explain the uses of computer application in finance and travel.​

Answers

Answer 1

Uses of Computers in Finance

Uses of Computers in Finance

By: Jayden Mathew

Reviewed by: Catreal Wood, B.A. in Finance

Updated November 17, 2018

The discovery of computers has transformed the financial industry and how business deals are transacted. It is possible for accountants to keep large amounts of data, conduct intricate calculations and manage financial transactions all from a computer. Computer technology today enables global economic capabilities that were impossible only a few decades ago, and computers now influence both business as well as personal financial management.

Ease of Communication

Computers enhance financial communication within members of an organization through a network system connecting various departments. With the use of computers, key financial decision makers are able to send financial reports and strategies instead of holding meetings. This system allows people in the finance sector to get updates on world stock exchange, and price changes affecting their business. The use of email also enables financial professionals to inform other departments and consumers of key policy changes, such as price modifications on products and goods.

Spreadsheet Software

Spreadsheet software influences the way both large and medium-sized firms, as well as individuals, key in and organize financial data. Spreadsheet applications are used to run day-to-day financial tasks, such as compiling financial data, presenting the data in an organized manner through the use of charts and graphs, drawing budgets and calculations of complex transactions. This application comes with computer programs, such as Microsoft excel, that enables organizations and individuals to plan finances without wasting too much time.

Data Storage

Computerization makes data storage manageable and less bulky. Computers enable organizations to store large amounts of files in a small space, allowing us to have a large track of historical transactions, while avoiding consumption of space that would otherwise be consumed by piles of files in cabinets. Keeping financial records is critical for organizations, as well as individuals, as it allows tracking of payment records, debts owed, purchases done and bank transactions made. Having detailed financial records helps an organization to continually audit and analyze business performance.

proggramed transaction

Computerized financial software conducts programmed business and accounting transactions. Most finance departments utilize accounting applications, such as QuickBooks, to perform financial transactions and to manage a company’s income and expenditure. These programmed applications enable an organization or individuals to keep track of financial operations and also conduct complex transactions effortlessly without consuming a lot of time and labor that would otherwise be used in case of manual transactions. Organizations can purchase software depending on nature of work; other applications include Grant Management application and payroll software.

Financial Information

Computers have enhanced access to wide financial information through internet access. Business operators or individuals can now access information on investment prospects, and conduct detailed research on its profitability. There is also a wealth of financial information available on the internet, such as world prices, tax changes, inflation rate and currency exchange rates that make it easier for institutions and individuals to make informed financial decisions. The internet also provides a wide source of information and access to specific financial reports of companies in trade.

REFERENCES

WRITER BIO


Related Questions

5 Write full forms of the following: CPU b. MHz с. СВТ d. CAI e. ICU f. POS a. Write suitable technical term for the following statements. The continuously working capacity of computer without loos its speed and accuracy. b. The computer terminology, in which output is determined accord to the input The computer device used in hospitals that helps to main heartbeat of the patient. Opiemak The collection of eight bits or two Nibbles. C. I byte d. ng School Level Computer Science - 6​

Answers

Answer:

CPU = Central prossing Unit

What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

In what tab can a user find the workspace option?

Answers

D. View.
You can find the workspace and preview of the file in View.

What is system software? Write its types.​

Answers

Answer:

There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)

Answer:

There are two main types of software: systems software and application software. Systems software includes the programs that are dedicated to managing the computer itself, such as the operating system, file management utilities, and disk operating system (or DOS)

Explanation:

thanks for question

I need someone to explain gor me python coding!

Answers

Answer:

Explanation:

Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general purpose language, meaning it can be used to create variety of different programs and isn't specialised for any specific problems

A hammer tool can only be used by one technician at a time to perform hitting. Accordingly, you have developed a Hammer class with a hit method. Objects of class Hammer are used to simulate different hammers, while threads are created to simulate users. Which situation needs to add the synchronized keyword to the hit method

Answers

Answer:

Explanation:

The synchronized keyword needs to be active on the hit method at any point where 2 or more threads (users) exists at any given moment. This is in order to prevent two or more users from trying to perform a hammer hit at the same time. This is what the synchronized keyword is used for. It prevents the more than one thread from calling the specific method at the same time. Instead it adds the action to a sequence so that the second thread calls the hit method only after the first thread's hit method finishes.

