Summary: I am designing a JavaFX program that tests a matrix if it is a magic square or not. I have two buttons (submit and reset) with 2 handlers for each one. When the user entered the values and submitted them for the first time the program worked fine. However, in the second attempt, the program's results are always (" it is not a magic square"). Here is the code
package com.example.team9project;
import javafx.animation.KeyFrame;
import javafx.animation.Timeline;
import javafx.application.Application;
import javafx.event.ActionEvent;
import javafx.event.EventHandler;
import javafx.fxml.FXMLLoader;
import javafx.geometry.Insets;
import javafx.geometry.Pos;
import javafx.scene.Scene;
import javafx.scene.control.Button;
import javafx.scene.control.ComboBox;
import javafx.scene.control.TextField;
import javafx.scene.layout.GridPane;
import javafx.scene.layout.HBox;
import javafx.stage.Stage;
import javafx.util.Duration;
import java.io.IOException;

Answers

Answer 1

The JavaFX program is designed to test if a matrix is a magic square or not. It has two buttons, "submit" and "reset," each with their respective handlers.

The provided code snippet showcases the initial setup of the JavaFX program. It imports the required classes, including the necessary FXML-related components. The program's main functionality revolves around testing whether a given matrix is a magic square.

The program utilizes a GridPane layout to arrange the buttons, text fields, and other elements. It also includes an HBox layout to hold the buttons horizontally. The "submit" button is associated with an action event handler that performs the magic square test logic. However, the code for this logic is not provided, making it challenging to identify the exact cause of the issue faced in subsequent attempts.

To resolve the problem, it would be necessary to review the missing logic within the action event handler for the "submit" button. It is likely that the handler needs to correctly analyze the matrix's values and determine if it qualifies as a magic square. The issue may lie in how the matrix values are retrieved from the text fields or how the calculations for the magic square test are performed. Additionally, it may be necessary to reset any relevant variables or data structures between subsequent attempts to ensure accurate testing.

By examining and updating the logic within the "submit" button's action event handler, you can address the issue and ensure consistent and accurate results when testing for magic squares in subsequent attempts.

To learn more about program  Click Here: brainly.com/question/30613605

#SPJ11


Related Questions

What is output if the user types in 8

Answers

Answer: 8

And if you hold shift while typing it, it gives *

Which of the following tracking methods provides real-time information
A. RFID
B. laser etched bar codes
C. Standard barcode
D. Dot matrix applications

Answers

A. RFID (Radio Frequency Identification) is the tracking method that provides real-time information.

RFID technology enables the identification and tracking of items in real-time by wirelessly transmitting data. The RFID system consists of RFID tags that contain unique identifiers and RFID readers that capture and process the tag information.

When an RFID tag comes within range of an RFID reader, the reader detects the tag and retrieves its data, such as product details, location, or status. This data is then immediately available for monitoring and analysis, providing real-time information about the tracked items.

Compared to other tracking methods mentioned, such as laser-etched barcodes, standard barcodes, or dot matrix applications, RFID offers the advantage of automatic and contactless data capture.

It eliminates the need for line-of-sight scanning or manual input, allowing for faster and more accurate tracking. The real-time nature of RFID enables businesses to have up-to-date visibility and control over their inventory, assets, or processes, enhancing efficiency and decision-making capabilities.

learn more about RFID here:

https://brainly.com/question/29571342

#SPJ11

please help with this question​

please help with this question

Answers

Answer:

whats the problem/question?

Explanation:

Kirstie needs a computer for word processing, emailing, downloading high definition TV
series from an online store and basic photo editing.
Which computer would you recommend for Kirstie? Give reasons for your answer.

Answers

NmmkkjdijdjrjrjdjirjrkdidiL028

What is the output?
x = 6 % 2

if x == 1:
print("ONE")

else:
print("TWO")

Answers

Answer:

The output would be "TWO".

Find the area of triangle by algorithm​

Answers

Area of triangle

b=Base ,h=height.

Formula=1/2×b×h.

Algorithm:

-Step 1:-Start.

Step 2:-Declare at,b,has float.

Step 3:-Initialize value of b and h.

Step 4:-Calculate at 1/2×b×h.

Step 5:-print area of triangle .

Step 6:-End.

