Write code using the range function to add up to the series 20,30,40, ...90 and print the resulting sum each step along the way

Write Code Using The Range Function To Add Up To The Series 20,30,40, ...90 And Print The Resulting Sum

Answers

Answer 1

Answer:

Code:

range_sum = 0

for x in range(20, 100, 10):

range_sum += x

print(range_sum)

Explanation:

Declare variable (we'll use it to keep track of the sum):

range_sum = 0

Start a loop with the range function (x is the current number, 20, 100 are the numbers to start and stop by and 10 is the number to increase by):

for x in range(20, 100, 10):

Add the current number to the sum and print it:

range_sum += x

print(range_sum)


Related Questions

hello
What is the full form of computer?​

Answers

Answer:

Hey:)

Explanation:

C= common

O=operating

M= machine

P=particularly

U= use

T=Trade

E= Education

R= Research

#한시 hope it helps

Explanation:

The full form of Computer is "Common Operating Machine Purposely Used for Technological and Educational Research".

helps .!

hello !

A/an ________is a device used to protect computers against surges and spikes in power.
Sleep and Hibernate are examples of __________.
Regular maintenance on a computer is good for ________.
Bad sectors are sections of the _______ that are physically damaged.
To protect some devices such as flash drives and external hard drives from corruption, it is best to __________ the devices.

Surge Protector
Power-saving modes
Hardware And Software
Hard Disk
Eject

Answers

Answer:

1. Surge protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A surge protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both hardware and software.

4. Bad sectors are sections of the hard disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to eject the devices.

Answer:

1. Surge Protector.

2. Power-saving mode.

3. Hardware and software.

4. Hard disk.

5. Eject.

Explanation:

1. A Surge Protector is a device used to protect computers against surges and spikes in power.

2. Sleep and Hibernate are examples of Power-saving modes.

3. Regular maintenance on a computer is good for both Hardware and Software.

4. Bad sectors are sections of the Hard Disk that are physically damaged.

5. To protect some devices such as flash drives and external hard drives from corruption, it is best to Eject the devices.

I hope this helps <3

interface iplayer { int play(); //returns the player's move, which is always 0, 1, or 2 int getpreviousmove(int movesago); // returns a previous move

Answers

The "iplayer" interface provides two methods: "play()" to return the player's move (0, 1, or 2), and "getpreviousmove(int movesago)" to retrieve a previous move.

The "iplayer" interface is designed to facilitate gameplay by providing methods for obtaining the player's move and retrieving previous moves. The "play()" method is responsible for returning the player's current move, which can be 0, 1, or 2. This method is crucial for enabling the game logic to progress and determine the outcome based on the player's selection.

The second method, "getpreviousmove(int movesago)," allows the game to access the player's past moves. By providing an integer argument "movesago," the method retrieves a specific previous move made by the player. This functionality can be valuable in scenarios where the game algorithm needs to reference previous player moves to make strategic decisions or implement specific gameplay mechanics.

Together, these two methods of the "iplayer" interface work in tandem to support gameplay by providing the current move and enabling access to the player's past moves. This interface can be implemented in various game scenarios that require player interaction and rely on maintaining and analyzing move history to enhance the gaming experience.

learn more about  interface  here:

https://brainly.com/question/14154472

#SPJ11

Create a program that draws a rectangle whenever you click the mouse. The rectangle should have a width of 30 and a height of 50 and be centered at the place where the user clicks. Remember, the position of a rectangle is the top left corner. To place the rectangle at the center of the click, you will need to adjust the position.

Answers

Answer:

RECT_HEIGHT = 50

RECT_WIDTH = 30

rect = Rectangle(50,30)

       

# random.choice returns a random value from the COLORS

# function will draw a rectangle at x, y

def draw_rect(x, y):

   rectangle = Rect(50, 30)

   rect.set_position(x, y)

   rect.set_color(Color.green)

   add(rect)

# Link to the mouse click event

   add_mouse_click_handler(draw_rect)

Explanation: Hope this works for you.

Things to be considered while purchasing a new computer

Plzzz help emergency​

Answers

Answer:

Explanation:

If you are getting a new computer there are many things to consider, for a gaming computer you should look for a good prosseser priferably a core i9. you should also look for a good graphics card. Lastly you should have good ram and space, a good ram amount is 16 gigs, for space you should at LEAST have 50 gigs for games.

