in cell c8, use the dcounta database function to calculate the number of apartments that need to be remodeled based on the advanced filter you created.

Answers

Answer 1

In cell C8, the DCountA database function is used to calculate the number of apartments that require remodeling based on the advanced filter that was created. Here's how to use the DCountA function: =DCountA(database, field, criteria)`.

The database parameter is the range of cells that contains the data, and the field parameter is the column that contains the data you're interested in counting. The criteria parameter is an optional range of cells that specifies the conditions that must be met in order for a record to be included in the count. So if the data range is in A1:B10, the field parameter is 2 to count the second column, and the criteria parameter is C1:C2 to only count records that match the values in cells C1 and C2, the function would look like this: =DCountA(A1:B10, 2, C1:C2).

Using this syntax, we can use the DCountA function to count the number of apartments that need to be remodeled based on the advanced filter we created in a particular column. Here's an example of how to use it: =DCountA(A1:C100, "Apartment", D1:D2)`This function will count the number of apartments in the range A1:C100 that match the criteria in cells D1 and D2, and display the result in cell C8.

To learn more about excell; https://brainly.com/question/29280920

#SPJ11


Related Questions

Hyper-Tech Enterprises manufactures mechanical parts used in air conditioning and heating units. The company employs over 300 workers at its Alabama facility. None of the Hyper-Tech employees belong to a union; however, management believes that unionization is in the near future. A representative of a local union has recently visited Hyper-Tech in an attempt to solicit members and have them sign authorization cards. Enough eligible employees have signed authorization cards to petition the NLRB for an election. Hyper-Tech's top executives are considering fighting the unionization efforts. Which of the following, if true, suggests Hyper-Tech has engaged in an unfair labor practice?
a. Hyper-Tech managers prohibited union representatives from soliciting employees who were on duty.
b. Hyper-Tech managers intervened when pro-union employees solicited other employees while both were on duty.
c. Hyper-Tech managers barred nonemployee union representatives from entering the firm's building.
d. Hyper-Tech managers prohibited distribution of union literature in the company cafeteria.

Answers

Answer:

d

Explanation:

The one action listed in the question that would suggest unfair labor practices would be if Hyper-Tech managers prohibited the distribution of union literature in the company cafeteria. This is because a company can prevent employees from partaking in other tasks and getting distracted while on duty. When an employee is on duty they are getting paid to focus and complete their responsibilities. An employer also has the right to prevent non-employee individuals from entering private property such as their facility. What a company cannot do is prevent their employees from deciding what the literature that they want to read or the decisions that they want to make outside of work hours. Therefore, preventing the employees from accepting literature while on their break time would be considered unfair labor practice.

A European call has strike \( K=9 \) and expires in two time-steps. In CoxRoss-Rubinstein notation, the underlying asset has \( S=11, u=1.2 \) and \( d=1 / u \). If the return is \( R=1.03 \) over one

Answers

The European call option with a strike price \( K = 9 \) and a two-time-step expiration in the Cox-Ross-Rubinstein model can be evaluated as follows.

In the Cox-Ross-Rubinstein model, the underlying asset has a current price of \( S = 11 \), an upward movement factor of \( u = 1.2 \), and a downward movement factor of \( d = 1 / u \).

To calculate the option value, we need to determine the risk-neutral probability \( p \) and the expected return \( R \) over one time step. Given that the return \( R = 1.03 \), we can calculate the risk-neutral probability as:

\(\[ p = \frac{R - d}{u - d} = \frac{1.03 - 1 / u}{u - 1 / u} \]\)

Once we have the risk-neutral probability, we can calculate the option value using the risk-neutral pricing formula. However, the question does not provide the risk-free interest rate or the time to expiration in terms of years, which are necessary for the calculations. Without this information, it is not possible to determine the precise value of the European call option.

To know more about  Cox-Ross-Rubinstein model

brainly.com/question/20475299

#SPJ11

who sang devil went down to georgia

Answers

Answer:

Charlie Daniels sang that one for sure

Sasha's new company has told her that she will be required to move at her own expense in two years. What should she consider before making her decision?

Answers

To make her decision, Sasha should consider cost of living, job market, quality of life, social network, and career advancement before moving for her new job.


What is the rationale for the above response?  

Before deciding whether or not to move for her new job, Sasha should consider several key factors.