Which line of code will only allow a non-decimal point to be stored in a variable? candyCost = float(input("How much is the candy?")) candyCost = input("How much is the candy?") candyCost = int(input("How much is the candy?")) candyCost = str(input("How much is the candy?"))

Answers

Answer:

candyCost = int(input("How much is the candy?"))

Explanation:

You are considering two different facial cosmetic surgeries

Answers

The two different facial cosmetic surgeries being considered are not specified in the question, so I am unable to provide a specific answer.

However, when considering any cosmetic surgery, it is important to thoroughly research and consult with a qualified medical professional. Factors to consider may include the desired outcomes, potential risks and complications, recovery time, cost, and personal preferences. It is advisable to gather as much information as possible, seek multiple opinions, and make an informed decision based on individual needs and goals.

Learn more about specific  here;

https://brainly.com/question/27900839

#SPJ11

Single-Select Questions with Reading Passage #1 Grocery Grabbr The following passage will be used to answer questions #1 - #5 Markus is finding that it takes too long to track down all of the groceries he needs to buy from a given store. Grocery Grabbr to the rescue! The app allows Markus to input his shopping list and search for his local grocery store in Grocery Grabbr's database. If his grocery store is there, Markus is all set to go! The database stores grocery items, cost, and item location information for each grocery store. When Markus walks into the store, a notification pops up on his smartphone letting him know that Grocery Grabbr is ready to get to work. Each of Markus' grocery items is displayed one at a time, along with the aisle number and shelf location. After Markus grabs his items off the shelf, he hits a button on the app to navigate to the next item. The list of items is arranged so that Markus follows the most efficient path through the grocery store. When Markus finishes shopping, the total amount of money his groceries cost is displayed, which allows him to double check the total cost with the cashier. Grocery Grabbr pays grocery stores a small amount of money for each user who successfully uses the app and checks out of the store with over one hundred dollars worth of groceries.
Question: Which of the following data must be obtained from the user's smartphone in order for Grocery Grabbr to suggest the order for picking up groceries?
A. the grocery list the user input
B. the location of the grocery store
C. the user's photo album on their smartphone
D. the user's current location

Answers

Answer:

A. the grocery list the user input

D. the user's current location

Explanation:

In the passage provided the only actual user inputs that is needed is the grocery list and then the user must choose from a list of available grocery stores. They do not need to enter the location of the grocery store. Therefore, the only actual pieces of data that the app would need are the grocery list that the user inputs and the user's current location in order to provide the list of available nearby grocery stores for picking up the groceries. This is done through the GPS on the smartphone.

What is a mini computer and what are it’s typical applications?

Answers

Answer:

it is a computer of medium power more than a microcomputer but less than a.minuframe

A minicomputer is a type of computer that possesses most of the features and capabilities of a large computer but is smaller in physical size. They were developed keeping into consideration human interaction, control instrumentation and were cost-effective. For example Smartphones, iPads, etc.

Minicomputers may contain one or more processors, support multiprocessing and tasking, and are generally resilient to high workloads. Minicomputers were used for scientific and engineering computations, business transaction processing, file handling, and database management.

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. For which of the following strings is it NOT possible to use byte pair encoding to shorten the string’s length?

Answers

The correct answer is C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

What is the encoding  about?

Byte pair encoding is a data encoding technique that can be used to compress data, including text and images. The algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string

Therefore, Unlike lossy compression techniques, such as JPEG, which discard some of the original data, byte pair encoding retains all of the information in the original string. This means that an encoded string can be restored to its original version without any loss of information.

Read more about encoding here:

https://brainly.com/question/23941646

#SPJ1

See full question below

Byte pair encoding is a data encoding technique. The encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. The algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters.

For example, the string "THIS_IS_THE_BEST_WISH" can be encoded as "%#_#_%E_BEST_W#H" by replacing all instances of "TH" with "%" and replacing all instances of "IS" with "#".

Which of the following statements about byte pair encoding is true?

A. Byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string.

B. Byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character.

C. Byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version.

D. Byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

The platform in E-Learning refers to:

A.
the type of computer system that the course can be taken on.

B.
the internet service provider used to access the course and materials.

C.
the set of tools and services students involved in the course can use.

D.
the levels of difficulty the students studying the course experience.

Answers

A.

