View "The database tutorial for beginners" and discuss how database management systems are different from spreadsheets. Describe one experience you have had working with data.

Answers

Answer 1

Answer and Explanation:

A spreadsheet is an interactive computer application for the analysis and storage of data. The database is a collection of data and accessed from the computer system. This is the main difference between spreadsheets and databases. The spreadsheet is accessed by the user and the database is accessed by the user. The database can store more data than a spreadsheet. The spreadsheet is used for tasks and used in enterprises to store the data. Spreadsheet and database are two methods and the main difference is the computer application that helps to arrange, manage and calculate the data. The database is a collection of data and organized to access easily. Spreadsheet applications were the first spreadsheet on the mainframe. Database stores and manipulates the data easily. The database maintains the data and stores the records of teachers and courses. The spreadsheet is the computer application and analyzing the data in table form. The spreadsheet is a standard feature for productive suite and based on an accounting worksheet.


Related Questions

Which of the following was one reason why electronic (computer-based) information sharing was challenging in the not too distant past?
a. Individuals and/or members of organizations did not speak the same language.
b. Hardware and software applications on either end could not talk to one another.
c. The most powerful computers were owned by large companies.
d. Organizations needed to protect information for competitive advantage.

Answers

Answer:

B. Hardware and software applications on either end could not talk to one another.

Explanation:

The answer to this question is that making connection to the internet used to be very slow, it's operation was difficult and so was its maintenance. Therefore they could be said to be unreliable at the time making electronic information sharing difficult as well as challenging. From this explanation the right answer to this question is answer option b.

Thank you.

Discuss why databases are important in accounting information systems. Describe primary and foreign keys, normalization and database cardinalities. Why are each important to the database design

Answers

Answer:

ensure integrity. primary key is unique key..foreign key is to connect 2 table.normalization to ensure you keep track on what you should do to create db..

8.7 LAB: Instrument information (derived classes)
Given main() and the Instrument class, define a derived class, StringInstrument, for string instruments.

Ex. If the input is:

Drums
Zildjian
2015
2500
Guitar
Gibson
2002
1200
6
19
the output is:

Instrument Information:
Name: Drums
Manufacturer: Zildjian
Year built: 2015
Cost: 2500
Instrument Information:
Name: Guitar
Manufacturer: Gibson
Year built: 2002
Cost: 1200
Number of strings: 6
Number of frets: 19

Answers

Answer:

Explanation:

Using the main() and Instrument class which can be found online. We can create the following StringInstrument class that extends the Instrument class itself. The only seperate variables that the StringInstrument class posses' would be the number of Strings (numStrings) and the number of frets (numFrets). Due to technical difficulties I have added the code as a seperate text file below.

RecursionexerciseCOP 3502; Summer2021We have gone through many examples in the class and those examples are available in the slides and uploaded codes. Try to test those codes and modify as you wish for getting more clarification.In additiontry the following:---------------------------------------------------------------------------------------------------------------------------------------1.What would be the output of the following recursive function if we call rec2(5)

Answers

Answer:

The output is:

1 2 3 4 5

Explanation:

Given

See attachment for code segment

Required

The output of rec2(5)

From the attached code segment, we have the following:

The base case: if (x==0){ return;}

The above implies that, the recursion ends when the value of x gets reduced to 0

The recursion:

rec2(x-1); ---- This continually reduces x by 1 and passes the value to the function

printf("%d ", x); This prints the passed value of x

Hence, the output of rec2(5) is: 1 2 3 4 5

let's have a class named Distance having two private data members such as feet(integer), inches(float), one input function to input values to the data members, one Display function to show the distance. The distance 5 feet and 6.4 inches should be displayed as 5’- 6.4”. Then add the two objects of Distance class and then display the result (the + operator should be overloaded). You should also take care of inches if it's more than 12 then the inches should be decremented by 12 and feet to be incremented by 1.