Firstly, she should research the cost of living in the area where she will be moving to, as well as job opportunities, salaries and stability of the job market. Secondly, she should consider the overall quality of life, including climate, recreational opportunities and community atmosphere.

Note as well that, Sasha should consider her current social network and the opportunity to build a new one in the area where she will be moving to. Finally, she should weigh the potential benefits and costs of the move in terms of her personal and professional goals to determine if it is the right decision for her.

Learn more about Decision Making at:

https://brainly.com/question/13244895

#SPJ1

Why would you choose to use Word Art rather than a colored font when creating a Google Slides presentation? There are more fonts in Word Art Word Art has fewer graphical features Because color is always distracting Word Art lets you customize the look more

Answers

Answer:

D. Word Art helps you customize the look more.

Explanation:

Word Art is a design feature in Microsoft Word that helps users design creative texts. A placeholder text appears in the working area and instructs the user to enter his own text there. The size of the text can be adjusted according to the need of the user. A user can enter a simple sentence or a complete paragraph in the text and can customize the look according to his needs.

The letter A shows the different designs that can be applied by the user. Also, symbols can be inserted in the text. So, when creating a Google Slides Presentation, Word Art would be a preferred choice because of the ease in customizing.

Can you help me with Computer issues graphic organizer?
Will give out brainly

Can you help me with Computer issues graphic organizer?Will give out brainly

Answers

Just put for first: coding, graphics and for second : designing, writing
Third?: put all of the abov

An intruder monitors an admin's unsecure connection to a server and finds some required data, like a cookie file, that legitimately establishes a session with a web server. What type of attack can the intruder perform with the cookie file?

Answers

a cookie replay attack

Hardware refers to the _________________ of a computer

Answers

Answer:

physical component

Explanation:

Well, softwares are the applications and anything installed inside the computer but hardware isn't installed, it's just been connected by wires

Write a JavaScript program in an HTML document to ask user to enter a class of math marks
(0 – 100) by using a while loop, then when the user enters a negative number, your program
should display the class average to one decimal place.

Answers

Here is a sample JavaScript program depicted in an HTML document that utilizes a while loop to ask the user to enter math marks and thereby compute the class average:

The Program

The calculateAverage() function can be triggered when the user presses "Calculate". It consists of a while loop, within which three variables - sum (total marks), count (number of marks entered) and mark (the current mark being analyzed) are set up.

The cycle continues until a negative number is inserted; it encompasses marks between 0 and 100 (inclusive). As soon as the user inserts an integer below zero, the cycle halts and the average is obtained by dividing the summation by the amount.

The class average is sent to one decimal place through the usage of the toFixed() procedure on the average variable. Lastly, the conclusive result is shown in the HTML record by setting the innerHTML of the segment "result" to a string that involves the class median.


Read more about JavaScript here:

https://brainly.com/question/16698901

#SPJ1

Write a JavaScript program in an HTML document to ask user to enter a class of math marks(0 100) by using

8.2 code practice edhesive?

Answers

Answer:

temperatures = []

i = 0

while i < 5:

   try:

       t = int(input('Enter a temperature: '))

       temperatures.append(t)

       i += 1

   except ValueError:

       print('Enter a number')

print(temperatures)

Explanation:

Hope this helps!

Which of the following scenarios should be covered in a disaster recovery plan?

damage caused by lightning strikes
damage caused by flood
damage caused by a virus contamination
all of the above

Answers

A comprehensive disaster recovery plan should cover all of the mentioned scenarios, including damage caused by lightning strikes, flood, and virus contamination.

A disaster recovery plan is a crucial document that outlines procedures and strategies to minimize the impact of unforeseen events and restore business operations in the event of a disaster. Lightning strikes can cause power surges or electrical fires, leading to damage or destruction of critical infrastructure. Floods can result in water damage to equipment, facilities, and data storage systems. Virus contamination, such as malware or ransomware attacks, can disrupt operations, compromise data security, and potentially lead to data loss. By including all these scenarios in the disaster recovery plan, organizations can proactively prepare for and respond to these different types of disasters, ensuring continuity of operations and minimizing downtime and losses.

Learn more about Comprehensive disaster here; brainly.com/question/31545163
#SPJ11

which of the following is false regarding excel tables? (1 point) filtering can be done from the drop-downs. leveled sorting can be done from the drop downs. table styles can be applied. structured references can be used in formulas.

