I need help with a c# assignment. I am using Visual Studios and need it done with basic c# coding. It is a GUI application.

INSTRUCTIONS
For this assignment, you are required to create the GUI for a timekeeping/payroll system for
CMS.
The system should first allow an employee to enter his name and record the time he worked on
each project for a given week. Using the spreadsheet above as a guideline, the system must
allow the user to enter his name and the name of his supervisor. Next, the user must enter the
number of the week for which he is entering time. Assume a maximum of 52 weeks in a year.
Make sure the employee enters only a valid week number.
To record an employee’s hours, the user must enter the name of a client, a client’s contract, and a
project. For each of the seven days in a week, the user must enter hours worked or check a box
that indicates the day is a weekend, a holiday, or a vacation day. If the employee fails to enter
any hours for a day and fails to check the weekend/holiday/vacation box for that day, the system
should warn the user that the given day is missing information. The system should also ensure
that if any work hours are entered for a day, the checkbox for that day should NOT be checked.
Finally, the system should ensure that a user cannot enter more than 24 hours in a single day.
Once the hours are entered, the user should be able to “Submit” his hours by clicking a button
that will calculate his payroll information for the week and display it on the same screen.
Payroll information is calculated as follows:
All employees are paid for hours worked at a rate of $15 US dollars per hour. If the number of
hours worked in the week exceeds 40, the employee is paid time and a half for his overtime
hours. For example, assume an employee works 50 hours during a week, he will receive (40 X
$15) + (10 overtime hours X (1.5 X $15)) = $825.00. If an employee works less than 40 hours in
a week, the system should make note of this fact in a label beside the supervisor’s name.

Answers

Answer 1

1. Create a new Windοws Fοrms Applicatiοn prοject in Visual Studiο.

2. Design the GUI fοr the timekeeping/payrοll system. Add text bοxes, labels, buttοns, and checkbοxes as needed.

3. Write cοde tο validate the user input. Make sure the week number entered by the user is between 1 and 52. Alsο, make sure that the user enters valid wοrk hοurs (between 0 and 24) and checks the apprοpriate checkbοx if they did nοt wοrk that day.

4. Calculate the payrοll infοrmatiοn when the user clicks the "Submit" buttοn. Use cοnditiοnal statements tο determine if the emplοyee wοrked οvertime and calculate their pay accοrdingly.

5. Display the payrοll infοrmatiοn οn the same screen using labels οr text bοxes.

What is GUI?  

GUI stands fοr Graphical User Interface. It is a type οf user interface that allοws users tο interact with a cοmputer οr sοftware applicatiοn using graphical elements such as icοns, buttοns, text bοxes, menus, and οther visual elements.

To know more about windows visit:

brainly.com/question/27198171

#SPJ9


Related Questions

Real GDP Government Spending (G) Tax Revenues (T) (Billions of dollars) (Billions of dollars) (Billions of dollars) 340 58 54 380 58 58 420 58 62 Use the blue line (circle symbols) to plot the government spending schedule presented in the table. Then use the orange line (square symbols) to plot the economy's tax revenues schedule. G T Deficits Surpluses 300 320 340 360 380 400 420 440 460 480 500 70 68 66 64 62 60 58 56 54 52 50 GOVERNMENT SPENDING AND TAXES (Billions of dollars) REAL GDP (Billions of dollars)

Answers

The deficits and surpluses can be calculated by subtracting government spending from tax revenue at each level of real GDP.

Explain the graph showing the government spending and tax revenue schedules?

The blue line with circle symbols represents the government spending schedule. It's a horizontal line at $58 billion, which means that regardless of the level of real GDP, the government spending remains constant at $58 billion.

The orange line with square symbols represents the economy's tax revenue schedule. It's an upward sloping line that starts at $54 billion when the real GDP is $340 billion and increases by $4 billion for every $40 billion increase in real GDP. For example, when real GDP is $380 billion, tax revenue is $58 billion; when real GDP is $420 billion, tax revenue is $62 billion.

The deficits and surpluses can be calculated by subtracting government spending from tax revenue at each level of real GDP. For example, when real GDP is $340 billion, the deficit is $4 billion ($58 billion - $54 billion); when real GDP is $420 billion, the surplus is $4 billion ($62 billion - $58 billion).

To learn more about tax, visit: https://brainly.com/question/14720363

#SPJ1

what is the best software company in Hyderabad?

Answers

Answer:

Deloitte

benefits

1. highest salary package

2. hardword


What is the world wide web (WWW)?
Explain any four (4) uses of the internet.
Discuss three (3) advantages and two (2) disadvantages of email.

Answers

Answer:

Availability and Portability. ...

Advantage: Reduces Shipping and Mailing Costs. ...

Disadvantage: Vulnerability to Loss. ...

Disadvantage: Accessible to Others.

For questions 5-8, consider the following code:



def mystery(a = 2, b = 1, c = 3):

return 2 * a + b + 3 * c

What is the output for mystery(4, 3, 7)?

What is the output for mystery(5, 8)?

What is the output for mystery(1)?

What is the output for mystery()?

Answers

Answer:

les go, it has optional parameters so...

Explanation:

output of 1 is 32

second 27

third 12

fourth 14

15. Regularly downloading updates
is a great way to protect your devices
from
O A. going to jail.
B. interacting with strangers online.
C. cookies.
O D. viruses and hackers.