Answers

Answer:

Humildade

Ser justo (Fair Play)

Vencer independente

Use Python.
Complete reverse() method that returns a new character array containing all contents in the parameter reversed.
Ex: If the input array is:
['a', 'b', 'c']
then the returned array will be:
['c', 'b', 'a']
import java.util.*;
public class LabProgram {
// This method reverses contents of input argument arr.
public static char[] reverse(char[] arr) {
/* Type your code here. */
}
public static void main(String[] args) {
char [] ch = {'a','b','c'};
System.out.println(reverse(ch)); // Should print cba
}
}

Answers

Answer:

Explanation:

The code in the question is written in Java but If you want it in Python then it would be much simpler. The code below is writen in Python and uses list slicing to reverse the array that is passed as an argument to the function. The test case from the question was used and the output can be seen in the attached image below.

def reverse(arr):

   reversed_arr = arr[::-1]

   return reversed_arr

You are developing a Windows forms application used by a government agency. You need to develop a distinct user interface element that accepts user input. This user interface will be reused across several other applications in the organization. None of the controls in the Visual Studio toolbox meets your requirements; you need to develop all your code in house.

Required:
What actions should you take?

Answers

Answer:

The answer is "Developing the custom control for the user interface"

Explanation:

The major difference between customized control & user control would be that it inherit throughout the inheritance tree at different levels. Usually, a custom power comes from the system. Windows. UserControl is a system inheritance.

Using accuracy up is the major reason for designing a custom UI control. Developers must know how to use the API alone without reading the code for your component. All public methods and features of a custom control will be included in your API.

????????????????????????????????

Answers

Answer:

(c) 4

Explanation:

The function strpos() is a function in php that returns the position of the first occurrence of a particular substring in a string. Positions are counted from 0. The function receives two arguments. The first argument is the string from which the occurrence is to be checked. The second argument is the substring to be checked.

In this case, the string is "Get Well Soon!" while the substring is "Well"

Starting from 0, the substring "Well" can be found to begin at position 4 of the string "Get Well Soon!".

Therefore, the function strpos("Get Well Soon!", "Well") will return 4.

Then, with the echo statement, which is used for printing, value 4 will be printed as output of the code.

A coin is tossed repeatedly, and a payoff of 2n dollars is made, where n is the number of the toss on which the first Head appears. So TTH pays $8, TH pays $4 and H pays $2. Write a program to simulate playing the game 10 times. Display the result of the tosses and the payoff. At the end, display the average payoff for the games played. A typical run would be:

Answers

Answer:

Explanation:

The following code is written in Java. It creates a loop within a loop that plays the game 10 times. As soon as the inner loop tosses a Heads (represented by 1) the inner loop breaks and the cost of that game is printed to the screen. A test case has been made and the output is shown in the attached image below.

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       int count = 0;

       int loopCount = 0;

       while (loopCount < 10) {

           while (true) {

               Random rand = new Random();

               int coinFlip = rand.nextInt(2);

               count++;

               if (coinFlip == 1) {

                   System.out.println("Cost: $" + 2*count);

                   count = 0;

                   break;

               }

               loopCount++;

           }

       }

   }

}

Write a program that will read two floating point numbers (the first read into a variable called first and the second read into a variable called second) and then calls the function swap with the actual parameters first and second. The swap function having formal parameters number1 and number2 should swap the value of the two variables.
Sample Run:
Enter the first number
Then hit enter
80
Enter the second number
Then hit enter
70
You input the numbers as 80 and 70.
After swapping, the first number has the value of 70 which was the value of the
second number
The second number has the value of 80 which was the value of the first number

Answers

Answer:

The program in Python is as follows:

def swap(number1,number2):

   number1,number2 = number2,number1

   return number1, number2

   

first = int(input("First: "))

second = int(input("Second: "))

print("You input the numbers as ",first,"and",second)

first,second= swap(first,second)

print("After swapping\nFirst: ",first,"\nSecond:",second)

Explanation:

This defines the function

def swap(number1,number2):

This swaps the numbers

   number1,number2 = number2,number1

This returns the swapped numbers

   return number1, number2

The main begins here

This gets input for first    

first = int(input("First: "))

This gets input for second

second = int(input("Second: "))

Print the number before swapping

print("You input the numbers as ",first,"and",second)

This swaps the numbers

first,second= swap(first,second)

This prints the numbers after swapping

print("After swapping\nFirst: ",first,"\nSecond:",second)

Explain why interrupt times and dispatch delays must be limited to a hard real-time system?