The type of computer system that the course can be taken on.

Which of the following are addressed by programing design? Choose all that apply.

Who will work on the programming
The problem being addressed
The goals of the project
The programming language that will be used

Answers

Answer:

Its B, D, and E

Explanation:

Hope this helps

Answer:

3/7

B

D

E

4/7

Just a page

5/7

B

C

6/7

Page

7/7

A

B

D

Using style guidelines help a writer determine which topics to cover. arguments to cover. sources to cite. margin settings to apply.

Answers

Answer:

sources to cite.

Explanation:

A citation style guidelines is used by the writer to cite the sources of other writers in his/her work. These style guidelines are used in academic writings to acknowledge the rightful person of any thought or an idea, to avoid plagiarism.

Plagiarism, in simple terms, can be defined as an academic theft. It is an act in which a person uses other's thoughts and ideas to convey it as their own thoughts and idea. To avoid such academic crimes, various citation style guidelines are formes. Such as MLA, APA, etc.

So, the correct answer is 'sources to cite.'

Answer:

C

Explanation:

In cell J6, using a lookup function, enter a formula to determine the projected room classification based on the projected quarterly revenue after renovations in Cell I6, use the named range RoomClassification when entering this formula.

Answers

Assuming that cell I6 holds the anticipated quarterly revenue following renovations and that the designated range Room Classification comprises a table with two columns. =VLOOKUP(I6,RoomClassification,2,TRUE).

When performing a VLOOKUP, What does col index num mean?

The related column number in the list is Col index num (Column index number). The column number in the table has nothing to do with where it is located in Excel.

What does the VLOOKUP function's Lookup value represent?

Lookup value: Decide which cell will get the search values. Table array: The table range, which consists of every table cell. Col index num: The data being searched for.

To know more about columns visit:-

https://brainly.com/question/13602816

#SPJ1

Which of these is NOT a way that technology can solve problems?
Group of answer choices

sorting quickly through data

storing data so that it is easily accessible

making value judgments

automating repetitive tasks

Answers

Answer:

making value judgements

Explanation:

honestly this is just a guess if there is any others pick that but this is just what I'm thinking

consider my_string = 'roy came third in the running race'. which option will return 'roy came 3rd in the running race' as the value of new_string?

Answers

The value of new_string can be obtained by using the replace() method in Python with the original string my_string and replacing the word "third" with "3rd".

In order to obtain the desired value of new_string as "roy came 3rd in the running race", you can use the replace() method in Python. The replace() method allows you to replace occurrences of a specified substring with another substring within a given string.

In this case, you can replace the word "third" in my_string with "3rd" by using the replace() method as follows:

python

Copy code

my_string = 'roy came third in the running race'

new_string = my_string.replace('third', '3rd')

The replace() method searches for the specified substring, which in this case is "third", within the my_string and replaces it with the specified replacement substring, which is "3rd". By assigning the result to new_string, you will obtain the desired output of "roy came 3rd in the running race".

learn more about my_string here:

https://brainly.com/question/31383905

#SPJ11

The HTML tag for the smallest heading is​ what

Answers

Answer:

The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.

Explanation:

PLS HELP!!
In two to three paragraphs, come up with a way that you could incorporate the most technologically advanced gaming into your online education.
Make sure that your paper details clearly the type of game, how it will work, and how the student will progress through the action. Also include how the school or teacher will devise a grading system and the learning objectives of the game. Submit two to three paragraphs.

Answers

Incorporating cutting-edge gaming technology into web-based learning can foster an interactive and stimulating educational encounter. A clever method of attaining this goal is to incorporate immersive virtual reality (VR) games that are in sync with the topic being taught

What is the gaming about?

Tech gaming can enhance online learning by engaging learners interactively. One way to do this is by using immersive VR games that relate to the subject being taught. In a history class, students can time-travel virtually to navigate events and interact with figures.

In this VR game, students complete quests using historical knowledge and critical thinking skills. They may solve historical artifact puzzles or make impactful decisions. Tasks reinforce learning objectives: cause/effect, primary sources, historical context.

Learn more about gaming from

https://brainly.com/question/28031867

#SPJ1

What is R0 used for?