Answers

The following statements about Excel tables are all accurate. As a result, none of them are untrue.

What does an Excel true statement mean?

Excel's logical functions include the TRUE Function[1]. The logical value of TRUE will be returned. The function is the mathematical equivalent of entering the Boolean value TRUE explicitly. The TRUE function is frequently combined with other logical functions, such as IF, ERROR, etc., in financial analysis.

What in Excel is false?

In Excel, the FALSE function is equivalent to the value 0. With the help of this function, we can carry out all mathematical operations. This function returns zero when used to multiply any number.

To know more about Excel visit:-

https://brainly.com/question/30324226

#SPJ1

What device is typically the default gateway for a local network?

Answers

The router is typically the default gateway for a local network, allowing devices on the network to communicate with other networks and the internet.

The device that is typically the default gateway for a local network is the router.

A router is a networking device that connects multiple networks and forwards data packets between them. It operates at the network layer (Layer 3) of the OSI model and uses routing tables to determine the best path for data packets to reach their destination.

In a local network, the router serves as the gateway to the internet or another network. It is responsible for routing traffic between the local network and the external network, and it typically has a public IP address on the external network and a private IP address on the local network.

When a device on the local network wants to communicate with a device on the external network, it sends the data packets to the router, which then forwards them to their destination.

The router's IP address on the local network is used as the default gateway  by devices on the local network to send data outside of the local network.

For such more questions on Local network:

https://brainly.com/question/8118353

#SPJ11

3-46. Indicate the importance of APIs. What have been the advantages of DBS in creating a developer platform?
3-47. Explain what it means to think "outside of the box" in the context of DBS.
3-48. How well is DBS prepared for the future? Based on: API University. What are APIs and how do they work?

Answers

APIs or Application Programming Interfaces are crucial for businesses that want to interact with other businesses or software and allow developers to create new applications by integrating existing services and data.

DBS has found several advantages in creating a developer platform, which include the following:Advantages of DBS in creating a developer platform: Creating a developer platform has several advantages for DBS. Firstly, DBS has access to a range of developers who can create new applications using DBS's APIs.

This can create new revenue streams for the bank and give customers more options for banking services.Secondly, a developer platform can help the bank increase its brand recognition and visibility among potential customers.

To know more about Programming visit :

https://brainly.com/question/14368396

#SPJ11

Please provide an idea for both a personal project and a group
project. The scope needs to be reasonable in size, as the time to
complete the project and the resources will be limited. (you can
provid

Answers

A personal project idea is to create a personal finance tracker to track income and expenses. A group project idea is to create a community garden in a public space, requiring planning, planting schedules, and recruiting volunteers to provide fresh produce for the community.

Personal Project Idea:
Create a personal finance tracker: This project involves creating a spreadsheet or using a personal finance app to track income and expenses. The tracker should include categories for expenses such as rent, food, utilities, entertainment, and savings, as well as a budget for each category. The tracker can be customized to meet individual needs and can be used to identify areas where spending can be reduced and savings can be increased.

Group Project Idea:
Community garden project: This project involves creating a community garden in a public space such as a park or schoolyard. The project would require planning and organizing planting schedules, obtaining necessary supplies such as soil, seeds, and gardening tools, and recruiting volunteers to help with planting, maintenance, and harvesting. The garden can be used to provide fresh produce for the community and can also serve as an educational resource for local schools.

To know more about personal projects, visit:
brainly.com/question/32301757
#SPJ11

Katrina wants to get a random number and assign it to a variable called force. Which line of code should be used?

orce = random.randint(1,10)

force = random(1,10)

force = randint(1,10)

force == random.randint(1,10)

Answers

Since Katrina wants to get a random number and assign it to a variable called force the code to be used is

force = random.randint(1, 10)

How will the above code work?

This line uses the randint function from the random module to generate a random integer between 1 and 10 (inclusive) and assigns it to the variable force

Computer code is a set of instructions or a set of rules written in a specific programming language (i.e., the source code) in computer programming.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

How many items are returned from calcAverage()?

public static int calc Average(int a, int b, int c){. . .}

a. 0

b. 1

c. 2

d. 3

Answers

The function named calcAverage takes in three integer parameters and finds their mean value of the three integers which is a single value. Hence, the number of items returned is 1.

