In "PUBATTLEGROUNDS” what is the name of the Military Base island?

Answers

Answer 1

Answer:

Erangel

Explanation:

Answer 2

Answer:

Erangel

Explanation:

The Military Base is located on the main map known as Erangel. Erangel is the original map in the game and features various landmarks and areas, including the Military Base.

The Military Base is a high-risk area with a significant amount of loot, making it an attractive drop location for players looking for strong weapons and equipment. It is situated on the southern coast of Erangel and is known for its large buildings, warehouses, and military-themed structures.

The Military Base is a popular destination for intense early-game fights due to its high loot density and potential for player encounters.

Hope this helps!


Related Questions

Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total payments for each interest rate starting from 5% to 8%, with an increment of 1/8.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package

public class Main //defining a class

{

public static void main(String[] axc)//main method  

{

double Loan_Amount,years,Annual_Interest_Rate=5.0,Monthly_Interest_Rate,Total_Amount,Monthly_Payment;//defining variables

Scanner ax = new Scanner(System.in);//creating Scanner class object

System.out.print("Enter loan amount:");//print message

Loan_Amount = ax.nextDouble();//input Loan_Amount value

System.out.print("Enter number of years: ");//print message

years= ax.nextInt();//input number of years value

System.out.printf("   %-20s%-20s%-20s\n", "Interest Rate", "Monthly Payment","Total Payment");//print message

while (Annual_Interest_Rate <= 8.0) //use while loop to calculate Interest rate table

{

Monthly_Interest_Rate = Annual_Interest_Rate / 1200;//calculating the interest Rate

Monthly_Payment = Loan_Amount * Monthly_Interest_Rate/(1 - 1 / Math.pow(1 + Monthly_Interest_Rate,years * 12));//calculating monthly payment

Total_Amount = Monthly_Payment * years * 12;//calculating yearly Amount

System.out.printf("\t %-19.3f%-19.2f%-19.2f\n", Annual_Interest_Rate,Monthly_Payment,Total_Amount);//use print meethod to print table

Annual_Interest_Rate = Annual_Interest_Rate + 1.0 / 8;//use Annual_Interest_Rate to increating the yearly Rate

}

}

}

Output:

Please find the attached file.

Explanation:

In this code inside the class, several double variables are declared in which the "Loan_Amount and years" is used for input value from the user-end, and another variable is used for calculating the value.

In this code a while loop is declared that checks the "Annual_Interest_Rate" value and creates the interest rate table which is defined in the image file please find it.

Why is dark supereffective against ghost? (AGAIN)

I don't get it. I get why it is supereffective against psychic, because even the greatest minds are scared of criminal activities, but why would it be good against ghost?
AND GIVE ME AN ACTUAL ANSWER THIS TIME. DON"T ANSWER IF YOU DON"T KNOW OR IF YOUR ANSWER ISN'T IN ENGLISH.

Answers

Answer: Think of it in this way: People often warn others not to speak badly of the Dead. Why? This is because, it is believed that their souls get "restless", and this causes them to haunt others. Thus, Dark type moves, that symbolise the "evil" aspect of the Pokemon, are super-effective against Ghosts. Type chart, effectiveness and weakness explained in Pokémon Go

Type Strong Against Weak Against

Bug Grass, Psychic, Dark Fighting, Flying, Poison, Ghost, Steel, Fire, Fairy

Ghost Ghost, Psychic Normal, Dark

Steel Rock, Ice, Fairy Steel, Fire, Water, Electric

Fire Bug, Steel, Grass, Ice Rock, Fire, Water, Dragon

Explanation: hopes this helps

Which of the following will display a string whose address is in the dx register: a.
mov ah, 9h
int 21h

b.
mov ah, 9h
int 22h

c.
mov ah, 0h
int 21h

d.
None of these

e.
mov ah, 2h
int 20h​

Answers

Answer:

a)

Explanation:

Function 9 of interrupt 21h is display string.

what is the correct sequence in which a computer operates​

Answers

Answer:

Booting is a startup sequence that starts the operating system of a computer when it is turned on. A boot sequence is the initial set of operations that the computer performs when it is switched on. Every computer has a boot sequence.