In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics

Answers

Answer: demographics

Explanation:

Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.

The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.

It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.

Which of the following is true for creating a new file?

a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None

Answers

Answer:

create a file with the same name as an existing file ,you will be prompted to rename your new file

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​

Answers

Answer:

1.similarity:

they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.

(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.

Answers

Answer:

The answer is "True".

Explanation:

The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Neymar machine that Run on electricity

Answers

"Neymar" = "name a"?

if so, well, there are many, like the little glowing box you use the type questions to the brainliest community, let it be a phone, a pc, or a molded Nintendo

if you meant Neymar indeed, I'm not sure if he runs on electricity, unless he is a soccer playing android somehow.

what is the role of media in our society, and how can we become responsible consumers producers of news and information in the digital age?​

Answers

1.Own your image, personal information and how these are used.Pay close attention to the 2.Terms of Use on apps and websites. ...

3.Obtain permissions when posting videos or 4.images of others on your networks. ...

Scrub your accounts. ...

5.Password diligence. ...

Spread love, not hate.

You have two microservices that need to communicate with each other without holding up a thread on either end. One service will receive an ID and return a message once the job is complete.
Which communication framework should be used?
A.) Have a shared database that allows both
applications to read and write to the tables to share the data instead of having to communicate
B.) Use asynchronous messaging to send and receive messages between each microservice
C.) Abandon the microservice architecture so no interaction is needed
D.) Create a third service to handle the interaction between the services
E.) Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available

Answers

Answer: E. Use a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

Explanation:

Since there are two microservices that need to communicate with each other without holding up a thread on either end, the communication framework should be used is a RESTful architecture for both, send the ID through a POST, and ping the service with a GET until a response is available.

REST is a software architectural style which is used in defining the set of rules that be used for the creation of web services. The REST architecture allows requesting systems to be able to access and manipulate web resources.

Discuss the scaled index addressing mode and comments on the following instructions?

a) MOV BX, [CX+5*AX]
b) MOV [DX5*DI+30H], CX

Answers

Memory will also be accessible in Scaled index addressing mode using a 32-bit base & indexing register.The instruction's first parameter will be the base register, and the instruction's second parameter will be the index register. The index register is multiplied by a scaling factor before the program is fetched.

For option a:

The baseline register is [tex]\bold{BX}[/tex], while the index register is [tex]\bold{CX+5*AX}[/tex].

The multiplier for Accumulator [tex]\bold{AX }[/tex] will be 5.[tex]\bold{CX }[/tex] will be multiplied with this value.[tex]\bold{CX+5*AX}[/tex] will contain a memory address.The value at position [tex]\bold{CX+5*AX}[/tex] is accessed by [tex]\bold{[{CX+5*AX} ]}[/tex].The value retrieved from the address [tex][\bold{CX+5*AX}][/tex] is moved into Base register BX by the MOV instruction.

For option b:

Its index register is [tex]\bold{CX }[/tex], whereas the base register is [tex]\bold{DX5*DI+30H}[/tex].

[tex]\bold{CX}[/tex] has a number, that is copied to a computed place below.After multiplying [tex]\bold{DI}[/tex] by [tex]\bold{5, DX}[/tex] will be multiplied by this [tex]\bold{5*DI}[/tex].To the aforementioned multiplied value,[tex]\bold{ 30H}[/tex] will be added.[tex]\bold{[DX5*DI+30H]}[/tex] is a value located at location [tex]\bold{DX5*DI+30H}[/tex]. [tex]\bold{DX5*DI+30H }[/tex] is a memory address number.As a result, the value of [tex]\bold{CX}[/tex] will be copied to the [tex]\bold{ [DX5*DI+30H] }[/tex]location.

