Write a VBA code using this Pseudo-code:
Sub SortRecords()
Call sub LoadStudentInfo
Clear the content of the first 100 rows in worksheet "Student".
Create a dynamic array sorted_records which is as large as student_records
(i.e., 2D Variant array)
' Get the corresponding order similar to the previous part
For each student in student_records
find his/her position according to the ranking method
Put this record into sorted_records according to the position found above
Next
' Now the student records in sorted_records should be sorted
For each student in sorted_records
Write it to worksheet "Students" accordingly

Answers

Answer 1

Below is the VBA code using the Pseudo-code you provided. This code will sort student records in worksheet "Student".

Please note that the ranking method is not specified in the Pseudo-code. You will need to replace the line "find his/her position according to the ranking method" with the appropriate ranking method.Sub SortRecords() Call sub LoadStudentInfo
   
   Dim student_records As Variant
   Dim sorted_records As Variant
   Dim i As Integer
   Dim j As Integer
   Dim position As Integer
   
   student_records = Range("A1").CurrentRegion.Value
   ClearContents Range("A1:A100")
   ClearContents Range("B1:B100")
   ClearContents Range("C1:C100")
   
   ReDim sorted_records(1 To UBound(student_records, 1), 1 To UBound(student_records, 2))
   
   For i = 1 To UBound(student_records, 1)
       position = 1 'Replace with appropriate ranking method
       For j = 1 To UBound(student_records, 1)
           If i <> j Then
               If student_records(i, 2) < student_records(j, 2) Then 'Assuming that column 2 contains the score
                   position = position + 1
               End If
           End If
       Next j
       For j = 1 To UBound(student_records, 2)
           sorted_records(position, j) = student_records(i, j)
       Next j
   Next i
   
   For i = 1 To UBound(sorted_records, 1)
       Range("A" & i).Value = sorted_records(i, 1)
       Range("B" & i).Value = sorted_records(i, 2)
       Range("C" & i).Value = sorted_records(i, 3)
   Next i
End Sub

To know more about Pseudo-code visit:

https://brainly.com/question/24953880

#SPJ11


Related Questions

____ is a technology that exists inside another device

Answers

Answer:

Embedded technology is a technology that exists inside another device.

Answer:

Embedded

Explanation:

An embedded system is a combination of computer hardware and software designed for a specific function.

IF YOU PLAY SURVIV>IO WITH ME RIGHT NOW I WILL GIVE YOU BRAINLIEST
AND IM NOT KAPPING

Answers

Answer:

no

Explanation:

moomoo.io is way better

If you set up a network in your home to share your internet connection with several laptops, what type of network have you create? p2p, client server, VPN, or firewall

Answers

Answer:

P2P

Explanation:

Originally stood for "Peer to Peer." The "colleagues" are computers in a P2P network that are linked via the Web to each other. By having a central server, files can be exchanged directly among devices on the network. In other words, any machine on a Distributed system becomes both a file server and a client.

Antes de conectar un receptor en un circuito eléctrico, ¿qué precauciones debemos tomar para evitar riesgos y hacer que el dispositivo funcione correctamente?

Answers

Answer:

Antes de conectar un receptor en un circuito eléctrico, es necesario corroborar que el dispositivo que se va a conectar soporte la misma corriente de voltaje que la del circuito eléctrico. Así, si el circuito tiene un voltaje de 110 voltios, el dispositivo debe tolerar dicha medida; si por ejemplo el circuito tiene un voltaje de 220 voltios y se conecta un dispositivo que tolera 110 voltios, se producirá un cortocircuito que dañará definitivamente el dispositivo, ademas de poder causar accidentes domésticos como el corte del suministro eléctrico o incluso incendios.

i want pizzzzzzzaaaaaaaaaaa

Answers

sameeeeeeeeeeeeeeeeeeeee

which way do you swipe in the android os to access shortcuts

Answers

You can swipe from right to left to access shortcuts or the notification bar in Android OS.