Your organization, which sells manufacturing parts to companies in 17 different countries, is in the process of migrating your inventory database to the cloud. This database stores raw data on available inventory at all of your company's warehouses globally. The database will be accessible from multiple cloud-based servers that reside on your cloud provider's hardware located in three regions around the world. Each redundant database will contain a fully synchronized copy of all data to accelerate customer access to the information, regardless of the customer's geographical location.What database trend is your company implementing

Answers

Answer:

Disributed database

Explanation:

A distributed database stores data on multiple servers sometimes placed in distinct geographical locations.

Describe how data is shared by functions in a procedure- oriented program​

Answers

In procedure oriented program many important data items are placed as global so that they can access by all the functions. Each function may have its own local data. Global data are more vulnerable to an inadvertent change by a function.

HELP ASAP DONT ANSWER WITH A LINK​

Answers

Answer:

Layout

title

title and content

section header

comparison

Orientation

landscape

portrait

Which of the following best describes the safety of blogging

Answers

we need the options

Generally safe, but there may be some privacy and security concerns. Therefore option B is correct.

While blogging can offer a relatively safe platform for expressing ideas and connecting with an audience, it is not entirely risk-free.

Privacy and security concerns can arise, especially when bloggers share personal information or discuss sensitive topics.

Cybersecurity threats, such as hacking or data breaches, can also compromise a blogger's personal information or their readers' data.

Additionally, bloggers should be mindful of online harassment and potential legal issues related to content ownership or copyright infringement.

Being aware of these risks and implementing best practices for online safety can help ensure a more secure and enjoyable blogging experience.

Therefore option B is correct.

Know more about Cybersecurity:

https://brainly.com/question/31928819

Your question is incomplete, but most probably your full question was.

Which of the following best describes the safety of blogging?

A. Completely safe, with no risks involved.

B. Generally safe, but there may be some privacy and security concerns.

C. Moderately safe, but potential risks exist, especially with sensitive topics.

D. Highly unsafe, with significant risks to personal information and security.

Which are the 2 main elements that’s make up computer architecture?

Answers

Answer:

Explanation:

Computer architecture is made up of two main components the Instruction Set Architecture (ISA) and the RTL model for the CPU.

mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on. If the amount entered is negative, write an error message and quit. Amounts greater than 100 are OK (the user will get many quarters.) Use extended assembly instructions and exception handler services.

Answers

Answer:

Explanation:

The following code is written in python and divides the amount of cents enterred in as an input into the correct amount of quarters, dimes, nickels and pennies. Finally, printing out all the values.

import math

#First we need to define the value of each coin

penny = 1

nickel = 5

dime = 10

quarter = 25

#Here we define the variables to hold the max number of each coin

quarters = 0

dimes = 0

nickels = 0

pennys = 0

cents = int(input("Please enter an amount of money you have in cents: "))

if cents > 0 and cents <= 100:

   if cents >= 25:

       quarters = cents / quarter

       cents = cents % quarter

   if cents >= 10:

       dimes = cents/dime

       cents = cents % dime

   if cents >= 5:

       nickels = cents /nickel

       cents = cents % nickel

   if cents > 0:

       pennys = cents / penny

       cents = 0

   print("The coins are: "

       "\nQuarters", math.floor(quarters),

       "\nDimes", math.floor(dimes), "\nNickels", math.floor(nickels), "\nPennies", math.floor(pennys))

else:

   print("wrong value")

Write a Java program that uses a value-returning method to identify the prime numbers between 2 bounds (input from the user). The method should identify if a number is prime or not. Call it in a loop for all numbers between the 2 bounds and display only prime numbers. Check for errors in input.Note:A number is prime if it is larger than 1 and it is divisible only by 1 and itself(Note: 1 is NOT a prime number)Example:15 is NOT prime because 15 is divisible by 1, 3, 5, and 15; 19 is prime because 19 is divisible only by 1 and 19.

Answers

Answer:

Answered below.

Explanation:

public int[] primeNumbers(int lowBound, int highBound){

if(lowBound < 0 || highBound < 0 || lowBound >= highBound){

System.out.print("invalid inputs");

else if(highBound <= 1){

System.out.print("No prime numbers);

}

else{

int[] nums;

for(int I = lowBound; I <= highBound; I++){

if(isPrime (I)){

nums.add(I);

}

}

return nums;

}

Write a client program ClientSorting2 and in the main() method: 1. Write a modified version of the selection sort algorithm (SelectionSorter()) that sorts an array of 23 strings (alphabetically) rather than one of integer values. Print the array before it is sorted in the main() method, then after it is sorted in SelectionSorter().