About C header files of C programming

Answers

Answer:

A header file is a file with an extension. Which contains C function declarations and macro definitions to be shared between several source files. There are two types of header files: the files that the programmer writes and the files that come with your compiler.

one definition of a data dictionary is a centralized repository of information about data such as meaning, relationships to other data, origin, usage, and format.

Answers

In a database, information system, or as a component of a research project, data elements are used or recorded. A data dictionary is a collection of names, definitions, and attributes about those data elements.

What is Data Dictionary?

The catalog makes its contents available to users and DBAs, but it is primarily used by the DBMS's various software modules, including the DDL and DML compilers, the query optimizer, the transaction processor, the report generators, and the constraint enforcer.

A data dictionary, on the other hand, is a type of data structure used to store metadata, or (structured) data about information. The software package for a standalone data dictionary or data repository may interact with the software modules of the DBMS, but its primary users for information resource management are computer system designers, users, and administrators. These systems preserve data on the configuration of system hardware and software, documentation, applications, users, and other data pertinent to system administration.

To know more about Data Dictionary, check out: https://brainly.com/question/28480566

#SPJ4

in 2014, what percentage of the world population has access to the internet?

Answers

Answer:

At that time 43.9% of people have access to the global internet.

A 1600 kilogram truck is moving at a speed of 12 m/s. How much kinetic energy does the car have?

Answers

Answer:

which one?

Explanation:

Translate these two functions into MIPS Language

int moveRobots(int *arg0, int *arg1, int arg2, int arg3)

{

int i, *ptrX, *ptrY, alive = 1;

ptrX = arg0;

ptrY = arg1;

for (i=0;i<4;i++) {

*ptrX = getNew(*ptrX,arg2); // update x-coordinate of robot i

*ptrY = getNew(*ptrY,arg3); // update y-coordinate of robot i

// check if robot caught user

if ((*ptrX == arg2) && (*ptrY == arg3)) {

alive = 0;

break;

}

ptrX++;

ptrY++;

}

return alive;

}

Answers

The given code is a function in C language that accepts four integer pointers: two integer pointers, two integers, and returns an integer. The function loops through four robot coordinates (x and y) updating them and checks if they have caught the user.

If a robot caught the user, the function returns 0. If no robot caught the user, the function returns 1.The MIPS assembly language code will achieve this same function. Here is the MIPS code:moveRobots:
  addi $sp, $sp, -12       # Allocate space for 3 variables on stack
  sw   $ra, 8($sp)           # Save the return address on the stack
  sw   $s1, 4($sp)            # Save the value of s1 register on the stack
  sw   $s2, 0($sp)            # Save the value of s2 register on the stack
  add  $s1, $a0, $zero     # Assign pointer arg0 to $s1 register
  add  $s2, $a1, $zero     # Assign pointer arg1 to $s2 register
  addi $t0, $zero, 0         # Initialize alive to 1


  lw   $t0, ($s0)             # Load the value of alive to $t0 register
  lw   $ra, 8($sp)           # Load the return address from the stack to $ra
  lw   $s1, 4($sp)            # Load the value of s1 register from stack to $s1
  lw   $s2, 0($sp)            # Load the value of s2 register from stack to $s2
  addi $sp, $sp, 12             # Deallocate the memory on stack
  jr     $ra                            # Return from function.

To know more about language visit:

https://brainly.com/question/32089705

#SPJ11

Describe how the readings taken by the sensor are displayed on a graph using the computer. - Detailed answers please or key points.

Answers

When readings are taken by a sensor and displayed on a graph using a computer, the process typically involves several steps. See the steps below.

What is the rationale for the above response?

First, the sensor sends its data to the computer, where it is received and stored in memory.

Next, a software application is used to visualize the data in graph form. The software typically provides tools to adjust the appearance of the graph, such as scaling the axes, adding labels, and selecting different graph styles.

The software also allows the user to interact with the data, such as zooming in and out, scrolling through the time series, and selecting specific data points for analysis.

Note, the graph provides a visual representation of the data collected by the sensor, which can help researchers and other users to better understand the patterns and trends in the data.