The number of values performed when we obtain the mean or average value of a set of values is a single vlaue which represents the measure of spread of the data.

Therefore, the number of items returned from calcAverage() is 1.

Learn more :https://brainly.com/question/13171394

Consider the following code segment:

ArrayList scales = new ArrayList ();
scales.add("DO");
scales.add("RE");
scales.add("MI");
scales.add("FA");
scales.add("SO");
String swap = scales.get(2);
scales.remove(2);
String set = scales.remove(scales.size()-1);
scales.add(scales.get(0));
scales.set(0,set);
scales.add(scales.size()/2, swap);

Which of the following represents the value of scales after the code has been executed?


[SO, RE, FA, DO]


[SO, RE, MI, FA, DO]


[SO, RE, MI, DO]


[FA, RE, MI, DO]


[FA, SO, RE, MI, DO]

Answers

The scales value after code execution will be [FA, SO, RE, MI, DO].

How to Perform Scale Programming?

The scale schedule must be used for a predetermined period (temporary), as it will not generate an event for eSocial.

To include it, access the menu: Schedules/ Schedule Schedules.

Example: If an employee makes the 0002 scale, it can be informed that in a certain period he will make the 0003 scale. And at the end of this period, the system will consider the Contract's initial scale again.

Scheduling can be done individually or collectively. It can also be in a single day or in a range of days.

Learn more about code execution in https://brainly.com/question/16698901

Answer:

[SO, RE, MI, FA, DO]

Explanation:

Consider the following code segment:ArrayList scales = new ArrayList ();scales.add("DO");scales.add("RE");scales.add("MI");scales.add("FA");scales.add("SO");String

today food is produced and transported all over the world. name some pros and cons of it.

Answers

Answer:

Waste and left

Explanation:

Pros: Widespread Food Variety, Larger Food Quantity

Cons: Extra Uses Of Non-Reusable Energy By Transport, Taxes

HELP PLEASE SOMEONE PLEASE HELP ME!!!!!

HELP PLEASE SOMEONE PLEASE HELP ME!!!!!

Answers

I feel it is C, but I am not sure if it is correct, I can only apologize if it is wrong.

what is the file that the sudo command uses to log information about users and the commands they run, as well as failed attempts to use sudo

Answers

The file that the sudo command uses to log information about users and the commands they run, as well as failed attempts to use sudo is called the sudo log file.

Sudo is a Unix-based utility that allows non-root users to execute commands with elevated privileges on a Unix system. When using sudo to execute a command, users must first authenticate themselves using their own credentials. After being authenticated, the user's credentials are cached for a certain amount of time, making it easier for them to execute additional commands without having to re-enter their credentials.In order to keep track of sudo usage, the sudo command logs all successful and failed sudo usage in a file called the sudo log file.

By default, the sudo log file is located  on most Unix systems. However, this location can be changed by modifying the sudoers configuration file with the visudo command. In addition to logging successful and failed sudo usage, the sudo log file can also be used to audit user activity on a Unix system.In summary, the sudo log file is a file that the sudo command uses to log information about users and the commands they run, as well as failed attempts to use sudo. It is an important tool for monitoring and auditing user activity on a Unix system.

Learn more about sudo here:

https://brainly.com/question/32100610

#SPJ11

Need the answer rn!!!!

Need the answer rn!!!!

Answers

Answer:

what language is this? english or no

Explanation:

speed(?)

penup?

? (-200, -200)

? (90)

Pendown?

begin_fill?

? ("tan")

#Trace the outside of the grid (shape is a square)

? (400)

right(?)

? (400)

right(?)

? (400)

right(?)

? (400)

right(?)

end_fill?

? Go to lower, left corner of R and have turtle look up. Pen and shape fill blue

?()

set position(?)

?()

? ("blue")

begin_fill?

? Trace the outside of the letter R.

forward(?)

? (90)

? (160)

right(?)

forward(?)

? (90)

? (20)

? (100)

? (120)

right(?)

? (40)

right(?)

? (120)

? (80)

forward(?)

left(?)

? (120)

? (90)

? (40)

right(?)

end fill ()

? Move to inside of R (lower left corner). Color tan and fill the shape.

penup?

? (-40,20)

?()

color ("?")

begin_fill?

? Trace the inside of R (shape is a square).

forward(?)

? (90)

? (80)

right(?)

forward(?)