Answers

Answer:

The program in Java is as follows:

import java.util.*;

public class Main{

 public static void SelectionSorter(String[] my_array){

     System.out.print("\nAfter sort: ");

     for (int ind=0; ind < 22; ind++ ){

         int min = ind;

         for (int k=ind+1; k < 23; k++ )

         if (my_array[k].compareTo(my_array[min] ) < 0 ){ min = k;  }

         String temp = my_array[ind];

         my_array[ind] = my_array[min];

         my_array[min] = temp;    }

   for (int j=0; j < 23; j++){   System.out.print(my_array[j]+" ");}

    }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 String [] myarray = new String [23];

 for(int i= 0;i<23;i++){ myarray[i] = input.nextLine();  }

 System.out.print("Before sort: ");

 for ( int j=0; j < 23; j++ ){        System.out.print(myarray[j]+" ");    }

 SelectionSorter(myarray);

}

}

Explanation:

This defines the function

 public static void SelectionSorter(String[] my_array){

This prints the header for After sort

     System.out.print("\nAfter sort: ");

This iterates through the array

     for (int ind=0; ind < 22; ind++ ){

This initializes the minimum index to the current index

         int min = ind;

This iterates from current index to the last index of the array

         for (int k=ind+1; k < 23; k++ )

This compares the current array element with another

         if (my_array[k].compareTo(my_array[min] ) < 0 ){ min = k;  }

If the next array element is smaller than the current, the elements are swapped

         String temp = my_array[ind];

         my_array[ind] = my_array[min];

         my_array[min] = temp;    }

This iterates through the sorted array and print each array element

   for (int j=0; j < 23; j++){   System.out.print(my_array[j]+" ");}

    }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This declares the array

 String [] myarray = new String [23];

This gets input for the array elements

 for(int i= 0;i<23;i++){ myarray[i] = input.nextLine();  }

This prints the header Before sort

 System.out.print("Before sort: ");

This iterates through the array elements and print them unsorted

 for ( int j=0; j < 23; j++ ){        System.out.print(myarray[j]+" ");    }

This calls the function to sort the array

 SelectionSorter(myarray);

}

}

palindrome is a string that reads the same forwards as backwards. Using only a xed number of stacks, and a xed number of int and char variables, write an algorithm to determine if a string is a palindrome. Assume that the string is read from standard input one character at a time. The algorithm should output true or false as appropriate

Answers

Solution :

check_palindrome[tex]$(string)$[/tex]

   lower_[tex]$case$[/tex]_string[tex]$=$[/tex] string[tex]$. to$[/tex]_lower()

   Let stack = new Stack()

   Let queue = new Queue();

   for each character c in lower_case_string:

       stack.push(c);

       queue.enqueue(c);

   let isPalindrome = true;

   while queue is not empty {

       if (queue.remove().equals(stack.pop())) {

           continue;

       } else {

           isPalindrome=false;

           break while loop;

       }

   }

   return isPalindrome

Input = aabb

output = true

input =abcd

output = false

Define an application program and give three of it's uses​

Answers

Answer:

please give me brainlist and follow

Explanation:

Examples of an application include a word processor, a spreadsheet program, an accounting application, a web browser, an email client, a media player, a console game, or a photo editor. The collective noun application software refers to all applications collectively.

Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in text between two text files File1.txt and File2.txt and save the result in a file named result.txt (b) Change the permissions of the file remote_driver.c such that the owner has the permissions to read, write and execute and anybody other than the owner can only read the file but cannot write or execute. (c) Search for the string ir_signal in the file /home/grad/remote_driver.c and print on the terminal the number of instances of the given string in the file /home/grad/remote_driver.c (d) Reboot the system after 5 minutes. (e) Display the list of processes currently being run by the user harvey. (f) Print 3 copies of a file named my_driver.c from a printer that has a name HPLaserJet4300. (g) Put the last 40 lines of the file driver_log.log into a new file final_fault.txt.