Learn more:

brainly.com/question/14319860

give one advantage of saving file in the same folder

Answers

Answer:

it's easier to find

Explanation:

things are much more organized

So you don’t have to go through many files

Which Windows installation method requires the use of Windows deployment services (WDS)?
1. Network Installation
2. Repair Installation
3. Bootable flash drive installation
4. Unattended installation​

Answers

Answer:

1. Network Installation

Explanation:

Given

Options (1) to (4)

Required

Which requires WDS for installation

WDS are used for remote installations where users do not have to be physically present before installations can be done; in other words, it is necessary for network based installations.

Of all the given options, (a) is correct because without WDS, network installation cannot be done.

Which terms means device that converts one voltage to another ?

Answers

Answer:

I believe it is an adapter

Explanation:

An adapter or adaptor is a device that converts attributes of one electrical device or system to those of an otherwise incompatible device or system. Some modify power or signal attributes, while others merely adapt the physical form of one connector to another.

Create union integer with members char c, short s, int i and long b. Write a program that inputs the values of type char, short, int, and long and stores the values in union variables of type union integer. Each union variable should be printed as a char, a short, an int and a long. D the values always print correctly? Also create pseodocode or flowchart.
Here is the feedback that I received when I originally turned this in:
I have the following concerns: You need to save your program file with a .c extension. You should declare your union above the main module and then utilize it from within this portion. You have declared the union and then created a function definition prior to entering the main() function.
Here is the original code provided by homework help: Thanks in advance
#include
union myUnion {
char c;
short s;
int i;
long l;
};
void print(myUnion u) {
printf("As a character: %c\n", u.c);
printf("As a short: %hd\n", u.s);
printf("As an int: %d\n", u.i);
printf("As a long: %ld\n\n", u.i);
}
int main() {
myUnion u;
printf("Please enter a character: ");
scanf("%c", &(u.c));
print(u);
printf("Please enter a short: ");
scanf("%hd", &(u.s));
print(u);
printf("Please enter an int: ");
scanf("%d", &(u.i));
print(u);
printf("Please enter a long: ");
scanf("%ld", &(u.l));
print(u);
return 0;

Answers

Answer:

The updated program in C is as follows:

#include <stdio.h>

union myUnion{ char c; short s; int i; long l; };

int main(){

   union myUnion inputs;

   printf("Character: ");    scanf("%c", &inputs.c);

   printf("Output: %c", inputs.c);

   printf("\nShort: ");    scanf("%hd", &inputs.s);

   printf("Short: %hd", inputs.s);

   printf("\nInteger: ");    scanf("%d", &inputs.i);

   printf("Output: %d", inputs.i);

   printf("\nLong: ");    scanf("%ld", &inputs.l);

   printf("Long: %ld", inputs.l);

   return 0;

   }

The pseudocode is as follows:

Function union myUnion {

character; short; int; long

}

main() {

myUnion inputs;

Input inputs.c;  Print inputs.c

Input inputs.s; Print inputs.s

Input inputs.i; Print inputs.i;

Input inputs.l; Print inputs.l

}

Explanation:

This defines the union function

union myUnion{ char c; short s; int i; long l; };

The main begins here

int main(){

This calls the union function to main

   union myUnion inputs;

This prompts and gets input for character variable

   printf("Character: ");    scanf("%c", &inputs.c);

This prints the character input

   printf("Output: %c", inputs.c);

This prompts and gets input for short variable

   printf("\nShort: ");    scanf("%hd", &inputs.s);

This prints the short input

   printf("Short: %hd", inputs.s);

This prompts and gets input for integer variable

   printf("\nInteger: ");    scanf("%d", &inputs.i);

This prints the integer input

   printf("Output: %d", inputs.i);

This prompts and gets input for long variable

   printf("\nLong: ");    scanf("%ld", &inputs.l);

This prints the long input

   printf("Long: %ld", inputs.l);

   return 0;

   }

Marco travels often and does not have consistent wireless Internet service. He frequently uses his mobile phone service to provide Internet access to his tablet.

Which network type is Marco using?


LAN


PAN


WAN


MAN

Answers

Answer:

PAN

Explanation:

For wireless devices like laptops, tablets, wireless desktops, and cellphones to communicate, a wireless LAN normally has a Wi-Fi router or wireless access point. A wireless LAN is essentially a LAN that doesn't use cables. Thus, option B is correct.

