktivist

d. cyberterrorist

According to the video case discussing economic opportunities to make money with ar, vr, and 360 video content, what is the major difference between virtual reality and 360 video?.

Answers

Answer: The way the user moves through the content

Explanation:

At a family reunion, your cousin takes a picture of both of you with her phone, orders a print of it, and mails it to you with a note apologizing for how weird it looks. You would use the word “bitmappy” instead of “weird” to describe the picture. Describe a situation that could have led to this problem. If you wanted to find information online that you could send to your cousin about how to avoid this problem, what are two or three keywords that you could use in your search?
Why is “less is more” such an important design principle, and why do so many people seem to want to violate this rule?

Answers

A bitmap is an image file format that can be used to create and store computer graphics. Weird means something strange or unusual.

What is the meaning of the phrase " less is more"?

Sometimes keeping things simple is preferable to making them complex or advanced. Simplicity is better than extensive adornment. He should not use a word such as 'weird' and  'bitmap' in the search.

The idiom is used to convey the idea that sometimes having less of something—a lesser amount of it—can be preferable to having more of it. That a straightforward strategy frequently outperforms a complex one.

Therefore, A bitmap is an image file format that can be used to create and store computer graphics. Weird means something strange or unusual.

To learn more about, less is more, refer to the link:

https://brainly.com/question/20556896

#SPJ1

If you notice distortion in a monitor display in a work environment with multiple pieces of equipment, the distortion caused by adjacent equipment is called?

Answers

If you notice distortion in a monitor display in a work environment with multiple pieces of equipment, the distortion caused by adjacent equipment is called Electromagnetic Interference.

What is monitor distortion?

A person can receive a distorted image if the video cable is said to be loose or when it is defective.

Note that electromagnetic interference (EMI) is seen as a form of an unwanted kind of noise or any form of interference that can be seen in an electrical area or circuit made by an outside source.

Therefore, based on the above.  If you notice distortion in a monitor display in a work environment with multiple pieces of equipment, the distortion caused by adjacent equipment is called Electromagnetic Interference.

Learn more about Electromagnetic Interference from

https://brainly.com/question/12572564
#SPJ1

PLEASE HELP ASAP- THANK YOU

Aadab Baqri is completing her degree at a community college and intends to transfer to a university next semester. She has kept a Microsoft Word document that lists her account user names and passwords, but she knows that she needs something much more secure to create and manage her passwords and account information. Evaluate and compare reviews of three password managers, at least one of which can be used on a mobile device. Consider KeePass, Bitwarden, Enpass, KeePassXC, and others you might find in your research. Recommend two password managers: one for when Aadab uses her laptop, and one for when she uses her mobile phone. Discuss your experiences with these password managers and mention security and features in your recommendation.

Answers

The recommendation will be to choose lastPass if you want a free tier product, but if you can afford it, choose Dashlane instead because it has many specialized tools and features.

What will be the recommendation?

The free version of Dashlane can save passwords for a single device, up to 50 accounts with multi-factor authentication, all kinds of information, and can automatically fill up forms with contact information and delivery addresses. More impressive is Dashlane's premium. The finest aspect is that it monitors the dark web for data breaches and alerts users for any familiar data found in the stolen batch.

It also provides data syncing between your devices. Secure file storage is available (great for scanning identification documents, bills, and more), and VPN support is included for increased protection while using a Wi-Fi Hotspot to browse the internet.

LastPass is also a fully functional, user-friendly, secure password manager that offers both free and premium versions based on your needs.

Therefore, the recommendation will be to choose lastPass if you want a free tier product, but if you can afford it, choose Dashlane instead because it has many specialized tools and features.

Learn more about recommendation on:

https://brainly.com/question/26693037

#SPJ1

Hi can you please label each part of the laptop input or output

Answers

The correct labeling of the parts of the computer is given below:

Output deviceInput deviceProcessing unitOutput unitProcessing unitInput deviceInput device

The Central Processing Unit which is labeled 3 and 5 respectively is neither an input or output device as it is a processing unit that also contains an Arithmetic and Logic Unit (A.L.U)

What is an Input Device?

This refers to the device that is used to give commands to a computer or system.

Hence, we can see that The Central Processing Unit which is labeled 3 and 5 respectively is neither an input or output device as it is a processing unit that also contains an Arithmetic and Logic Unit (A.L.U)

Read more about input devices here:

https://brainly.com/question/24455519
#SPJ1

Why should you use CSS framework

Answers

CSS frameworks make it simple to create websites compatible with multiple browsers and browser versions. This reduces the likelihood of bugs popping up during cross-browser testing.