Answers

You have to add the integer

Activity No.5
Project Implementation

Based on the Community Based Results, proposed programs/project to be implemented in your barangay/community
I. Title

II Project Proponents

III Implementing Proponents

IV Project Duration

V Objectives of the Project

VI Project Description

VII Methodology

VIIIDetailed Budgetary Requirements

IX Gantt Chart/ Detailed schedule of activities

Answers

In the activity related to Project Implementation, the following components are listed:

I. Title: This refers to the name or title given to the proposed program or project to be implemented in the barangay/community.

II. Project Proponents: These are the individuals or groups who are responsible for initiating and advocating for the project. They may include community leaders, organizations, or individuals involved in the project.

III. Implementing Proponents: These are the parties or organizations who will be responsible for executing and implementing the project on the ground. They may include government agencies, non-profit organizations, or community-based organizations.

IV. Project Duration: This refers to the estimated timeframe or duration within which the project is expected to be completed. It helps in setting deadlines and managing the project timeline.

V. Objectives of the Project: These are the specific goals or outcomes that the project aims to achieve. They define the purpose and desired results of the project.

VI. Project Description: This section provides a detailed explanation and overview of the project, including its background, context, and scope.

VII. Methodology: This outlines the approach, methods, and strategies that will be used to implement the project. It may include activities, processes, and resources required for successful project execution.

VIII. Detailed Budgetary Requirements: This section provides a comprehensive breakdown of the financial resources needed to implement the project. It includes estimates of costs for personnel, materials, equipment, services, and other relevant expenses.

IX. Gantt Chart/Detailed Schedule of Activities: This visual representation or detailed schedule outlines the specific activities, tasks, and milestones of the project, along with their respective timelines and dependencies.

These components collectively form a framework for planning and implementing a project, ensuring that all necessary aspects are addressed and accounted for during the execution phase.

For more questions on barangay, click on:

https://brainly.com/question/31534740

#SPJ8

Write an instance method in Rational called add that takes a Rational number as an argument, adds it to this, and returns a new Rational object. There are several ways to add fractions. You can use any one you want, but you should make sure that the result of the operation is reduced so that the numerator and denominator have no common divisor (other than 1).

Answers

Answer:

Explanation:

I do not have the Rational class but based on the information provided, the following class has been tested and does what is requested. It can simply be added to the Rational class and it will work fine. Due to technical difficulties I had to add the instance method as an attachment in a text file down below.

....................

Answers

Answer:

*

* *

* * *

* * * *

* * * * *

i did it i guess?

You are the IT administrator for a small corporate network. You have just changed the SATA hard disk in the workstation in the Executive Office. Now you need to edit the boot order to make it consistent with office standards. In this lab, your task is to configure the system to boot using devices in the following order: Internal HDD. CD/DVD/CD-RW drive. Onboard NIC. USB storage device. Disable booting from the diskette drive.

Answers

Answer:

this exercise doesn't make sense since I'm in IT

Explanation:

is a general-purpose computing device?

Answers

Answer: I think so

Explanation: All mainframes, servers, laptop and desktop computers, as well as smartphones and tablets are general-purpose devices. In contrast, chips can be designed from scratch to perform only a fixed number of tasks, but which is only cost effective in large quantities (see ASIC).

Please give brainliest not this file virus exploiter

You work for a small company that exports artisan chocolate. Although you measure your products in kilograms, you often get orders in both pounds and ounces. You have decided that rather than have to look up conversions all the time, you could use Python code to take inputs to make conversions between the different units of measurement.
You will write three blocks of code. The first will convert kilograms to pounds and ounces. The second will convert pounds to kilograms and ounces. The third will convert ounces to kilograms and pounds.
The conversions are as follows:
1 kilogram = 35.274 ounces
1 kilogram = 2.20462 pounds
1 pound = 0.453592 kilograms
1 pound = 16 ounces
1 ounce = 0.0283 kilograms
1 ounce = 0.0625 pounds
For the purposes of this activity the template for a function has been provided. You have not yet covered functions in the course, but they are a way of reusing code. Like a Python script, a function can have zero or more parameters. In the code window you will see three functions defined as def convert_kg(value):, def convert_pounds(value):, and def convert_ounces(value):. Each function will have a block showing you where to place your code.

Answers

Answer:

Answered below.