What are the PAN  network type is Marco using?

The computer network that links computers and other devices within a specific person's range is known as a personal area network (PAN). PAN stands for personal area network and gives a network range within a person's range, often within a range of 10 meters (33 feet).

A PAN is a network that primarily serves a tiny space, usually a single small room. It allows computer devices to share data and information with other nearby computers.

Therefore, Whereas in LAN, computers are connected via a network over a short distance, such as within a building, or in a single computer network made up of several computers.

Learn more about network type here:

https://brainly.com/question/29515062

#SPJ2

Imagine that you wanted to write a program that asks the user to enter in 5 grade values. The user may or may not enter valid grades, and you want to ensure that you obtain 5 valid values from the user. Which nested loop structure would you use?
A. A "for" loop inside of a "while" loop
B. A "while" loop inside of a "for" loop
C. None of the above
D. Either a or b would work

Answers

The type of nested loop which I would use to write the program is:

B. A "while" loop inside of a "for" loop

What is a Loop?

This refers to the control flow statement which is used to iterate and lets a particular line(s) of code execute repeatedly

With this in mind, we can see that the type of nested loop which I would use to write the program is a "while" loop inside of a "for" loop because it is a conditional statement that continues to ask for the certain valid grades until it gets the right one.

Therefore, the correct answer is option B

Read more about loops here:
https://brainly.com/question/26098908

Use the tables below to show the difference between the results of a natural join, an equijoin (with PROF_CODE = 2) and a full outer join. Provide the resulting table of each join

Answers

Answer:

Code:

CREATE TABLE student (

stu_code INTEGER PRIMARY KEY,

prof_code INTEGER

);

INSERT INTO student VALUES (100278,null);

INSERT INTO student VALUES (128569,2);

INSERT INTO student VALUES (512272,4);

INSERT INTO student VALUES (531235,2);

INSERT INTO student VALUES (531268,null);

INSERT INTO student VALUES (553427,1);

CREATE TABLE professor (

prof_code INTEGER PRIMARY KEY,

dept_code INTEGER

);

INSERT INTO professor VALUES (1,2);

INSERT INTO professor VALUES (2,6);

INSERT INTO professor VALUES (3,6);

INSERT INTO professor VALUES (4,4);

The SQL NATURAL JOIN is a type of EQUI JOIN and is structured in such a way that, columns with the same name of associated tables will appear once only. In our Example, Prof_code will appear only once and it will be matched in both the table;  

SELECT * FROM Student natural join Professor on student.prof_code=Professor.prof_code ;  

Stud_code   Prof_code  Dept_code

128569        2           6

512272        4           4

531235        2           6

553427        1           2

EQUI JOIN performs a JOIN against equality or matching column(s) values of the associated tables and an equal sign (=) is used as a comparison operator in the where clause to refer to equality. In our example, it will only show the result with prof_code=2 from the natural join result.

SELECT * FROM Student join Professor on student.prof_code=Professor.prof_code where student.prof_code=2;

Stud_code Prof_code Prof_code Dept_code

128569     2         2         6

531235     2         2         6

In SQL the FULL OUTER JOIN combines the results of both left and right outer joins and returns all (matched or unmatched) rows from the tables on both sides of the join clause.

SELECT * FROM professor full outer join student on professor.prof_code=student.prof_code ;

Stud_code Prof_code Prof_code Dept_code

100278                

128569    2          2         6

512272    4          4         4

531235    2          2         6

531268    

                    3         6

553427    1          1         2

Which one is the result of the output given by a compute

Answers

Answer:

Images.

Sound.

Hardcopy

Answer:

it can be anything like sound or pictures

Explanation:

Write the code for the following problem.
Add a function to problem to display the last name and highest, last name and lowest and average exam score. Hint: for highest initialize a variable to 0 (high_var). If the array value is higher than the high_var then set high_var to the array value and set high_index to the position of the array. Proceed through the array until you get to the end. Do the same for finding the lowest using low_var set to 999 (higher than the highest value). For the average score, sum all the exam scores as you proceed through the loop. Use a for loop to go through each occurrence of the arrays. Note you can do all this with one for loop but if it makes more sense to you to use multiple for loops that is ok too.