Answers

Answer:

The important problem is explained in the next section of clarification.

Explanation:

The longer it is required for a computing device interrupt to have been performed when it is created, is determined as Interrupt latency.

The accompanying duties include interrupt transmission delay or latency are provided below:

Store the instructions now being executed.Detect the kind of interruption.Just save the present process status as well as activate an appropriate keep interrupting qualitative functions.

(Count the occurrences of words in a text file) Rewrite Listing 21.9 to read the text from a text file. The text file is passed as a command-line argument. Words are delimited by whitespace characters, punctuation marks (, ; . : ?), quotation marks (' "), and parentheses. Count the words in a case-sensitive fashion (e.g., consider Good and good to be the same word). The words must start with a letter. Display the output of words in alphabetical order, with each word preceded by the number of times it occurs.
I ran my version of the program solution on its own Java source file to produce the following sample output:
C:\Users\......\Desktop>java CountOccurrenceOfWords CountOccurrenceOfWords.java
Display words and their count in ascending order of the words
1 a
1 alphabetical
1 an
2 and
3 args
2 as
1 ascending
1 catch
1 class
4 count
2 countoccurrenceofwords
1 create
1 display
1 else
3 entry
3 entryset
2 ex
1 exception
1 exit
1 file
2 filename
3 for
1 fullfilename
3 get
1 getkey
1 getvalue
1 hasnext
1 hold
5 i
3 if
2 import
2 in
3 input
2 int
1 io
3 java
6 key
3 length
2 line
1 main
3 map
1 matches
3 new
1 nextline
1 null
1 of
2 order
3 out
3 println
1 printstacktrace
2 public
2 put
2 scanner
1 set
1 split
1 static
5 string
4 system
2 the
1 their
1 to
1 tolowercase
2 tree
6 treemap
2 trim
1 try
1 util
1 value
1 void
1 while
9 words
C:\Users\......\Desktop>

Answers

Answer:

Explanation:

The following is written in Java. It uses File input, to get the file and read every line in the file. It adds all the lines into a variable called fullString. Then it uses regex to split the string into separate words. Finally, it maps the words into an array that counts all the words and how many times they appear. A test case has been created and the output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.

Describe how keyboard software works and which problems does keyboard software
need to handle?

Answers

Answer:

The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.

No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.

Large computer programs, such as operating systems, achieve zero defects prior to release. Group of answer choices True False PreviousNext

Answers

Answer:

The answer is "False"

Explanation:

It is put to use Six Sigma had 3.4 defects per million opportunities (DPMO) from the start, allowing for a 1.5-sigma process shift. However, the definition of zero faults is a little hazy. Perhaps the area beyond 3.4 DPMO is referred to by the term "zero faults.", that's why Before being released, large computer programs, such as operating systems, must have no faults the wrong choice.

When computer users have trouble with their machines or software, Roland is the first person they call for help. Roland helps users with their problems, or refers them to a more-experienced IT employee. Roland holds the position of __________ in the organization. Support Analyst Systems Analyst Network Administrator Database Administator

Answers

Answer:

The correct answer is A) Support Analyst

Explanation:

From the question, we can see that Roland is familiar with both machines and software. He is familiar with the operations of both parts of a computer to the end that he can attempt a fix. And if he can't he knows who to refer the end-users to. Usually, some IT personnel that is more experienced.

From the above points, we can safely say that Roland is an IT Support Analyst. He cannot be the Systems analyst because Systems Analysts are usually at the top of the Pyramid. They take on problems that are referred upwards to them from support analysts.

Cheers

Select the correct answer.
Which network would the patrol services of a city's police department most likely use?

A. LAN
в.PAN
C.CAN
D.MAN

Answers

Answer:

D. MAN

Explanation:

A local area network (LAN) refers to a group of personal computers (PCs) or terminals that are located within the same general area and connected by a common network cable (communication circuit), so that they can exchange information from one node of the network to another. A local area network (LAN) is typically used in small or limited areas such as a set of rooms, a single building, school, hospital, or a set of well-connected buildings. Some of the network devices or equipments used in a local area network (LAN) includes an access point, personal computers, a switch, a router, printer, etc.