Create two sample HTML pages that include a DOCTYPE statement and a title. Include at least one example of each of the following:

a standard paragraph of text
a left-justified headline (like a title)
a centered headline (like a title)
a sub headline (like a subtitle)
a section of colored text (not all text, just a segment or headline)
an image (from a URL)
an image (from a local source)
an image with a size adjustment (maintaining the aspect ratio)
hyperlinks
a hyperlinked image
a split line (empty element)
one page that has a background color

Extra Credit:
Include a sample of Italic text.
Include an email address link that does not spell out the address on the web page (HINT: mailto).
Create a hyperlink to a local page on your computer.

Answers

Answer:

<!DOCTYPE html>

 <html>

   <head>

     <title>Hello</title>

   </head>

     <body style="background-color:pink;">

<h1 style="text-align:center">The Centered Headline</h1>

<h1 style="text-align:left">Left</h1>

         <h2>Sub headline</h2>

 <p>This is the paragraph.</p>

<h1 style="color:purple;">colored word</h1>

<img src="flower.jpeg" alt="Flower" width="460" height="345">

htmlimg2.jpeg

     </body>

 </html>

Explanation:

Which of the following describes the purpose of project management? planning and organizing resources to meet a goal arranging the order of tasks in a project presenting data in an organized manner producing a quality project

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about selecting the option among given options that best describes the purpose of project management.

The correct option of this question is the purpose of project management is planning and organizing resources to meet a goal.

Because project management is all about planning and organizing resources of a project to meet project goals.

Other options are not correct,

because arranging the order of tasks in a project, presenting data in an organized manner, and producing a quality project- all come under project management- are parts of planning and organizing steps of project management.

The answer is:

Planning and organizing resources to meet a goal

Write the name of the tab, command group, and icon you need to use to access the borders and shading dialog box.
TAB:
COMMAND GROUP:
ICON:

MICROSOFT WORD 2016
I NEED THIS ANSWERED PLZZ

Answers

Answer:

Tab: Home Tab

Command group: Paragraph

Icon: Triangle

Explanation:

A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1

Answers

Answer:.

Explanation:

List three ways of breaking a copyright law with the illegal copy of software.​

Answers

Answer:

Using itSelling it Giving it to someone.

Explanation:

Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.

If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.

(10 points) For EM algorithm for GMM, please show how to use Bayes rule to drive \( \tau_{k}^{i} \) in closed-form expression.

Answers

The closed-form expression for \( \tau_{k}^{i} \) in the EM algorithm for GMM is derived using Bayes rule, representing the probability that observation \( x_{i} \) belongs to the kth component. By dividing the likelihood and prior by the sum of all such terms, we arrive at the desired expression.

In EM algorithm for GMM, Bayes rule can be used to derive the closed-form expression for \( \tau_{k}^{i} \).

The expression is as follows:$$\tau_{k}^{i} = \frac{p_{k}(x_{i}|\theta_{k})\pi_{k}}{\sum_{j=1}^{K}p_{j}(x_{i}|\theta_{j})\pi_{j}}$$where, \(x_{i}\) is the ith observation, \(\theta_{k}\) represents the parameters of the kth component, \(p_{k}(x_{i}|\theta_{k})\) represents the probability of \(x_{i}\) belonging to the kth component, and \(\pi_{k}\) is the mixing proportion of the kth component.

To derive this expression using Bayes rule, we can use the following steps:1. Using Bayes rule, we can write the posterior probability of the kth component as:$$p_{k}(\theta_{k}|x_{i}) = \frac{p_{k}(x_{i}|\theta_{k})\pi_{k}}{\sum_{j=1}^{K}p_{j}(x_{i}|\theta_{j})\pi_{j}}$$2.