Answers

Answer:

no

Explanation:

31. Explain what the program does. Write out the output 20 PRINT "Hellooo00000000000, world!" 30 PRINT "I'm learning about commands in BASIC." 40 PRINT 'This text is being printed via the PRINT commarrd. 2 209​

Answers

o_num = input ("Please enter the amount of \"o\": ")

zero_num = input ("Please enter the amount of zeros: ")

i = 0

while i < o_num and i < zero_num:

repeat_o = "Hell" + o_num

repeat_zero = repeat_o + zero_num

i+=1

print (repeat_zero)

12. In cell A14, use the INDEX function and structured references to display the value in the first row and first column of the AcademicGroups table.

Answers

Answer:index(E3:H12,1)

Explanation:

Answer: =INDEX(AcademicGroups,1,1)

Explanation:

Use the INDEX function (fx) button and you will be provided two different arguments to choose from.

Select the argument: array,row,num,column,num

In the Array section, click the up-arrow and then highlight the range A2:G12 (this is the AcademicsGroups table).

In the Row_num section, enter the number 1

In the Column_num section, enter the number 1

Press OK

Hopefully the logic behind this, after seeing it, makes sense.

In the right situations, the use of multi-threads can allow for application speedup. Provide a small code example that illustrates how threads can be used to arrive at an appropriate result. Identify if there is a point where too many threads might impact performance of the application. g

Answers

Answer:

Explanation:

Threads allow an applications to run faster because they allow various tasks to run at the same time instead of doing one at a time and having to wait for one to finish before starting the next task. However, if too many threads are running at the same time, or a thread has a very large task or requires another task to finish before finishing its own then this can drastically impact performance. Mainly because too many resources are being used at a single moment. The following code is a small example of how threads work in Python.

import threading

import time

def thread_function(name):

   print("Thread {name}: starting")

   time.sleep(2)

   print("Thread {name}: finishing")

thread1 = threading.Thread(target=thread_function, args=(1,))

thread1.start()

time.sleep(1)

thread2 = threading.Thread(target=thread_function, args=(2,))

thread2.start()

thread2.join()

Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)

Answers

Answer:

ArraySize = ($ - newArray)

Explanation:

Given

Array name: newArray

Type: DWORD

Required

The size of the array in bytes

The following formula is used to calculate the size of an array in assembly language.

Variable = ($-Array name)

So, we have:

ArraySize = ($ - newArray)

Where ArraySize is the variable that holds the size of newArray (in bytes)

A choropleth map is used to
Group of answer choices

do a scatter plot.

show live satellite images.

present geographical regions in 3D.

present geographical regions coloured, shaded, or graded according to some variable.

Answers

4- present geographical regions colored, shaded, or graded according to some variable :)

how do you copy a file​

Answers

Answer:

right click and press control c

Other Questions
2. How can a colon be used to integrate a direct quote?A.)when the quote is long or written as a complete sentenceB.) when the quote will appear at the end of a paragraph C.)when the quote will appear at the end of a paragraphthat the quote belongs to an expertD.) to frame the quote inside your own sentence Lainey is looking for a new apartment and her realtor keeps calling her with new listings. The calls only take a few minutes, but a few minutes here and there are really starting to add up. She's having trouble concentrating on her work. What should Lainey do? a) Tell her realtor she can only receive text messages O b) Limit the time spent on each call O c) Turn off her phone until she is on a break O di Call her realtor back when customers won't see her on the phone Nativism can be defined as a social/political position of demanding favored status for established groups in a nation as compared to the claims made by newcomers or new immigrants. Examples of nativism in America during the Great Migration period during the turn of the 20th century were: a. The rise of the Invisible Empire of the Knights of the Ku Klux Klan (KKK). b. The rise of anti-Catholicism. c. The successful lobbying for the National Origins Act of 1924. d. Jim Crow segregation e. Violence against blacks, Jews and italians Racist practices of eugenics and other theories regarding the inferiority of all people of color. f. All of the other answers are correct. g. No answer text provided. If a right circular cone is intersected by a plane only at its vertex, as in thepicture below, what shape is produced?oA. A lineB. A circle C. An ellipseD. A pointOE. A parabolaF A hyperbola Which phrase best describes the context of a speech?A. The way the speech is organizedB. The average age of the audienceC. The visual aids the speaker usesD. The types of statistics presented Which factor contributed to the collapse of both the Roman Empire and the Han dynasty when servicing a heating boiler and radiators, a plumer knows that the time he will take is given by the formulatime = 1 hour + 45 minutes per radiatorhe charges his costumer a call-out fee of 30, plus 20 per hour how much should a costumer be charged for servicing a heating boiler and four radiators What is the value of x Please I need help with this P(A) = 1/2P(B) = 1/3PIAN B) = 1/6Find P(AUB) help me with this please! I dont understand All living things are made of cells discovered throught what BJECTIVE TYPE QUESTIONSFill in the blank spaces by choosing the correct words from the words given in list.List : composition, heat, chemical, photosynthesis, physical1. Heating of zinc oxide is achange.2. Burning of coal is achange.3. There is a change in state andduring a chemical change.4. Plants make their food by the process of5.energy is generally given out or absorbed during a chemical change Andrea, a sales associate in the fine china department of the David's Department Store, reports to Chris, the home furnishings department manager. This morning, Chris asked Andrea to change the price tags on the crystal wine glasses. While working on this task, Pietro, the bedding department manager, told Andrea that he wanted her to unload some comforters. To solve this conflict, Andrea turns to the principle of unity of command under which Group of answer choices Andrea needs to decide which manager has more power. Andrea can refuse to do both tasks. employees should report to no more than one manager. employees can report to two managers, so Andrea needs to decide whose directions to follow. Andrea will need to determine how she can multitask. Hazmat products warnings or labels allowed in fc Consider the reaction. 2HF(g)H2(g)+F2(g). What is the value of Keq for the reaction expressed in scientific notation The FDA regulates that fish that is consumed is allowed to contain 1.0 mg/kg of mercury. In Florida, bass fish were collected in 53 different lakes to measure the amount of mercury in the fish. The data for the average amount of mercury in each lake is in the given table ("Multi-disciplinary niser activity," 2013). Do the data provide enough evidence to show that the fish in Florida lakes has more mercury than the allowable amount? Test at the 10% level. Use the framework below to guide your work. Hypotheses: H0 : u = 1.0 mg/kg HA: ul > 1.0 mg/kg Test statistic = -10.09 p-value is approximately 1, would report 0.9999. Since this is not less than or equal to 0.10, we do not favor Ha. We would conclude that there is not enough evidence to show that the mean amount of mercury in fish in Florida lakes is more than the allowable amount Why is the p-value so high when the test statistic seems extreme? A. The alternative is > so the p-value matches the area to the left. Since the TS is negative, this results in shading most of the curve. B. The TS is negative so the p-value matches the area to the left and results in a very small area. This p-value reported is not correct. C. The alternative is > so the p-value matches the area to the right. Since the TS is negative, this results in shading most of the curve. D. The TS should be positive so the p-value matches the area to the left and results in shading most of the curve. PLEASE HELP!!Submit your neatly typed or written speech of at least 500 words, as well as the visual information that goes with your presentation. Remember, your speech must be structured like an essay, including an introduction with a strong thesis (this is your argument), a body, and a conclusion. Make sure your speech addresses your audience's concerns, and includes the background information on vaccines. An object of 4 cm length is placed at a distance of 18 cm in front of a convex mirror of radius of curvature 30 cm. Find the position of the image ,its nature and size? The 35 member History Club is meeting to choose a student government representative. The members decide that the representative, who will be chosen at random, CANNOT be any of the 3 officers of the club. What is the probability that Hiroko, who is a member of the club but NOT an officer, will be chosen?0 435 135 13 132