? (90)

? (80)

right(?)

end_fill?

? Go to lower, left corner of R. Make pen white and pensize 8.

?()

? (-80, -140)

? ("white")

pensize(?)

?()

? Trace outside of the letter R.

forward(?)

? (90)

? (160)

right(?)

forward(?)

? (90)

? (20)

? (100)

? (120)

right(?)

? (40)

right(?)

? (120)

? (80)

forward(?)

left(?)

? (120)

? (90)

? (40)

right(?)

? Move to inside of R (lower left corner).

penup?

? (-40,20)

?()

? Trace the inside of R (shape is a square).

forward(?)

? (90)

? (80)

right(?)

forward(?)

? (90)

? (80)

right(?)

Answers

Answer:

used HP UC visit relationship Nurs.Makrapar.

Which of the following is not an example of acculturation?

Answers

A toddler learning the alphabet

HOPE IT HELP!

maria has a laptop with a motherboard that is beyond repair. she comes to your computer repair shop and requests that you replace the motherboard. what are two of the most likely responses you will give her?

Answers

The two most likely responses you will give Maria are to recommend that she returns the laptop to the manufacturer for repair or replacement if it's still under warranty. Alternatively, you may advise her to buy a new laptop if replacing the motherboard is too expensive.

Maria has a laptop with a motherboard that is beyond repair. She comes to your computer repair shop and requests that you replace the motherboard. In such a scenario, the first thing you should do is to assess the laptop's condition thoroughly to know if replacing the motherboard will be a viable option or not. You will need to check whether the laptop is still under warranty or not, to know if it's worth replacing the motherboard or not. In case the laptop is still under warranty, you may recommend she should return the laptop to the manufacturer for repair or replacement. Or, you may advise her to buy a new laptop if replacing the motherboard is too expensive. If the laptop isn't under warranty, you may recommend that she replaces the motherboard.

To learn more about motherboard, visit:

https://brainly.com/question/29981661

#SPJ11

I’m building a pc name some good parts I need some help on some parts? And prices plz

Answers

Answer:$25

Explanation:

The library is purchasing Argus TL2530P All-In-One Thin clients. What does it mean that the thin clients are 802.3at compliant?

Answers

In this set up, the servers are workstations which perform computations or provide services such as print service, data storage, data computing service, etc. The servers are specialized workstations which have the hardware and software resources particular to the type of service they provide.

1. Server providing data storage will possess database applications.

2. Print server will have applications to provide print capability.

The clients, in this set up, are workstations or other technological devices which rely on the servers and their applications to perform the computations and provide the services and needed by the client.

The client has the user interface needed to access the applications on the server. The client itself does not performs any computations while the server is responsible and equipped to perform all the application-level functions.

Each server handles a smaller number of thin clients since all the processing is done at the server end. Each server handles more thick clients since less processing is done at the server end.

Learn more about server on:

https://brainly.com/question/29888289

#SPJ1

The Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone. What reason does NOT contribute to this situation

Answers

The week security system is the reason which makes Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone.

Why Android operating system targeted more by attackers?

Android is the mobile operating system and mostly targeted by the hackers and attackers. The reasons by which it is often targeted by attackers are listed below.

Android is most famous operating system and most of the people has mobile phone bases on this system.The security level of android is week compare to Apple iOS and Windows Phone makes is easy to crack.The risk of malware and virus is more in android.

The week security system is the reason which makes Android operating system (OS) is targeted by attackers much more often than Apple iOS and Windows Phone.

Learn more about the Android OS here;

https://brainly.com/question/4121093

#SPJ1

Which best explains why it is important to avoid sharing photos online?

Answers

Answer

To keep your privacy away from bad people, to keep your self safe whilst on the internet. Also if you could link the answer choices it would help greatly!

Explanation:

Answer:

C: Strangers will know what you look like

Explanation:

Took the test and got it right

What is the practice of tagging pavement with codes displaying where wi-fi access is available?
a. bad actor
b. actor war
c. chalking war
d. driving

Answers

The practice of tagging pavement with codes displaying where wi-fi access is available is generally known as: c. war chalking.

What is wi-fi?

Wi-Fi can be defined as a wireless network technology that is designed and developed to avail end users and network devices such as computer systems, mobile devices, router and switches, to communicate with one another over the Internet or through an active network connection.