Since we are interested in the probability that the ith observation belongs to the kth component, we can simplify the above expression as:$$p_{k}(x_{i}|\theta_{k})\pi_{k} = \tau_{k}^{i}p_{k}(\theta_{k}|x_{i})\sum_{j=1}^{K}\tau_{j}^{i}p_{j}(x_{i}|\theta_{j})$$3. Dividing both sides of the above equation by \(p_{i}(x_{i})\), we get:$$\tau_{k}^{i} = \frac{p_{k}(x_{i}|\theta_{k})\pi_{k}}{\sum_{j=1}^{K}p_{j}(x_{i}|\theta_{j})\pi_{j}}$$This is the closed-form expression for \( \tau_{k}^{i} \) that we were looking for.

For more such questions algorithm,Click on

https://brainly.com/question/13902805

#SPJ8

which of the following is a recording of a user's path through a web site?
A) clustering. B) normalization. C) slicing and dicing. D) clickstream data

Answers

D) clickstream data. Clickstream data is a recording of a user's path through a website, including the pages they visit, the links they click, and other actions they take.

Clickstream data is often collected and analyzed by website owners and marketers to gain insights into user behavior and to optimize website design and performance.

Clustering is a data analysis technique that involves grouping similar objects or data points together based on their characteristics or attributes. Normalization is the process of organizing data in a database to reduce redundancy and improve data consistency. Slicing and dicing is a method of data analysis that involves breaking down large sets of data into smaller, more manageable pieces for easier analysis.

Learn more about Clickstream data here

https://brainly.com/question/28943559

#SPJ11

Match the database function to its purpose
finds the largest number in a database that
matches conditions
DCOUNT
DMIN
adds the numbers in a field of records in a
database that matches conditions
finds the smallest number in a database that
matches conditions
DAVERAGE
counts the cells that contain numbers in a
database that matches conditions
DMAX
DSUM
averages values in a field of records in a
database that matches conditions
Icy ll

Answers

Answer:

DCOUNT

counts the cells that contain numbers in a database that matches conditions

DMAX

finds the largest number in a database that matches conditions

DMIN

finds the smallest number in a database that matches conditions

DSUM

adds the numbers in a field of records in a database that matches conditions

DAVERAGE

averages values in a field of records in a database that matches conditions

Explanation: I got it right

a(n) ____ is a program module that contains a series of statements that carry out a task.

Answers

A(n) **function** is a program module that contains a series of statements that carry out a task.

Functions are fundamental building blocks of programming and are designed to perform specific tasks or operations. They encapsulate a set of instructions or statements that are executed when the function is called or invoked. Functions can have input parameters, perform calculations, manipulate data, and produce output.

By organizing code into functions, developers can break down complex tasks into smaller, more manageable units. Functions offer reusability, allowing the same set of statements to be used multiple times throughout a program without duplicating code. They promote modular and structured programming, enhancing code readability, maintainability, and efficiency.

In various programming languages, such as Python, JavaScript, and C++, functions are defined using syntax that includes a function name, optional parameters, and a block of statements enclosed in curly braces or indented lines. The function can be invoked or called at different points in the program to execute its defined task.

Learn more about JavaScript here:

https://brainly.com/question/16698901

#SPJ11

What is the function of a slide transition in a presentation program?

Answers

Answer:

Just Aesthetics.

Explanation:

The slide transition can smooth out a transition between slides. The transition is purely aesthetic, so it has no actual purpose, other than looking cool.

Answer:

It adds visual effects when you move from one slide to another

Explanation:

Write a program that reads student scores, gets the best
score, and then assigns grades based on the following scheme:
Grade is A if score is >= best -10;
Grade is B if score is >= best -20;
Grade is C if score is >= best -30;
Grade is D if score is >= best -40;
Grade is F otherwise.

Answers

You can run this program by copying and pasting it into a Python file and then running the file using a Python interpreter. When prompted, enter the number of students and their scores, and the program will output the grades for each student based on the given scheme.