Answers

R0, also known as the basic reproduction number, is used to measure the contagiousness or transmissibility of an infectious disease.

It is the average number of people that one infected person will transmit the disease to in a population that is completely susceptible to the disease. R0 is used by epidemiologists to predict the spread of an infectious disease and to determine what measures need to be taken to control or eliminate the disease. For example, if R0 is greater than 1, the disease will spread in a population, but if R0 is less than 1, the disease will eventually die out. Therefore, R0 is an important factor in public health decision-making and disease control.

Learn more about the RO Function: https://brainly.com/question/19044037

#SPJ11

In Scratch, you have to choose backdrops from a limited number in the Scratch image library.
Group of answer choices

True

False

Answers

I would say it would be True

Answer:

True

Explanation: im Awsome

When talking about the physical elements of the Internet, the term redundancy refers to:
A) transmitting multiple copies of a single packet to safeguard against data loss.
B) the use of tiered high-speed switching computers to connect the backbone to regional and local networks.
C) delays in messages caused by the uneven flow of information through the network.
D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Answers

D) multiple duplicate devices and paths in a network built so that data can be rerouted if a breakdown occurs.

Which one of the above is the Internet's primary communication protocol?

Definition:The primary communication protocol for the World Wide Web is TCP/IP (Control Protocol Protocol), often known as the Internet Protocol. TCP/IP permits simultaneous communication between all Internet-connected devices.

Which one of the above was the Internet's original goal?

The Internet was initially developed for military use before being broadened to support scientific collaboration.The innovation was also influenced in part by the 1960s' rising need for computers.

To know more about  physical elements visit:

https://brainly.com/question/10973978

#SPJ4

which technology provides laptops the ability to function on a cellular network?

Answers

The technology that provides laptops the ability to function on a cellular network is called a cellular modem. A cellular modem is a hardware component that is installed in a laptop or other device to enable it to connect to a cellular network and access the internet.

Cellular modems are often referred to as mobile broadband modems or mobile hotspots, and they work by connecting to a cellular network just like a smartphone does. The modem communicates with the cellular network through a SIM card that is inserted into the device, and the user can then access the internet by connecting to the modem using Wi-Fi or a USB cable. There are several different types of cellular modems available, including USB dongles that plug directly into a laptop's USB port, built-in modems that are integrated into the laptop's hardware, and portable hotspots that can be carried around and used to connect multiple devices to the internet.

Cellular modems are especially useful for people who travel frequently or work remotely, as they provide a reliable and secure internet connection even in areas where Wi-Fi may not be available. They are also useful as a backup internet connection in case of a Wi-Fi outage. In summary, a cellular modem is the technology that provides laptops the ability to function on a cellular network, allowing users to access the internet from virtually anywhere.

To know more about network visit :

https://brainly.com/question/29350844

#SPJ11

100 POINTS
Write a program that reads the content of two separate files and compares them in the following ways
- It displays a list of all unique words in each file
- It displays a list of words that appear in both files
- It should display a list of words that appear in the first file but not the second
- It should display a list of words that appear in the second file but not the first
- It should display a list of words that appear in either the first or second, but not in both, files
Write in Python and the correct answer will get 5 stars, brainliest, and thanks

Answers

Two different files' program are read by a computer that compares them in the following ways to provide a list of all unique terms in each file:

How can two strings be compared in a file in C?

Specifically, we use the strcmp() function to compare the texts (str1,str2). The str1 and str2 strings will be compared by this function. In the event that the function returns a value of 0, this indicates that the two strings are identical; otherwise, they are not.

filename = input("Enter file name with extension:")

words = []

with open(filename, "r") as file:

line_list = file.readlines()

for line in line_list:

  word_list = line.split(" ")

 for i in word_list:

words.append(i)

su_words = set(words)

unique_words = list(su_words)

print(unique_words)

To know more about program  visit:-

https://brainly.com/question/20435893

#SPJ1

In a modern multitasking operating system, what are the main goals (list at least four goals) of process scheduling algorithms? (4 marks) (b) Briefly explain the concepts of non-preemptive and preemptive scheduling algorithms – focus on their difference. (4 marks) (c) Three jobs A, B, and Carrive at different times. Their arriving time, estimated running time and job priority, are listed in the following table. Job Arriving time (second) Priority Estimated running time (second) 16 8 4 A B с 0 1 2 3 2 Note: 3 indicates the highest priority and 1 the lowest Calculate the average turnaround time and average waiting time when applying each of the following scheduling algorithms. (1) Priority scheduling (ii) First-come, first-served (iii) Round robin For (i) and (iii), assume scheduling quanta of 2 seconds. For (ii), assume that only one job at a time runs until it finishes.