What part of a cpu holds millions or billions of transistors on a silicon wafer?

Answers

The part of a CPU that holds millions or billions of transistors on a silicon wafer is a die. The correct option is d.

What is a CPU?

The Central Processing Unit (CPU) is a computer's primary component that serves as its "control center."

The CPU, also known as the "central" or "main" processor, is a complex set of electronic circuitry that runs the operating system and applications on the machine.

A die is a square of silicon that has been cut out of a wafer and contains an integrated circuit. The singular form is die, and the plural form is dice. MCM, wafer, and chip are all terms that can be used.

Thus, the correct option is d.

For more details regarding CPU, visit:

https://brainly.com/question/16254036

#SPJ1

Your question seems incomplete, the missing options are:

a. register

b. pins

c. heat sink

d. die

2. What is one advantage of using a wireless network over a wired network?
You don't need to route wires to every physical location that needs a connection
Wireless networks are faster
O Wireless networks are more secure
O All of these are advantages of wireless networks

Answers

Answer:


A: You don't need to route wires to every physical location that needs a connection.

Answer they are more secure

Explanation:

print 3 numbers before asking a user to input an integer

Answers

Answer:

you can use an array to do this

Explanation:

(I've written this in java - I think it should work out):

Scanner input = new Scanner(System.in);

System.out.println("Enter an integer: ");

int userInt = input.nextInt();

int[] array = new int[userInt - 1];

for(int i = userInt-1; i < userInt; i--)

     System.out.println(array[i]);

In the case study, naldi vs. grunberg, the court ______ the argument for dismissal arguing that the negotiations were only drafted in an email.

Answers

In the case study, Naldi vs. Grunberg, the court rejected the argument for dismissal arguing that the negotiations were only drafted in an email.

What are the characteristics of E-mail?

The characteristics of E-mail are as follows:

It involves an instinctive reply to messages.It facilitates the mechanism of auto-forwards and redirection of messages.It involves the facility delivering copies of a message to numerous people. Self-filing and retrieval of messages.

According to the question, a formal fallacy may be implemented by the court in order to reject the argument for dismissal. This demonstrates the negotiations that were only drafted in an email format.

Therefore, in the case study, Naldi vs. Grunberg, the court rejected the argument for dismissal arguing that the negotiations were only drafted in an email.

To learn more about Emails, refer to the link:

https://brainly.com/question/25642105

#SPJ1

Given an integer n returns the smallest integer greater than n that does not contain two identical consecutive digits

Answers

The program that shows an integer n that returns the smallest integer greater than n that does not contain two identical consecutive digits

How to illustrate the information?

n=n+1;

   int r,q,pr=-1,f=0;

   int t=n;

   while(f==0)

   {   f=1;

       t=n;

       pr=-1;

       while(t!=0)

       {   r=t%10;

           if(pr==r)

               f=0;

           

           t=t/10;

           pr=r;

       }

       if(f!=0)

       {    f=1;

           return n;

       }

       else

           f=0;

   n++;

   }

   return 0;

Whole Program code

#include <iostream>

using namespace std;

int solution(int n)

{   n=n+1;

   int r,q,pr=-1,f=0;

   int t=n;

   while(f==0)

   {   f=1;

       t=n;

       pr=-1;

       while(t!=0)

       {   r=t%10;

           if(pr==r)

               f=0;

           

           t=t/10;

           pr=r;

       }

       if(f!=0)

       {    f=1;

           return n;

       }

       else

           f=0;

   n++;

   }

   return 0;

}

int main()

{

   int n ;

   

   cin>>n;

   int ans=solution(n);

   cout<<ans;

   

   return 0;

}

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Programming statements written in a high-level programming language are called ____.answer:

Answers

Answer:

Source code

Explanation:

Your welcome and hope that you have a good day.

working on an assignment, trying to get it to print the item name and the cost, can someone let me know what im doing wrong?

Answers

There’s a space in the cost and 1

What does doug, an is manager, consult when he needs to identify competencies for his organization to invest in?

Answers

The manager can consult information system strategic plan when he needs to identify competencies for his organization to invest.

What is information system strategic plan?

Strategic information management planning is the method of trying to identify a client base of computer-based applications that will aid an organization in carrying out its business plans and achieving its objectives.

