1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
denis23 [38]
2 months ago
15

Kyoko buys an iPhone for $150 and gets a consumer surplus of $200. Her willingness to pay for an iPhone is $___. If she had boug

ht the iPhone on sale for $100, her consumer surplus would have been $___ . If the price of the iPhone had been $400, her consumer surplus would have been $___
Computers and Technology
1 answer:
Phoenix [80]2 months ago
3 0

Answer:

Chapter 7 Post-Class Assignment Part I: Consumers, Producers, and the Efficiency of Markets: Algorithmic End of Chapter

3.7

You might be interested in
Complete the following Programming Assignment using Recursion. Use good programming style and all the concepts previously covere
Likurg_2 [28]

Answer:

Explanation:

public class Ackermann {

   public static int ackermann's(int m, int n) {

       if (m == 0) {

           return n + 1;

       } else if (n == 0) {

           return ackermann's(m-1, 1);

       } else {

           return ackermann(m - 1, ackermann(m, n - 1));

       }

   }

   public static void main(String[] args) {

       System.out.println(ackermann(0, 0));

       System.out.println(ackermann(0, 1));

       System.out.println(ackermann(1, 1));

       System.out.println(ackermann(1, 2));

       System.out.println(ackermann(1, 3));

       System.out.println(ackermann(2, 2));

       System.out.println(ackermann(3, 2));

   }

}

1

2

3

4

5

6

7

29

Process finished with exit code 0

6 0
2 years ago
One way to use contiguous allocation of the disk and not suffer from holes is to compact the disk every time a file is removed.
Contact [7]

Answer:

The answer is below

Explanation:

a) Seek time = 5 msec, transfer time = 4 msec, transfer rate = 8 MB/sec = 8000 KB/sec, average file size = 8 KB

Transfer time = 8 KB ÷ 8000 KB/sec = 1 msec

The time required to read and write is twice the sum of the seek and transfer time.

Total time = (5 msec + 4 msec) * 2 + 1 msec = 19 msec

b) half of 16 GB = 8 GB = 8000000 KB

number of read and writes = (8000000 KB of total file size/ 8 KB of average file size) * 2 = 2000000

Transfer rate = 8 MB/sec = 0.008 GB/sec

Transfer time = 8 GB ÷ 0.008 GB/sec = 1000 sec

Total time = (5 msec + 4msec) * 2000000 + 1000 sec = 19000 sec

4 0
1 year ago
You used this code to glve the user hints.
Rainbow [258]

i dont knes did not understand your question

5 0
1 year ago
Read 2 more answers
Which of these is a type of social engineering attack?
Gnoma [55]

Answer:

phishing

Explanation:

all others are different ways of Hacking.

are you interested in cyber security?

4 0
2 years ago
Briefly describe "SoftwareEngineering Framework". Do provide examples and diagrams wherenecessary.
Degger [83]

Explanation:

A software engineering framework provides the programmers most of the basic building blocks needed to build an app. It is basically an abstraction where a software giving generic functionality can be selectively modified by additional user written code to create an application-specific software. A software engineering framework makes a standard way to build & deploy an application.

Software engineering frameworks contains support programs like compilers, toolsets, code libraries & application programming interfaces (APIs) which helps the development of a project or system.

Some examples of popular software engineering frameworks for different platforms are :-

Windows - ActiveX and .NET

MacOS X - Cocoa

Android - Android application framework

iOS - Cocoa Touch

7 0
1 year ago
Other questions:
  • Which feature is a component of a database application?
    7·1 answer
  • What are the basic tools for coding HTML manually?
    9·2 answers
  • _a file transfers a copy of the file from the storage media into your computer's memory.
    6·1 answer
  • What three requirements are defined by the protocols used in network communcations to allow message transmission across a networ
    10·1 answer
  • Technology is not used in this type of economy
    8·1 answer
  • 1.11 LAB: Data frames
    14·1 answer
  • What number base could you use as a shorthand for base 2 (binary)?
    12·2 answers
  • You manage a network with two locations (Portland and Seattle). Both locations are connected to the internet. The computers in b
    15·1 answer
  • Various types of mouse pointer<br>​
    15·1 answer
  • Why is the engineering design process important to the customer?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!