Answers

The main goals of process scheduling algorithms in a modern multitasking operating system are as follows:Improving system performance: By selecting the right process scheduling algorithm, the system's performance can be improved. The algorithm should be designed in such a way that it can handle a large number of processes without negatively impacting the system's performance.

Keep track of resource allocation: The process scheduling algorithm should be designed in such a way that it can keep track of the resources allocated to each process and ensure that they are used efficiently.

Fairness: It is important to ensure that each process receives a fair share of the system's resources. If a process is given an unfair advantage, the system's performance will suffer.

Priority: The process scheduling algorithm should be able to prioritize the processes based on their importance.

Non-preemptive scheduling algorithms: In non-preemptive scheduling algorithms, once a process has been allocated the CPU, it will continue to execute until it either completes or blocks for some reason. In this algorithm, the CPU is not allocated to a new process until the currently running process completes. This algorithm is easy to implement but can lead to poor system performance if a long-running process is allocated the CPU.

Preemptive scheduling algorithms: In preemptive scheduling algorithms, a process can be interrupted and its execution suspended if a higher-priority process is ready to run. The preemptive algorithm has a higher system overhead but can achieve better performance by giving high-priority processes more CPU time to complete.The average turnaround time and average waiting time can be calculated for each scheduling algorithm as follows:

Priority scheduling: Average turnaround time = (16+11+12)/3 = 13.

Average waiting time = ((16-0)+(11-1)+(12-2))/3 = 8/3 = 2.67

First-come, first-served: Average turnaround time = (16+22+26)/3 = 21.33.

Average waiting time = ((16-0)+(22-4)+(26-8))/3 = 34/3 = 11.33

Round robin: Average turnaround time = (16+22+26)/3 = 21.33.

Average waiting time = ((0+2+4)+(17+19+22)+(26-2-8))/3 = 20/3 = 6.67.

Learn more about Operating System here:

https://brainly.com/question/13440584

#SPJ11

A user wants to visualize a highly complex 3D model using a Virtual Reality headset. What is the best way for the user to do this?.

Answers

The best way for the user to visualize complex 3D model using a virtual reality headset is to: use a tethered headset connected to a powerful PC.

What is a Virtual Reality Headset?

A virtual reality headset (VR) is a device that can transport you to another version of reality in such a way that the user can interact with a new environment entirely.

A tethered headset connected to a powerful PC is usually employed to visualize a highly complex 3D model with the aid of Virtual Reality headset.

Therefore, the best way for the user to visualize complex 3D model using a virtual reality headset is to: use a tethered headset connected to a powerful PC.

Learn more about virtual reality headset on:

https://brainly.com/question/26462832

What are the default page settings for a Google Doc? *

Answers

Wym sir/ma’am (Click File > Page Setup. Change the page size to A4. Click Set as default) if that’s what you need

question 1 in mysql, what is acceptable syntax for the select keyword? select all that apply.

Answers

In MySQL, the acceptable syntax for the SELECT keyword includes:

SELECT column1, column2, .....

FROM customer_name;

SELECT * FROM customer_name;

We have,

To find the acceptable syntax for the select keyword.

Since MySQL can be defined as an open-source relational database management system (RDBMS) that was designed and developed by Oracle Corporation in 1995. MySQL was developed based on structured query language (SQL).

The keywords in MySQL.

Some of the keywords that are reserved for use in MySQL include the following:

DELETE

CREATE

MASTER

SELECT

In database management, the SELECT keyword is typically used for selecting data from a database.

In MySQL, the acceptable syntax for the SELECT keyword includes:

SELECT column1, column2, .....

FROM customer_name;

SELECT * FROM customer_name;

To learn more about MySQL here:

brainly.com/question/24443096

#SPJ4

The complete question is,

question 1 In MySQL, what is the acceptable syntax for the select keyword? select all that apply.