On the other hand, a metropolitan area network (MAN) is formed by an aggregation of multiple local area network (LAN) that are interconnected using backbone provided by an internet service provider (ISP). A metropolitan area network (MAN) spans for about 5 kilometers to 50 kilometers in size.

Basically, a metropolitan area network (MAN) spans across a geographic area such as a city and it's larger than a local area network (LAN) but significantly smaller than a wide area network (WAN).

In conclusion, the network type that the patrol services of a city's police department would most likely use is a metropolitan area network (MAN).

Answer:

The correct answer is D. Man.

Explanation:

I got it right on the Edmentum test.

what type of slab and beam used in construction of space neddle​

Answers

Answer:

Pyramidal Space Frame Glamorizes Swimming Pool 15. News Briefs 16 ... to use every pound of steel with no sacrifice in safety or ... form of steel trusses in an inverted coni- ... be embedded in the concrete slab when.

Explanation:

I HOPE THIS HELPS

A recursive method may call other methods, including calling itself. A recursive method has:
1. a base case -- a case that returns a value or exits from a method without performing a recursive call.
2. a recursive case -- calling the method again with a smaller case..
Study the recursive method given below.
For example, this call recursiveMethod (5); returns 15:
public static int recursiveMethod (int num) (
if (num == 0)
return 1;
else {
if (numX2!=0)
return num * recursiveMethod (num -1);
else
return recursiveMethod (num-1);
}
}
1 What is the base case?
2. What does the following statement check?
3. What does the method do?

Answers

Answer:

Hence the answer is given as follows,

Explanation:

Base Case:-  

If (num == 0) //This is the base case for the given recursive method  

return 1;  

If(num % 2!=0) checks whether num is odd.  

The above condition is true for all odd numbers and false for even numbers.  

if the remainder is not equal to zero when we divide the number with 2 then it is odd.  

The method:-  

The above recursive method calculates the product of odd numbers up to the given range(that is num)  

For num=5   => 15(5*3*1).  

For num=7   => 105(7*5*3*1).  

For num=10 => 945(9*7*5*3*1).

LAB: Count characters - methods
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string.
Ex: If the input is
n Monday
the output is
1
Ex: If the input is
Today is Monday
the output is
0
Ex: If the input is
n it's a sunny day
the output is
0
Your program must define and call the following method that returns the number of times the input character appears in the input string public static int countCharacters (char userChar, String userString)
Note: This is a lab from a previous chapter that now requires the use of a method
LabProgram.java
1 import java.util.Scanner
2
3 public class LabProgram
4
5 /* Define your method here */
6
7 public static void main(String[] args) {
8 Type your code here: * >
9 }
10 }

Answers

Answer:

i hope understand you

mark me brainlist

Explanation:

using namespace std;

#include <iostream>

 

#include <string.h>

#include <stdlib.h>

#include <stdio.h>

 

#define BLANK_CHAR (' ')

 

 

int CountCharacters(char userChar, char * userString)

{

 

int countReturn=0;

 

int n = strlen(userString);

 

for (int iLoop=0; iLoop<n; iLoop++)

{

       if (userString[iLoop]==userChar)

       {

        countReturn++;

 }

}

return(countReturn);

}

 

/******************************************

    Removes white spaces from passed string; returns pointer

     to the string that is stripped of the whitespace chars;

   

  Returns NULL pointer is empty string is passed;  

     Side Effects:

 CALLER MUST FREE THE OUTPUT BUFFER that is returned

 

 **********************************************************/

char * RemoveSpaces(char * userString)

{

 

 char * outbuff = NULL;

 

 if (userString!=NULL)

 {

   int n = strlen(userString);

    outbuff = (char *) malloc(n);

 

   if (outbuff != NULL)

   {

          memset(outbuff,0,n);

          int iIndex=0;

          //copies non-blank chars to outbuff

         for (int iLoop=0; iLoop<n; iLoop++)

         {

           if (userString[iLoop]!=BLANK_CHAR)

          {

           outbuff[iIndex]=userString[iLoop];

           iIndex++;