Learn more about Sensors at:

https://brainly.com/question/15396411

#SPJ1

what steps should you take if your harassed online​

what steps should you take if your harassed online

Answers

tell an adult and report the person harassing you
block them and if ur comfortable, tell ur parents

Which CAPEC-recognized domain of attack focuses on the manipulation of computer hardware and software within their respective lifecycles?
A. Software
B. Supply Chain
C. Physical Security
D. Communications

Answers

The CAPEC-recognized domain of attack that focuses on the manipulation of computer hardware and software within their respective lifecycles is the Supply Chain domain. This domain is focused on the vulnerabilities that exist within the supply chain of hardware and software components that are used in the development and deployment of computer systems.

The supply chain is a complex network of manufacturers, distributors, resellers, and integrators that are involved in the production and delivery of these components. The Supply Chain domain of attack is particularly dangerous because it involves the manipulation of hardware and software components that are trusted by the end-user. This means that attackers can use these vulnerabilities to gain unauthorized access to critical systems, steal sensitive information, or execute malicious code.

To mitigate the risks associated with supply chain attacks, organizations need to implement a comprehensive set of security measures that includes:

1. Identifying and assessing the risks associated with the supply chain.
2. Establishing a secure supply chain management process.
3. Ensuring that all hardware and software components are authenticated and verified before use.
4. Implementing strict access control policies for supply chain partners.
5. Regularly monitoring and auditing the supply chain to detect any suspicious activity.

Overall, the Supply Chain domain of attack is a critical area that requires careful attention and management to ensure the security and integrity of computer systems. Organizations need to be proactive in their approach to securing their supply chains to avoid falling victim to attacks that can have severe consequences for their operations and reputation.

Learn more about supply chain here:

https://brainly.com/question/29318233

#SPJ11

How many hands do you use to type on the numeric keypad?.

Answers

When typing on the numeric keypad, you typically use one hand.

The numeric keypad, also known as the Numpad, is a section of the keyboard that consists of a set of keys arranged in a grid-like layout. It is primarily used for entering numbers and performing mathematical calculations. When using the numeric keypad, you typically rest one hand on the keypad area and use the fingers of that hand to press the numeric keys and other function keys located in that section. The other hand is usually used for typing on the main keyboard area, including letters, symbols, and other non-numeric characters.

You can learn more about numeric keypad at

https://brainly.com/question/2596238

#SPJ11

infrastructure refers to a country's a. transportation, communication, and utility systems. b. educational system. c. system of local government. d. legal system.

Answers

a. transportation, communication, and utility systems. The infrastructure of a country directly affects its economic and social development.

What is mean infrastructure of a country ?Infrastructure is referred to as the fundamental physical framework of an organisation, region, or country. It frequently pertains to the creation of public goods or industrial activities. Transportation, communication, sewage, water, and educational infrastructure are a few examples.Infrastructure projects are typically expensive and capital-intensive, yet they are essential to the growth and success of an area's economy. Public, private, or public-private partnerships may all be used to finance projects including infrastructure upgrades.As a part of their efforts to expand their businesses, private firms will occasionally decide to invest in a nation's infrastructure development. An energy firm might construct pipelines and railroads in a nation where it wishes to refine oil, for instance, and this investment would be advantageous to both the corporation and the nation.

To learn more about infrastructure refer :

https://brainly.com/question/9739468

#SPJ4

a. systems for utilities, communication, and transportation. A nation's infrastructure has a direct impact on the growth of its economy and society.

What does a country's infrastructure actually mean?

A area, a country, or an organization's basic physical foundation is referred to as its infrastructure. It frequently has to do with industrial activity or the production of public goods. Infrastructure for sewage, water, communications, and education are a few examples.

Although they are frequently expensive and capital-intensive, infrastructure projects are crucial to the expansion and prosperity of a region's economy. Infrastructure improvement projects can be financed in a variety of ways, including by public, private, or public-private partnerships.Private companies may choose to invest in a country's infrastructure development as a part of their attempts to grow their enterprises.

An energy firm might construct pipelines and railroads in a nation where it wishes to refine oil, for instance, and this investment would be advantageous to both the corporation and the nation.

To learn more about infrastructure refer :

brainly.com/question/9739468

#SPJ4

consider the following method changearray. an array is created that contains {2, 8, 10, 9, 6} and is passed to changearray. what are the contents of the array after the changearray method executes?

Answers

An array is a collection of similar data types. For example, if you want to store the names of 100 people, you can create an array of type string that can store 100 names. string[] array = new string[100]; where the above array cannot store more than 100 names.