SELECT column1, column2, .....

FROM customer_name;

SELECT * FROM customer_name;

SELECT

SELECT (correct)

Python String Functions: Create a new Python Program called StringPractice. Prompt the user to input their name, then complete the following:
Length
• Print: “The length of your name is: [insert length here]”
Equals
• Test to see if the user typed in your name. If so, print an appropriate message

Really appreciate the help.

Answers

#Swap this value by your name. Mine is Hamza :)

my_name = "Hamza"

#Get input from user.

inp = input("What's your name?: ")

#Print the length of his/her name.

print("The length of your name is",len(inp),"characters.")

#Check if the input matches with my name?

#Using lower() method due to the case insensitive. Much important!!

if(inp.lower()==my_name.lower()):

   print("My name is",my_name,"too! Nice to meet you then.")

in this lab, you declare and initialize constants in a c program. the program, which is saved in a file named , calculates your age in the year 2050.

Answers

In this lab, you declare and initialize constants in a C program. The program, which is saved in a file named calculate_age.c, calculates your age in the year 2050. In order to calculate your age in the year 2050, we need to know the current year.

We declare a constant called CURRENT_YEAR and initialize it to the current year using the time library in C. We then prompt the user to enter their birth year, which we store in a variable called birth_year. We subtract the birth year from the current year to get the user's age. Finally, we add the difference between 2050 and the current year to the user's age to get their age in the year 2050. We store this value in a variable called age_2050 and print it out to the user. Here is the code:`

``#include #include int main() {  const int CURRENT_YEAR = 2021;  int birth_year, age, age_2050;  printf("Enter your birth year: ");  scanf("%d", &birth_year);  age = CURRENT_YEAR - birth_year;  age_2050 = age + (2050 - CURRENT_YEAR);  printf("Your age in 2050: %d", age_2050);  return 0;}```This program demonstrates how to declare and initialize constants in C, as well as how to use variables and basic arithmetic operations to perform a simple calculation.

To know more about calculates visit:

https://brainly.com/question/30781060

#SPJ11

Other Questions
A system of linear equations includes the line that is created by the equation y = 0.5 x minus 1 and the line through the points (3, 1) and (5, 7), shown below. Determine the approximate measure of angle Y. 2. Mary receives $2.00 weekly as an allowance. Ifshe saves $0.70 of it, what percent does shesave? in 2000, microsoft had almost total market share. a significant market entry barrier for new competition was . why would a photo develop slower with radio waves than uv light pls help me solve pls show how you got the answer Tom has a 490-page book to read. If he has already read 56 pages, how many more pages should he read each weeko finish in 6 weeks?Write an equation for the situation and then answer the question. What leadership qualities must a president have in order to make the best use of his Cabinet of advisors? a small hyperechoic pancreas is identified on ultrasound. this is most suspicious for which of the following abnormalities? its a question from story the presence of what appear to be flashes of light is known as: an amendment proposed by Congress becomes part of the Constitution when it is ratified by what Question 2 (1 point)Determine the sequence and the common difference.9, 14, 19, 24 Performances that mix theatre, visual arts, music, dance, gesture, and rituals are a new type of experimental theatre called ________. a. a problem plays b. performance art c. Naturalism d. Realism Find the solutions to 8x2 + 56x = 0. Check all that apply. A. X = 8 B. x = 0 C. X = -7 D. X = 7 Find the product of 28 and 4. ONLY type in the number. You want to retire on the equivalent of $50,000 per year in today's money. inflation is expected to be 3%. you will retire in 30 years. you will earn 10% annually on your investments from not till retirement and you will earn 8% during retirement (which is expected to last 20 years). how much do you need to save per month in order to fund this retirement? Which is greater, 2 miles or 1,000 yards? How much greater? Explain. Of 2 miles and 1,000 yards, _____ is greater. Since 2 miles is the same as _____ yards, _____ is __ yards greater than _____ . 1. what was the purpose of two controls - unopened plates incubated at 25c and 37c? what happens if growth appears on both control plates how would you explain this? 99291, 99292, 99292, 99292the four types of medical decision making, in order of complexity from most to least complex, are as follows