   }

   

   } //for

         

   }

   

   }

 return(outbuff);

 

}

 

 

int main()

{

 

 char inbuff[255];

 cout << " PLEASE INPUT THE STRING OF WHICH YOU WOULD LIKE TO STRIP WHITESPACE CHARS :>";

 gets(inbuff);

 

 char * outbuff = RemoveSpaces(inbuff);

 if (outbuff !=NULL)

 {

    cout << ">" << outbuff << "<" << endl;

    free(outbuff);

    }

     

   memset(inbuff,0,255);  

   cout << " PLEASE INPUT THE STRING IN WHICH YOU WOULD LIKE TO SEARCH CHAR :>";

gets(inbuff);

 

  char chChar;

 cout << "PLEASE INPUT THE CHARCTER YOU SEEK :>";

 cin >> chChar;

 

 int iCount = CountCharacters(chChar,inbuff);

 cout << " char " << chChar << " appears " << iCount << " time(s) in >" << inbuff << "<" << endl;

 

}

When rating ads, I should only consider my personal feelings on the ad.

Answers

Answer:

yes when rating ads you should only consider your personal feelings on the ad

Consists of forging the return address on an email so that the message appears to come from someone other than the actual sender:_____.
A. Malicious code.
B. Hoaxes.
C. Spoofing.
D. Sniffer.

Answers

Answer:

C. Spoofing.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.

Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.

The valid call to the function installApplication is

void main(  )
{
 // call the function installApplication
}

void installApplication(char appInitial, int appVersion)
{
  // rest of function not important
}

Answers

Answer:

B. installApplication(‘A’, 1);

Explanation:

Given

The above code segment

Required

The correct call to installApplication

The function installApplication is declared as void, meaning that it is not expected to return anything.

Also, it receives a character and an integer argument.

So, the call to this function must include a character and an integer argument, in that order.

Option D is incorrect because both arguments are integer

Option C is incorrect because it passes no argument to the function.

Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).

Option B is correct

uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs

Answers

Answer:

The answer is "Option c"

Explanation:

In PHP to remove all the session variables, we use the session_destroy() function. It doesn't take any argument is required and then all sessions variables could be destroyed by a single call. If a particular clinical variable is now to be destroyed, the unset() function can be applied to unset a session variable. Its session doesn't unset or unset the session cookie by either of the local variables associated with it.

Connie works for a medium-sized manufacturing firm. She keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer. Connie is employed as a __________. Hardware Engineer Computer Operator Database Administrator Computer Engineer

Answers

Answer: Computer operator

Explanation:

Following the information given, we can deduce that Connie is employed as a computer operator. A computer operator is a role in IT whereby the person involved oversees how the computer systems are run and also ensures that the computers and the machines are running properly.

Since Connie keeps the operating systems up-to-date, ensures that memory and disk storage are available, and oversees the physical environment of the computer, then she performs the role of a computer operator.

Computer data that is suitable for text​

Answers

Answer:

Answer:Data Types. Computer systems work with different types of digital data. In the early days of computing, data consisted primarily of text and ...

convert FA23DE base 16 to octal

Answers

kxjhdjshdjdjrhrjjd

snsjjwjsjsjjsjejejejd

s

shsjskkskskskekkes

slskekskdkdksksnsjs

djmsjs

s JM jsmsjjdmssjsmjdjd s

jsmsjjdmssjsmjdjd

HS shhsys

s

s

sujdjdjd s

sujdjdjd

syshdhjdd

Answer:

764217360

Explanation:

command create database in oracle database ::((

Answers

Answer:

kdkskskiisidiodoosooddodod

A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review, a savvy consumer should (5 points)

consider if the blogger has been paid by U-Phone
assume the blogger probably knows a lot about U-Phones
examine multiple U-Phone advertisements
speak to a U-Phone representative for an unbiased opinion

Answers

Answer:

Speak to a U-Phone representative.

Explanation:

A representative will tell you the necessary details about the U-phone without any biases whatsoever, as they´re the closest to the company when it comes to detail about their products.

Tu teléfono es muy bueno no sé mucho de que se trata porque no se inglés y el celular está en inglés.