What are arrays used for?

In coding and programming, an array is a collection of items or data stored in a contiguous storage location, also known as a database system. The purpose of arrays is to store multiple pieces of data of the same type together.

How can I create an array?

An array is a set of values. Values ​​in the array are called elements. You can create an array of int , double , or any other type, but all values ​​in the array must be of the same type. To create an array, you must declare a variable of type array and then create the array itself.

To know more about arrays visit;

https://brainly.com/question/19570024

#SPJ4

What is the final value of x (after this code has executed)?

int x = 0;

for (x = 0; x < 200; x++)

{

System.out.println(x);

}

Answers

Answer:

199

Explanation:

i starts at 0. One more than 0 is one. Until you get 199.  

The computer is counting as seen below:

0

1

2

....

199

In python, a comma-separated sequence of data items that are enclosed in a set of brackets is called.

Answers

A collection of data elements that are separated by commas and enclosed in a set of brackets is referred to as a LIST in Python.

A running total is a sum of numbers that grows with each iteration of the loop. The running total is maintained via a variable known as an accumulator. A list is an element-changing ordered sequence in the Python programming language. The components or values that make up a list are referred to as its items. Similar to how characters between quote marks constitute strings, values for lists must be enclosed in square brackets. Repetition structures, also known as loops, are used when a program needs to process one or more instructions repeatedly up until a condition is met, at which point the loop ends.

Learn more about python here-

https://brainly.com/question/18502436

#SPJ4

PLEASE HELP MEEEEEEE :(
I have a piece of code that keeps track of the leaderboard of a game then it will sort the scores in order and print them onto the screen along with the names.
Unfortunately I don't want the whole file printing, just the top 5.
what shall id do.?

I have attatched the code.
Thanks.​

PLEASE HELP MEEEEEEE :(I have a piece of code that keeps track of the leaderboard of a game then it will

Answers

Answer:

Ctrl A and then Ctrl C

Explanation:

First click Ctrl A then click on the parts that you need to copy then click Ctrl C

Answer: If you want to use a for loop then you should make it so that it does variable I and then it takes the array and you do Topscorers[I] and then it will do the first 5

Explanation:

List three ideas for checking in with your progress and recognizing completion on your actions.

Answers

One idea for checking in with your progress and recognizing completion on your action is to set specific milestones or targets along the way and regularly evaluate your progress towards them.

How can you effectively track your progress and acknowledge completion of your action?

To effectively track your progress and acknowledge completion of your action, it is important to establish clear milestones or targets that can serve as checkpoints. Break down your overall goal into smaller, measurable objectives that can be achieved incrementally.

Regularly assess your progress by comparing your actual achievements against these milestones. This will provide you with a tangible way to track your advancement and ensure that you stay on track. Once you reach a milestone or successfully complete a specific objective, take the time to acknowledge and celebrate your achievement.

Read more about action check

brainly.com/question/30698367

#SPJ1

When Tomohiro Nishikado invented Space Invaders® in 1978, the microcomputers available in Japan could not handle its initial complexity which led Nishikado to import a CPU from the United States that was integrated into a microprocessor. This is a classic example of what?

A. innovating to overcome a technical challenge


B. the need to import items for any technology to really work


C. how the U.S. is better with technology than Japan


D. quitting when technical challenges arise

Answers

b the need to import items for any technology to really work

Answer:

The answer is A. Innovating to overcome a technical challenge!

hope this helps! <3

30 POINTS
Which of the following adjusts the thickness or type of line that borders a shape or image?

a
Fill

b
Opacity

c
Stroke

d
Texture

Answers

c) Stroke adjusts the thickness or type of line that borders a shape or image.

In computer graphics and design software, the stroke refers to the line that outlines the shape or image.

It determines the thickness, color, and style of the border surrounding the shape or image.

By adjusting the stroke properties, you can modify the thickness or type of line that borders a shape or image.

For example, you can increase or decrease the thickness of the stroke to make the border appear thicker or thinner.

You can also change the color of the stroke to match your design preferences.

Additionally, you can apply different styles such as dashed, dotted, or solid lines to the stroke, altering the visual appearance of the border.

Adjusting the stroke properties provides flexibility and control in creating and customizing the borders of shapes and images, allowing you to achieve the desired visual effect in your designs.