Many information systems and business executives face a critical challenge in carrying it out.

Strategic information systems assist organizations in changing their business strategies, plans, or structure.

They are also used to shorten the time it takes for an organization to react to environmental changes and gain a competitive advantage over its competitors.

Thus, he should consult information system strategic plan.

For more details regarding information system strategic plan, visit:

https://brainly.com/question/13193696

#SPJ1

If your computer shuts off unexpectedly and without enough time for the operating system to make quick backups, which storage medium will lose its data?

Answers

If my computer shuts off unexpectedly and without enough time for the operating system to make quick backups, the storage medium that will lose its data are  Both A and B which are:

A. Cache

B. RAM

What is the RAM in a computer?

RAM is known to be a term that connote random-access memory and it is one that is often called the short term memory where data is known to be saved as the processor requires for it.

Therefore, note that If my computer shuts off unexpectedly and without enough time for the operating system to make quick backups, the storage medium that will lose its data are  Both A and B which are:

A. Cache

B. RAM

Learn more about RAM from

https://brainly.com/question/13196228

#SPJ1

If your computer shuts off unexpectedly and without enough time for the operating system to make quick backups, which storage medium will lose its data?

A. Cache

B. RAM

C. ROM

D. HDD

Both A and B

A, B, and C

Both A and D

Other Questions
What is the answer to 3049 During a project, it is determined that some of the necessary equipment will arrive 1 week later than anticipated. In order to keep the project moving, the project manager decides to begin the second step of the project before the first step is completed. During what phase of the project management process would this occur in?. what is the fraction 5/6 minus the fraction 3/8 Mathematicians of the Gupta Empire are credited with which of the following mathematic achievements? The decimal system Multiplication tables The Pythagorean theorem Fractions in the fifteenth and sixteenth centuries, the cities of timbuktu, gao, walata, and jenne were all important centers of * 2 points gold mining. slave trading. agriculture. higher learning. Ben can walk to the library 4 miles away, but it takes him 20 minutes longer than it would to walk to school 3 miles away. How long does it take Ben to walk to the library? Which of the following are the basic economic questions? Select all that apply. A. Where should goods be produced? B. How should goods be produced? C. What goods are produced? D. Which resources can be used for goods? E. Who receives the produced goods? F. Why will people buy the goods? A right triangle is formed in the first quadrant by the x- and y-axes and a line through the point (3, 2). write the length l of the hypotenuse as a function of x. 5. trade can benefit both parties as long as a. the price of the good is lower than the exporters opportunity cost but higher than the importers opportunity cost. b. the price of the good is higher than the exporters opportunity cost but lower than the importers opportunity cost. c. the price equals both countries opportunity costs. d. they have a trade agreement. Im stuck. Again. Help Rectangle p q r s had vertices p(1, 4) q(6, 4) r(6, 1) and s(1, 1).without graphins find the new coordinates of the vertices of the rectangle after the reflection over the x axis and then another reflection over the y axis quizlet deepa dalal opened a free-standing radiology clinic. she had anticipated that the costs for the radiological tests would be primarily fixed, but she found that costs increased with the number of tests performed. costs for this service over the past nine months are as follows: If penalties are imposed only on the buyers of illegal drugs, the equilibrium price of illegal drugs will ________ and the equilibrium quantity will ________. The Rio Pact promised to fight the spread of:A. LiberalismB. DemocracyC. NationalismD. Communism someone help me please I need it rn? and I dont get itfirst four pictures are to question 4question 4: Hugh decided to begin a workout program. He wants to start running three times a week. The firs week he averages 1 mile per run and will increase this by 17% each week. Which graph best models the situation?A, B, C, and Dquestion 2: Which expressions describe the end behaviors of the function modeled by the graph?the fifth question to question 2Select EACH correct answer. A, B, C OR D Find the inverse of each function. Is the inverse a function? f(x)=1/5x common errors that cause the trial balance debit and credit columns not to balance include (select all that apply): multiple select question. recording an amount incorrectly from the balance sheet making an error when calculating the account balance recording an amount incorrectly from a transaction Calculate the molarity of Br- in 150.0 mL of aqueous solution that contains 5.07 g of zinc bromide If you are walking at a pace of 6 km/hr for 20 minutes. How far did you walk? the probability that a vehicle entering the luray caverns has canadian license plates is 0.12; the probability that it is a camper is 0.28; and the probability that it is a camper with canadian license plates is 0.09. what is the probability that