A possible solution in Python:

```
# Define a function to read scores and calculate grades
def assign_grades():
   # Read the number of students and their scores
   num_students = int(input("Enter the number of students: "))
   scores = []
   for i in range(num_students):
       score = int(input("Enter the score for student {}: ".format(i+1)))
       scores.append(score)

   # Get the best score
   best_score = max(scores)

   # Assign grades based on the scheme
   grades = []
   for score in scores:
       if score >= best_score - 10:
           grades.append("A")
       elif score >= best_score - 20:
           grades.append("B")
       elif score >= best_score - 30:
           grades.append("C")
       elif score >= best_score - 40:
           grades.append("D")
       else:
           grades.append("F")

   # Print the grades for each student
   for i in range(num_students):
       print("Student {}: Score={}, Grade={}".format(i+1, scores[i], grades[i]))

# Call the function to test it
assign_grades()
```

This program defines a function called `assign_grades()` that reads the number of students and their scores from the user, calculates the best score, assigns grades based on the given scheme, and prints the grades for each student. The function uses lists to store the scores and grades for each student, and loops over these lists to calculate the grades based on the best score. Finally, the function prints the grades for each student using formatted strings.

learn more about Python files here: brainly.com/question/26497128

#SPJ11

chegg take in a string from the user and pass it as input to a function. have the function return a dict which keeps count of each letter (in lowercase) in the string, excluding spaces. print out this dict.

Answers

Here's a Python code that takes a string from the user, passes it as input to a function, and returns a dictionary that counts the occurrence of each lowercase letter in the string (excluding spaces):

def count_letters(string):

   letter_count = {}

   for char in string:

       if char.isalpha() and char.islower():

           if char in letter_count:

               letter_count[char] += 1

           else:

               letter_count[char] = 1

   return letter_count

user_input = input("Enter a string: ")

result = count_letters(user_input)

print(result)

This code defines the `count_letters` function that initializes an empty dictionary `letter_count`. It iterates over each character in the input string and checks if the character is an alphabetic lowercase letter. If it is, it adds it to the dictionary `letter_count` and increments its count. Finally, it returns the resulting dictionary. The user is prompted to enter a string, and the `count_letters` function is called with the user's input. The resulting dictionary is stored in the `result` variable, which is then printed.

Note that this code assumes that you want to count only lowercase letters. If you want to include uppercase letters as well, you can modify the condition `char.islower()` to `char.isalpha()`.

To know more about dictionary visit:

https://brainly.com/question/32926436

#SPJ11

you work for a company that has several buildings around your state. you are required to travel to those other buildings. where would you store your files to make access to them easier?

Answers

Your employer is a business with locations all over your state that employs cloud computing or cloud storage to keep its data safe. To the other buildings you must likewise travel.

This article discusses cloud storage at an enterprise-grade level. For services targeted at customers, see file hosting service. Digital data is stored in logical pools that are referred to as being "on the cloud" by the term "cloud storage," a type of computer data storage. In terms of readily accessible interfaces, almost instantaneous elasticity and scalability, multi-tenancy, and resource availability, cloud storage is similar to general cloud computing because it is based on a highly virtualized architecture. This free storage is accessible on Windows and mobile devices.

Learn more about cloud storage here

https://brainly.com/question/18709099

#SPJ4

Object-Oriented Analysis can be characterized by which of the following Selected Answer, Do the right thing Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer, An investigation of the problem (rather than how a solution is defined) Selected Answer, Defining software objects and how they collaborate to fulfill the requirements Answer, Designs are implemented in a programming language Selected Answer, Emphasizes a conceptual solution that fulfills the requirements Answer, Do the thing right

Answers

Answer:

Selected Answer, Emphasizes finding and describing the objects (or concepts) in the problem domain Selected Answer,

Explanation:

as you learned from our class and readings, the modulo operator can be useful in surprising ways. for this assignment, you'll use it to validate upc barcodes. in most stores today, almost every item you purchase has a universal product code (upc). the upc is typically printed on the product and is read by a barcode scanner.