For more questions on image

https://brainly.com/question/12629638

#SPJ8

Is brainly good or bad? I think it is bad

Answers

wait why do you think it’s bad?

Answer:

Both

Explanation:

Brainly is both good and bad

It is good because it helps people with assignment they have no idea about

It is also bad because people cheat from this site

How to limit the number of guesses in python

Answers

I thinkkkkk this is kind of what you are looking for?

while user != the_number:

   ...

   if count == 5:

       print("etc etc")

       break

else:

   print("You guessed it!!, the number is", the_number, "and it only"\

         " took you", count , "tries")

Basically if you have 5 guesses it'll break it and stop the guesses

5 The following text is stored as a text file:
She sells sea shells on the seashore. The shells that she sells are sea shells I am sure. Explain how lossless compression would compress this file.

Answers

Lossless compression decreases file size without removing any bits of information. Instead, this format works by removing sameness within data to reduce the overall file size. With lossless, it is possible to perfectly rebuild the original file.

What utilizes lossless compression?

Lossless compression is commonly used for so-called "discrete" data, such as database records, spreadsheets, word-processing files, and even some types of image and video information. Text compression is a powerful area for lossless compression.

What is lossless compression example?

Lossless compression methods are reversible. Examples of lossless reduction include GZIP, Brotli, WebP, and PNG, Lossy compression, on the other hand, uses inexact approximations by dumping some data from the original file, making it an irreversible compression process

To learn more about Lossless compression, refer

https://brainly.com/question/17266589

#SPJ9

Someone calls you and gives you a phone number. You don't have any paper or pencil to write the number down so you repeat the number until you are able to write it down. This is an example of

Answers

Someone calls you and gives you a phone number. You don't have any paper or pencil to write the number down so you repeat the number until you are able to write it down. This is an example of rehearsal.

What is practice session learning?

A practice session approach makes use of repeated exercise of statistics to analyze it. When a pupil is supplied with unique statistics to be learned, together with a list, regularly he's going to try to memorize the statistics via way of means of repeating it over and over.

The definition of a practice session is an exercise consultation or exercise overall performance completed previous to a actual occasion or earlier than viewing via way of means of an audience. When actors who're set on a play get collectively each day to move over their strains and plan out how the play could be performed, those exercise periods are an instance of a practice session.

Read more bout the practice:

https://brainly.com/question/12555695

#SPJ1

Which federal legislation prohibits credit card companies from raising rates on existing balances?

A. The Credit Card Accountability Responsibility and Disclosure Act

B. The Fair Credit Reporting Act

C. The Fair Debt Collection Practices Act

D.The Truth in Lending Act

Answers

Answer:

A. The Credit Car Accountability Responsibility and Disclosure Act

Explanation:

I hope this helps you. :)

Federal legislation prohibits credit card companies from raising rates on existing balances is The Credit Card Accountability Responsibility and Disclosure Act. Thus the correct answer is A.

What is the objective of the credit card act?

The CARD Act of 2009 aims to stop credit card issuers from engaging in unfair and unethical activities. According to the CARD Act, all credit card issuers must use language that is clear and accessible.

The Credit Card Accountability Responsibility and Disclosure Act prohibits credit card companies from raising rates on existing balances.

Therefore, option A is appropriate.

Learn more about the Credit card Act, here:

https://brainly.com/question/11658297

#SPJ2

The Internet has made it more difficult for social movements to share their views with the world.

a. True

b. False

Answers

The Internet has made it more difficult for social movements to share their views with the world is false statement.

What is Social movements?

The implementation of or opposition to a change in the social order or values is typically the focus of a loosely organized but tenacious social movement. Social movements, despite their differences in size, are all fundamentally collaborative.

The main types of social movements include reform movements, revolutionary movements, reactionary movements, self-help groups, and religious movements.

Examples include the LGBT rights movement, second-wave feminism, the American civil rights movement, environmental activism, conservation efforts, opposition to mass surveillance, etc.

Therefore, The Internet has made it more difficult for social movements to share their views with the world is false statement.

To learn more about Social movements, refer to the link:

https://brainly.com/question/12881575

#SPJ1

When you insert a USB drive into a computer and get the following error: "USB drive is
not accessible". What system perform the task to generate the error message.​

Answers

Answer:

Uh, the CPU?

Explanation:

what do you mean, when you put the drive in the port it automatically tries to read it because physics, but if it can't you get an error message.