The ____ contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.

Answers

Explanation:

The taskbar contains app buttons that allow you to quickly run the File Explorer or Microsoft Edge apps.

Hope this helps

Need help coding a sql probelm (not that hard im just confused)

Answers

Answer:

random answer

Explanation:

point = selct dnsggg

Other Questions
CPA Inc. is a publicly traded company. The stockholders of this company delegate the authority to make decisions for the company to a CEO named Joaquin. The stockholders expect Joaquin to make decisions that will benefit the company. However, Joaquin begins to find ways to maximize his total compensation, which hinders CPA's performance. This scenario reflects Union Local School District has bonds outstanding with a coupon rate of 3.9 percent paid semiannually and 16 years to maturity. The yield to maturity on these bonds is 4.2 percent and the bonds have a par value of $5,000. What is the price of the bonds 1. Which one of the following is not an organic compound? Why? CH4 C2H6O CaO 2. Fill in the chart below to identify and describe the functional groups associated with organic chemistry. Name General Structure Properties/Uses Alcohol Aldehyde Ketone Fatty acid Ether 3. Explain why carbon is called the backbone molecule of organic chemistry and why organic molecules couldn't easily be based on H or O instead. Name a textile factory in Massachusetts, which ran on water power, and employed young low-skilled women. a. Lowell Factory. b. Lancaster Textiles. c. Vanderbilt Textiles. d. American Factory. How are molecules composed of atoms held together?through gravitythrough frictionthrough chemical bondingthrough hydrogen bonding Being the Sales Manager of a company you have to hire more salesperson for the company to expand the sales territory. Kindly suggest an effective Recruitment and Selection Process to HR by explaining the all the stages in detail. can you explain it please and which method is correct? Imagine you are a civil rights lawyer in the 1960s arguing before the Supreme Court that the federal government needed the legal authority to force states to end their discriminatory practices against racial minorities. Which constitutional amendment would be most helpful as you prepare your case When you hold an object with a positive electric charge near an object with anegative electric charge, it causes the negatively charged object to move. Howcould you model this interaction with magnets? Describe the types of forcesinvolved and the energy transformations that take place. Suppose the economy is in long-run equilibrium. Concerns about pollution cause the government to significantly restrict the production of electricity. At the same time, the value of the dollar falls. What would we expect to happen in the short run? a. The price level will rise, and real GDP might rise, fall, or stay the same. b. The price level will fall, and real GDP might rise, fall, or stay the same. c. Real GDP will rise, and the price level might rise, fall, or stay the same. d. Real GDP will fall, and the price level might rise, fall, or stay the same. Couch johnson needs to buy shirts for his soccer players. He finds a package of 2:shirts for 16.00. How much will it cost to buy 18 shirts? Activity 2. pls just give me the formula or answer this, it really help me 5A solid logos argument consists of a claim, support and warrant.TrueFalse On January 1, 2013, the balance in Tabor Co.'s Allowance for Bad Debts account was $13,546. During the first 11 months of the year, bad debts expense of $21,399 was recognized. The balance in the Allowance for Bad Debts account at November 30, 2013, was $9,859. Required: (a) What was the total of accounts written off during the first 11 months What is the present value of the annual interest payments on a 10-year, $1,000 par value bond with a coupon rate of 10 percent paid annually, if the yield on similar bonds is 9 percent? (x+a)(x-a) = x -25 then what is the value of a ? Suppose that you own 1,300 shares of Nocash Corp. and the company is about to pay a 25% stock dividend. The stock currently sells at $100 per share.a. What will be the number of shares that you hold after the stock dividend is paid?b. What will be the total value of your equity position after the stock dividend is paid?c. What will be the number of shares that you hold if the firm splits five for four instead of paying the stock dividend? I HAVE A PHYSICS TEST, ITS 25 QUESTIONS AND I HAVE ABOUT AN HOUR TO SOLVE IT PLEASE IF YOU'RE GOOD AT PHYSICS CONTACT ME ASAP Which of the following statements describes one way that energy flows out of an ecosystem? What is the range of the function f(x) = 4x + 9, given the domain D = {-4, -2, 0, 2}?