Answers

The program to illustrate the modulo operator will be:

#define a function to check UPC number

def is_valid_upc(list_of_integers):

#define result to store the sum of digits

result=0

# get the lenght of list

digits=len(list_of_integers)

#chaeck condition for valid and return True or False

if digits>2 and sum(list_of_integers)>0:

for i in range(digits-1,0,-1):

if i%2==0:

result +=list_of_integers[i]*3

else:

result +=list_of_integers[i]

if result%10==0:

return True

else:

return False

else:

return False

#get the list input from user

list_of_integers = eval(input("Enter the UPC number : "))

#call the function and print the result

print(is_valid_upc(list_of_integers

How to illustrate the information?

When two numbers are split, the modulo operation in computing yields the remainder or signed remainder of the division. A modulo n is the remainder of the Euclidean division of a by n, where an is the dividend and n is the divisor, given two positive numbers, a and n.

The modulus operator, which operates between two accessible operands, is an addition to the C arithmetic operators. To obtain a result, it divides the provided numerator by the denominator.

Learn more about modulo operator on:

https://brainly.com/question/28586330

#SPJ1

give examples of html5 semantic elements that should be used to structure the contents of a web page and can replace generic tags

Answers

HTML5 introduced several semantic elements to help structure the contents of a web page.

The following are examples of semantic elements that can replace generic tags:

navheaderarticlesectionasidefootermain

The purpose of semantic elements is to make the HTML code more readable and understandable.

By using these elements, it is easier to distinguish different sections of a webpage. The elements mentioned above are all used to define the structure of a page and provide context for the content.

By using these elements, it is easier for search engines to identify the main content of a page and improve the accessibility of the site.

Learn more about semantic elements at:

https://brainly.com/question/29526490

#SPJ11

Which security method is used by companies to fix a flaw in their application?
a. Software Update
b. Antivirus Software
c. Windows OS Update
d. Local Network Hosted

Answers

The software update method is commonly used by companies to fix a flaw in their application.

When a security vulnerability or flaw is identified in an application, a software update or patch is often released to fix the issue. This update may include code changes, bug fixes, or new security features that address the vulnerability. Companies may also release regular software updates to improve performance and functionality, which can help prevent security issues from occurring in the first place. Other security methods such as antivirus software, Windows OS updates, and local network hosted solutions can also play a role in protecting against security threats, but software updates are a primary method for fixing vulnerabilities in applications.

Learn more about software update here:

https://brainly.com/question/25604919

#SPJ11

Which one of these is an example of unnecessary debt?
A. You buy a perfectly good used car instead of an expensive new car
B. You buy your groceries on Friday instead of coupon Monday.
C. You charge clothes you don't really need on a high-interest store card.
D. You save up all year to take a great surfing vacation.

Answers

c. you charge clothes you don’t really need on a high-interest store card

hope this helps :)

An example of unnecessary debt is when you change your clothes and don't really need on a high-interest score. Thus option C is correct.

What is unnecessary debt?

An unnecessary debt can be caused by a variety of issues such as expensive life events, having children, or moving to a new house. It may also be due to poor money management. The debt is due to those things that are not needed and hence are unnecessary.

Find out more information about unnecessary debt.

brainly.com/question/3566270

PLEASEEEE HELPPPP
Which key navigates a user out of Read View to the previous view?​

Answers

Answer:
Esc/Escape
explanation:

PLS HELP ME WITH MY PYTHON HW

PLS HELP ME WITH MY PYTHON HW

Answers

Answer:

name=input('What is your name?')

age=input('What is your age?')

school=input('What is your school?')

print('Hi '+ name +', you are '+ age +', and you go to '+school+'.')

age=int(input('What is your age?'))

if age > 10:

 print('You are a teenager')

for x in range(10):

 print(name)

country='United States or America'

print(country[17:24])

a_list = [0, 2, 4, 8]

maximum = max(a_list)

print(maximum)

minimum = min(a_list)

print(minimum)

numbers = [1, 3, 4, 2]

numbers.sort()  

print(numbers)

describe the process of terminating a connection in tcp. be sure to discuss specifics on why tcp uses the mechanism it does.