What is Wireless Equivalency Protocol (WEP)?

Wireless Equivalency Protocol (WEP) can be defined as a standard wireless protocol that is designed and developed to provide a significant level of security and privacy on 802.11b wireless local area network (WLAN).

According to the IEEE Wireless Fidelity (Wi-Fi) standard, war chalking simply refers to a practice that typically involves tagging pavement with codes which displays where wi-fi access is available.

Read more on Wireless network here: https://brainly.com/question/13697151

#SPJ1

Other Questions
1. What is the main idea of this passage?a. The Greeks and Romans share a common history.b. the Romans developed their identity by learning from those around them.C. Italy is a harder place to live than Greece.d. Romans learned to overthrow their kings from the ideas of the Greeks. what is the answer for 29 divided b 8 make it passive:does the price include lunch? Select all the expressions that are equivalent to 8.A. 80/100B. -800/100C. 80 (-10)D. -80 (-10) E. 80 - (10) Compare the two maps.The trend toward higher population and population density in urban areas like Chicago is best explained by A) a combination of foreign immigration and domestic migration from rural areas. B) government subsidies that encouraged migration to urban centers. C) better educational opportunities in urban centers, which drew rural families. D) lower rates of taxation in urban areas, which resulted in higher standards of living. Why was freedom of religion added to the First Amendment? The colonists wanted prayer taken out of schools. The colonists suffered unfair treatment for their religious beliefs in the past. The colonists wanted Catholicism to be the countrys main religion. The colonists thought the government should have religious control. Fred drew the pentagon below how should fred fold the pentagon to determine Compare and contrast abraham lincoln and jefferson davis as wartime presidents. what challenges did they face and how did they overcome them? who, in your opinion, was the better leader, and why? Step 5 Since x + 8 is always positive, we can use various rules for operating with logarithms to write the following. Inly] = { In(x2 + 8) + C Inly = + In ec Step 6 Solving for y and writing the equation in its entirety we get , where K = te or k = 0. Submit Skip (you cannot come back) 3.643 x 10^-1 scientific notation Ali Makes a Four digit number . The sum of the digit is 4 . The thousands digit and the unit digit are the same. The hundreds digit is zero.What is Ali's number? why do many people have a fraught relationship with money? Good day can you please assist on the following question belowgive example of each below1. Centralisedpurchasing and supply organisational structure2. Decentralised purchasing and supply organisational structure3. Combined purchasing and supply organisational structure Which graph correctly represents the information from the table?Time (s) Speed (m/s)0 02 4 3 6 4 86 12A. Graph A B. Graph B C. Graph CD. Graph D Which element of risk management forms the core component of the process?a) Communicationb) Risk governancec) Risk identification and measurement Before Muhammad started Islam, what did people worship at the Ka'ba?a. Jesusb. the one God of Abrahamic faithsc. AllahSelected: d. many statues of different gods Develop the three-weck moving average for this time serick. What is the forecast for week 7? Use a =0.2 to compute the exponential mmoothing values for the time series. What is the forecast for week 77 (Round to 2 -decinal places) Use a =0.7 to coerpete the exponential amoothing values for the time seriex. What is the forecast for week 7? (Round to 2 -decimal places) Compute MSE for the three-week moving average, exponential smoothing with 0.2 and with =0.7, Which appears to provide the better forecist based on MSE? Internal Rate of Return Billy Brown, owner of Billy's Ice Cream On the Go is investigating the purchase of a new $45,000 delivery truck that would contain specially designed warming racks. The new truck would have a six-year useful life. It would save $5,400 per year over the present method of delivering pizzas. In addition, it would result in the sale of 1,800 more litres of ice cream each year. The company realizes a contribution margin of $2 per litre. Required: (Ignore income taxes.) 1. What would be the total annual cash inflows associated with the new truck for capital budgeting purposes? 2. Find the internal rate of return promised by the new truck to the nearest whole percent point. 3. In addition to the data above, assume that due to the unique warming racks, the truck will have a $13,000 salvage value at the end of six years. Under these conditions, compute the internal rate of return to the nearest whole percentage point. (Hint: You may find it helpful to use the net present value approach; find the discount rate that will cause the net present value to be closest to zero. What is the best way to draw rectangle in figma? HELPPPPP PLEASEEEE ILL GIVE BRAINLISTE