Explanation:

def convert_kg(value){

ounces = value * 35.274

pounds = value * 2.20462

print("Kilograms to ounces: $ounces")

print("Kilograms to pounds: $pounds)

}

def convert_pounds(value){

kg = value * 0.453592

ounce = value * 16

print("pounds to kg; $kg")

print ("pounds to ounce; $ounce")

}

def convert_ounces(value){

kg = value * 0.0283

pounds = value * 0.0625

print ("ounces to kg; $kg")

print ("ounces to pounds; $pounds")

}

Which database item would show details such as a customer’s name, their last purchase, and other details about a customer?
A. file
B. field
C. record
D. table
E. index

Answers

The correct answer would be C. Record

Answer:

The answer is C. Record

Explanation:

I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext. The ciphertext is this. I tried using stack flow and the rsatool on GitHub but nothing seems to work. Do you guys have any idea of what I can do. I need to solve this problem asap

Answers

Explanation:

Explanation:

RSA encryption is performed by calculating C=M^e(mod n).

However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.

Mikolas is doing a research on U.S. visas for a school project. He has found conflicting information on two sites. The first site is travel.state.gov and the other is traveldocs.com. Which site should Mikolas trust more?

Traveldocs.com

Travel.state.gov

Answers

Answer:

Travel.State.Gov

Explanation:

This is a government website explaining visas which should be very well trusted. However, traveldocs.com could be made by any person who does or doesn't know what they're talking about.

# change amount as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies
my code produces no output and i cant find why?


coin_change =int(input())

def coin_change(cents):
if cents <= 0:
print( 'Zero cents.')
else:
quarter = cents // 25
dime = (cents % 25) //10
nickle = cents % 25 % 10 // 5
penny = cents % 5



print (coin_change )
# produces no output

Answers

Answer:

Explanation:

The Python code provided was not producing any output because you were never printing out the coin variables that you created. The following code adds the needed print statements using the right singular or plural coin name as needed.

cents = int(input())

 

def coin_change(cents):

   if cents <= 0:

       print('Zero cents.')

   else:

       quarter = cents // 25

       dime = (cents % 25) // 10

       nickle = cents % 25 % 10 // 5

       penny = cents % 5

   if quarter == 0 or quarter > 1:

       print(str(quarter) + " quarters")

   else:

       print(str(quarter) + " quarter")

   if dime == 0 or dime > 1:

       print(str(dime) + " dimes")

   else:

       print(str(dime) + " dime")

   if nickle == 0 or nickle > 1:

       print(str(nickle) + " nickels")

   else:

       print(str(nickle) + " nickel")

   if penny == 0 or penny > 1:

       print(str(penny) + " pennies")

   else:

       print(str(penny) + " penny")

coin_change(cents)

whats the most popular social networking in the philippines?

Answers

Y o u t u b e

It wont let me say the word above

How many outcomes are possible in this control structure?
forever
if
is A button pressed then
set background image to
else
set background image to

Answers

Answer:

In the given control structure, there are two possible outcomes:

1) If the condition "Is A button pressed?" evaluates to true, then the background image will be set to a specific value.

2) If the condition "Is A button pressed?" evaluates to false, then the background image will be set to another value.

Therefore, there are two possible outcomes in this control structure.

Hope this helps!

Just press a to set up your background


Ineeedd help please 35 points question

Answers

Answer:

1

Explanation:

The four gates on the left are XNOR gates, their output is 1 if both inputs are equal. This is the case (given), so all inputs to the quadruple AND gate are 1, hence the output is also one.

QUESTION 1
Which of the following is an example of firewall?
O a. Notepad
b. Bit Defender internet Security
O c. Open Office
O d. Adobe Reader

Answers

Answer is Bit defender Internet security
B

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

Answers

Answer:open source

Explanation: what is's called

Linux is the operating systems would allow a user to add functionality and sell or give away their versions.

What is Linux Operating system?

Linux has been defined as known to be a kind of an an Operating system which is known to be an open-source.  It is one that is compared to Unix-like form of operating system but it is one that is often based on the the use of Linux kernel.

It has been said that to be an operating system kernel that was said to be released in 1991, by Linus Torvalds. Linux is said to be one that is often packaged as a service of a Linux distribution.

Linux has been used in a lot of ways such as the Server OS that is made for web servers, database servers, as well as file servers. They are known to be set up to aid high-volume as well as multithreading applications and also used for a lot of server types.