Answers

The process of terminating a connection in TCP involves a four-step process called the TCP connection termination process. TCP uses this mechanism to ensure that both parties have successfully transmitted and received all the data before the connection is closed.

1. Initiating the termination: The first step in terminating a TCP connection is for one party(usually the client) to send a FIN (Finish) packet to the other party (usually the server). This indicates that the sender has finished sending data and wants to close the connection.

2. Acknowledging the termination: Upon receiving the FIN packet, the other party sends an ACK (Acknowledgment) packet back to the sender. This acknowledges that the FIN packet has been received, and the sender can now close its side of the connection.

3. Sending a FIN packet from the other party: After sending the ACK packet, the other party sends its own FIN packet to the sender, indicating that it has also finished sending data and wants to close the connection.

4. Acknowledging the final FIN packet: The sender, upon receiving the second FIN packet, sends an ACK packet back to the other party, acknowledging the receipt of the second FIN packet. At this point, both parties have agreed to close the connection and can proceed to do so.

TCP uses this four-step termination process to ensure that both parties have properly transmitted and received all data before the connection is closed. This mechanism helps prevent data loss or corruption during the termination process, and it also allows both parties to gracefully close the connection without causing issues in the underlying network.

Learn more about TCP here:

https://brainly.com/question/27975075

#SPJ11

How to paste picture in word without moving table.

Answers

You should Double Click then hit add

what elements of the user stories were the most helpful in developing your initial test cases?

Answers

The most helpful elements of user stories in developing initial test cases are: the clear description of the user's goal, the defined roles and actions, and the specific acceptance criteria.

When developing test cases from user stories, it is important to consider the following elements:

1. User persona: User personas provide a better understanding of the user's needs, goals, and behavior. This information is used to develop relevant test cases.