Usually you do this by writing functions with parameters and return values. Why do you think it's important to use parameters and return values when writing code for other people to use

Answers

When writing code for other people to use, it is important to use parameters and return values in functions.




Parameters and return values make the code easier to understand and use.Parameters in functions allow the user to provide inputs that can be used by the function. This means that the function can be used with different values without having to rewrite the code. Parameters also make the code more flexible, allowing users to customize the function to their specific needs.
They provide a way to pass information from one part of the program to another.Return values allow the function to return a result back to the user. This result can be used by the user in other parts of their program. Without return values, the function would simply perform a task and not provide any useful information to the user. Return values also make the code more reusable, as the same function can be used in different parts of the program to achieve different results.In conclusion, using parameters and return values in functions is important when writing code for other people to use.
They make the code more flexible, reusable, and easier to understand and use. It allows for the user to customize the function according to their needs, and it also helps provide a useful result back to the user.


To learn more about parameters:
https://brainly.com/question/29911057


#SPJ11

Other Questions
1,20030%25%3% lempiras British citizens were willing to come start over in the New World for many reasons; which is NOT a reason?(Single choice)A. Opportunity.B. Learn from the Native Americans.C. Religious freedom.D. possibility to own land. a defense in which a person admits responsibility, but argues that under the circumstances, what he or she did was right, is a(n): . The theme of The Luckiest Time of All by Lucille Clifton is _____.stateddirectliteraryimplied How does multi-beam interference increases sharpness of bright fringes? (The region Is Central America) Select an environmental issue faced by the countries of this region. Write a 150-word essay describing the problems presented by each issue and possible solutions to these problems. (PLEASE WRITE 150 WORDS!!! NO MORE NO LESS!!) (I WILL GIVE BRAINLIEST TO THE CORRECT ANSWER) (ALSO TRY NOT TO USE BIG WORDS A LOT!!) Find the inverse of the relation (-3,4), (-1,0), (6,0). 1. what do you think was the greatest Greek influence on Rome?2. Where might we also see this influence in our country today? ppppppppppppplease helppppppppp Farm-supply inc., which is headquartered in the united states, has its production plant located in a developing country where working conditions are poor. for example, employees work 12-hour shifts, are exposed to toxic chemicals, and are paid extremely low wages. the practices farm-supply inc. is demonstrating could be labeled as? ---------- products are difficult to market because they fail to deliver either immediate satisfaction or long-term benefit. such morally-challenged products would rarely succeed. f(x)=10(5)^x what is f(1) the citrate cycle is a metabolic engine generating [ select ] from the fuel [ select ]. It is considered a cycle since all components must be maintained beginning with the addition of the two carbons from acetyl-CoA to form [ select ] from [ select ]. The citrate cycle depends on the presence of oxygen since [ select ]. A Circle fits inside a semicircle of radium 28mm A company has a 13% WACC and is considering two mutually exclusive investments (that cannot be repeated) with the following cash flows: The data has been collected in the Microsoft Excel Online file below. Open the spreadsheet and perform the required analysis to answer the questions below. Open spreadsheet a. What is each project's NPV? Round your answer to the nearest cent. Do not round your intermediate calculations. Project A: $ Project B: St b. What is each project's 1RR? Round your answer to two decimal places. Project A: Project B: c. What is each project's MiRR? (Hint: Consider Period 7 as the end of Project b's life.) Round your answer to two decimal places. Do not round your intermediate calculations. Project A: If the WACC was 18%, which project would be selected? e. Construct NPV profies for Projects A and B. Round your answers to the nearest cent. Do not round your intermediate calculations. Negative value should be indicated by a minus sign. 1. Calculate the crossover rate where the two projects' NPvs are equal. Round your answer to two decimal places. Do not round your intermediate calculations. 9. What is each project's MiRR at a WACC of 18% ? Round your answer to two decimal places. Do not round your intermediate calculations. Project A: Project B: a broadway musical choreographed in 1943 about the mid-west and used balletic form. it changed the history of dance on the broadway stage. what was the musical? Emilio borrows 1200$ from a bank with 8% simple interest per year how much will he have to pay back total in 2 years If it is 14 degrees outside and the tempature will drop 22 degrees in the next ten hours how cold will it get Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to the programs from her device so they do not take up storage space. Multiple Choice - uninstall - configure - Install- modify Oxidation state of H in BaH2