Therefore, Linux is the operating systems would allow a user to add functionality and sell or give away their versions. Hence, option A is correct.

Learn more about Linux on:

brainly.com/question/12853667

#SPJ2

Which of the following operating systems would allow a user to add functionality and sell or give away their versions?

-Linux

-macOS

-Windows

-UNIX

Other Questions
What criteria should be met before a data bar can be used in a report? Check all that apply. text fields numerical field drop-down menus all are primary keys all values can be compared length depends on value in field Generally speaking, the means of production in a free enterprise economy are (a) owned by individuals (b) owned by the government (c) the consumer goods that the economy produces (d) the way it decides who, how, and what to produce Do you think that demobilization is something that is needed today in a time when American troops are deployed throughout the world in various military efforts to maintain peace and stability in turbulent regions? this this this!!!!! can u answer Which missing item would complete this beta decay reactWhat percentage of a radioactive species would be found as daughter material after seven half-lives? Choose all that apply!!! In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link SOMEONE PLEASE HELP ME AND PUT THIS VERSE IN YOU OWN WORDS PLEASE! FOR BRAINLIEST! But you are a chosen race, a royal priesthood, a holy nation, a people for his own possession, that you may proclaim the excellencies of him who called you out of darkness into his marvelous light. Question 1 a) Ameena, a fresh graduate in Food Technology, started her business selling vitamins and other supplementary foods. She facing some problems in classifying some accounts according to the accounting types. You are required to help her to distinguish each of the following items either assets, liabilities or owner's equity L Premises IL Office equipment ai. Bank overdraft iv. Fixtures and Fittings V. Debtor: Sarah W. Creditor: Jamal vi. Loan to Adam viii. Capital ix Drawing X Closing Stock b) She has extracted the following information as at 31 December 2017. Freehold premises RM100,000, Creditors RM12,860, Debtors RM15,000, Bank overdraft RM10,370, Equipment RM26.000, Loan from Bee Bank RM66,000. Stock of unsold goods RM8.000, Cash in hand RM150. PERSATUAN Mart chrom You are required to i. Determine the owner's equity in the business: Prepare a Balance Sheet as at 31 December 2017. Find the value of x. Round the length to the nearest tenth.ANSWER: A)7.2 ft Ford Motor Company is considering thing a rewire of hynd deselec SUVS The heavy avotsing opene ad ses of $35 mikor neat year winout the n m amount that Ford Motor Company owes in taxes next year without the launch of the rew expecs to pretax income ofA $20.0 millionB $14.0 millionC $42.0 millionD. $14 million Write a short procedure (include type of glassware, calculations, etc.) for making 25.00 mL of a 0.0250 M NaF solution from 5. a. Solid NaF b. 0.100 M NaF solution 32 pages to 28 pages. Which of the following is an example of logos?A. an insult to the readerB. an emotional narrativeC. a list of facts D. a funny story dose the USA and Australia a Presidential Democracy Combine the two ideas into a single sentence."Guys, I thought we were here for the games," he started to say, _______ his friends were already changing into their skates.A. so thatB. whether C. butD. unless Question 38 Not yet answered Marked out of 1.00 Flag question Previous page Time left 0:46:07 An upward trend in real national income over an extended period of time is called O a. economic growth. O b. an inflationary boom. O c. constant-dollar national income. O d. aggregate output. O e. potential national income.. Next page Quiz Hav 1 2 3 4 5 10 11 12 13 14 19 20 21 22 23 28 29 30 31 37 $38 39 40 Finish attempt (Present-value comparison) You are offered $110,000 today or $320,000 in 11 years. Assuming that you can earn 12 percent on your money, which should you choose?Part 1If you are offered $320,000 in 11 years and you can earn 12 percent on your money, what is the present value of $320,000?$ (Round to the nearest cent.) 4. What is the crazy thing that Daisy says during dinner! Suzana is the independent non-executive director of Melisa Bhd, a plantation company. Malim Bhd is known as a rival of Melisa Bhd. Suzana unintentionally shares the strategies of Melisa Bhd in submitting a proposal to get the government contract to Azman, her old friend who is now working with Malim Bhd as general manager. From this scenario, assess the fundamental principles possibly violated by Suzana.