2. User story title: The title of the user story is used to create a test case name.

3. Acceptance criteria: Acceptance criteria provide details on the expected outcome or behavior of the application.

4. Assumptions: Assumptions provide insight into the expected user behavior and are helpful in developing test cases.

5. Business value: Business value helps to prioritize which test cases should be executed first.

Learn more about developing initial test: https://brainly.com/question/14923867

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Other Questions
Mary has 4 gallons of water. She wants to put 2/3 gallon in each bottle. How many bottles can she fill?Mary can fill 4 bottles of water.Mary can fill 14 bottles of water.none of theseMary can fill 6 bottles of water. G5a. 1p Pine Sreet. Rector Street, and Taylor Street intersect to form a triangular-shaped park as shown. Given the angle measures. order the lengihs of the sides from longest to shortest. Pine Street 54 64 Rector Street Taylor Street O A. Rector, Taylor, Pine O B. Pine, Taylor, Rector O C. Taylor, Pine, Rector O D. Rector, Pine, Taylor When i feed my parrot breakfast in the morning, he either grunts happily and eats it, screams petulantly and eats it, or screams and flings it out of the cage. These events are disjoint. Are they also independent?. A small diamond of mass 16.6 g drops from a swimmer's earring and falls through the water, reaching a terminal velocity of 2.2 m/s. (a) Assuming the frictional force on the diamond obeys f= -bv, what is b (in kg/s)? (Round your answer to at least four decimal places.) 0.081 X kg/s (b) How far (in m) does the diamond fall before it reaches 90 percent of its terminal speed? algebra ixl question #2 PLLZ HELP ASAP LOOK AT PIC Zx and Zy are supplementary angles. Zy measures 88. What is the measure of Zx? Stuck? 418 minues what equals 19 Hazel transferred the following assets to Starling Corporation: Adjusted Basis Fair Market Value Cash $120,000 $120,000 Machinery 48,000 36,000 Land 108,000 144,000 In exchange, Hazel received 50% of Starling Corporation's only class of stock outstanding. The stock has no established value. However, all parties sincerely believe that the value of the stock Hazel received is the equivalent of the value of the assets she transferred. The only other shareholder, Rick, formed Starling Corporation five years ago and did not transfer any property to Starling Corporation for stock at this time. Select one: a. Hazel has no gain or loss on the transfer. b. Starling Corporation has a basis of $48,000 in the machinery and $108,000 in the land. c. Starling Corporation has a basis of $36,000 in the machinery and $144,000 in the land. d. Hazel has a basis of $276,000 in the stock of Starling Corporation. e. None of the above. Task 2a SaveLoader InstructionsDescriptionIn this task, you have to implement the saveGameRecord( GameRecord[], java.io.Writer) method. The method takes two parameters, records of GameRecord[] type and writer of java.io.Writer type.GameRecord is a class containing three member fields, name, level and score. The save GameRecord(GameRecord[], java.io.Writer) method reads all three member fields for each of the records in the GameRecord array and writes them to a newline in a text file in the format where a tab character (\t) is used to separate the name, level and score fields.Adding the tab character will result as empty space appearing between the fields as illustrated by the following example:noname 1 10The text file that will be written is connected to a Writer object. You should create a PrinterWriter for writing to the text file. You can do that by passing the given Writer object to the constructor of the PrintWriter. You will also need to refer to the Javadoc of the GameRecord class under the based on its geographic distribution in the rocks outcropping in the area which fossil is the least useful for correlation because of its limited geographic distribution Find the largest three-digit number that can be written in the form 3^m + 2^n, where m and n are positive integers. a weakness of break even analysis is that it assumes Mia Caruso Enterprises, a U.S. manufacturer of children's toys, has made a sale in Bulgaria and is expecting a BGN6 million cash inflow in one year. The current spot rate is S= $2.073/BGN and the one-year forward rate is F = $1.9537/BGN. a. What is the present value of Mia Caruso's BGN6 million inflow computed by first discounting the cash flow at the appropriate Bulgarian Lev discount rate of 6%, and then converting the result into dollars? b. What is the present value of Mia Caruso's BGN6 million inflow computed by first converting the cash flow into dollars, and then discounting at the appropriate dollar discount rate of 11%? c. What can you conclude about whether these markets are internationally integrated, based on your answers to parts (a) and (b)? C a. What is the present value of Mia Caruso's BGN6 million inflow computed by first discounting the cash flow at the appropriate Bulgarian Lev discount rate of 6%, and then converting the result into dollars? The present value of Mia Caruso's BGN6 million inflow is $ million. (Round to five decimal places.) Suppose we have the following memory allocator setup for the block headers. Note this model is slightly different from the book and project. Block size is the header size + payload size + padding. Headers are single 4-byte integers and store both the size of the block and meta information packed into 32 bits. The unused bits after the size is stored are used to store the meta-information. Memory requests must be in multiples of 8. There are no memory alignment restrictions. What is the maximum number of bits in the 4-byte header that could be used tostore meta-information? Hint: Draw a picture Jake has 4 hours before bedtime. He must spend 1 1/2 hours doing homework. The rest of the time will be spent doing puzzles. It takes Jake 3/4 hour tocomplete each puzzle. Write an equation that models the number of puzzles (p) that Jake can complete before bedtime. SC_2, 4) and T (3,9).The midpoint is MC). The distance between S and T is about The price of a gallon of gasoline is $2.25. The price when Ryan's mother started driving was 1/5 of the current price. What was the price of gasoline when Ryan's mother started driving? 1. Find the value for the expression when h=13: 9 + h - 3 2.Find the value for the expression when x=6 and y= 3: x-y3. Find the value for the expression when x=9: 3x please help Zach took a science test. He answered 42 questions correctly and 8 questions incorrectly.What percentage of the questions did Zach answer correctly?