Answers

Answer:

D. viruses and hackers.

Explanation:

Regularly downloading updates

is a great way to protect your devices

from viruses and hackers.

Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added. How can his team produce this?

Craig's team can demonstrate this by creating a(n)_______​

Answers

Answer:

Craig's team can produce a mockup or wireframe of the website to show a fully laid-out detailed version without functionality. A mockup is a static visual representation of the website's design, usually created with a graphic design tool or even drawn on paper. It serves as a blueprint for the website's layout, content, and visual elements. A wireframe, on the other hand, is a low-fidelity representation of the website's design that outlines the placement and structure of content and features. Both of these tools can help Craig's team communicate their design ideas to stakeholders and get feedback before moving on to the development stage.

Answer:

Craig's team can create a mockup or prototype of the website to demonstrate the fully laid out detailed version before adding functionality. A mockup is a static visual representation of the website design, while a prototype is an interactive and clickable version that allows users to navigate through the design and experience its functionality. Both mockups and prototypes can be created using various tools such as graphic design software or prototyping tools. By creating a mockup or prototype, Craig's team can showcase the website design to him and other stakeholders, get feedback, and make any necessary revisions before adding functionality and building the actual website.

A team of engineers have done the root cause analysis of all identified defects of Release 1. To prevent such defects occurring in the next release, they have proposed a few changes to the process.

Answers

It is always important to analyze the root cause of defects to understand why they occurred and how to prevent them in the future.

Proposing changes to the process is a good way to prevent similar defects from occurring in the next release. It's important to carefully consider these proposed changes and make sure that they are feasible and effective in addressing the root causes of the defects.

What is root cause analysis?

Root cause analysis is a problem-solving process used to identify the underlying cause or causes of a problem or defect. In this case, a team of engineers has identified and analyzed all the defects that were found in Release 1 of a particular product or software.

After identifying the root cause of each defect, the engineers have proposed changes to the development process to prevent these defects from occurring in the next release. These changes could include implementing new quality control measures, improving the testing process,etc.

Therefore, the goal of these changes is to prevent similar defects from occurring in the future, which can help improve the overall quality of the product or software and reduce the need for costly and time-consuming rework or fixes.

Learn more about root cause analysis on:

https://brainly.com/question/21116246

#SPJ1

I am stuck on this.... it is Java

Description:
"Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequence. Create a for loop that compares the two strings starting from index 0. For each match, add one point to userScore. Upon a mismatch, exit the loop using a break statement. Assume simonPattern and userPattern are always the same length. Ex: The following patterns yield a userScore of 4:
simonPattern: RRGBRYYBGY
userPattern: RRGBBRYBGY

Answers

String simonPattern = "RRGBRYYBGY";

String userPattern = "RRGBBRYBGY";

int userScore = 0;

for (int i = 0; i < simonPattern.length(); i++) {

   if (simonPattern.charAt(i) == userPattern.charAt(i)) {

       userScore++;

   } else {

       break;

   }

}

System.out.println("User score: " + userScore);

Online data storage refers to the practice of storing electronic data with a third party services accessed via the internet
A true
B false​

Answers

Answer: I think the answer is true

Answer: the answer is true

Use the following initializer list:

w = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

Write a loop to print the words that start with "F" or "L".

Sample Run:
Logic
Filter
Functionality

Answers

Answer:

Here's the Java code to print the words that start with "F" or "L":

String[] w = {"Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"};

for (String word : w) {

   if (word.startsWith("F") || word.startsWith("L")) {

       System.out.println(word);

   }

}

Explanation:

Output:

Logic

Filter

Functionality

Explain why a programmer would make use of both an interpreter and a compiler. [4] |​

Answers

A programmer might make use of both an interpreter and a compiler for different reasons.

An interpreter is a program that directly executes the source code of a program without first converting it to machine code. It reads the code line by line and executes each line immediately. Interpreted languages are often used for scripting, prototyping, and rapid development because changes to the code can be tested and executed quickly.

A compiler, on the other hand, is a program that translates the source code of a program into machine code that can be executed directly by the computer's processor. Compiled languages are often used for performance-critical applications because the compiled code is optimized for the target platform and can execute more quickly than interpreted code.

So, a programmer might use an interpreter during the development and testing phase of a program to quickly try out changes and see the results. Once the code is stable and ready for deployment, the programmer might use a compiler to create an optimized executable that can be distributed to end-users.

Another reason to use both an interpreter and a compiler is to take advantage of the strengths of each approach. For example, some languages like Java are first compiled into an intermediate bytecode that can be interpreted by a Java Virtual Machine (JVM). This allows the code to be compiled once and then run on any platform that has a compatible JVM, while still providing some of the performance benefits of compiled code.

In summary, a programmer might use both an interpreter and a compiler for different reasons, such as rapid prototyping, performance optimization, or platform independence.

Which of these is it important to check when checking compatibility on phones?

A. no text input

B. mouse-free input

C. touchless interface

D. no audio output

E. does not support forms​

Answers

Answer:

The option that is important to check when checking compatibility on phones is not listed. The most important factor to check for compatibility on phones is the operating system (OS) version. Different OS versions may have different requirements for running apps, so it's important to make sure the app is compatible with the user's OS version. Other factors that may be important to check for compatibility include screen size and resolution, RAM and storage capacity, and network connectivity.

Explanation:

You have been given a project to build an IT infrastructure for a particular
telecommunication company. You have been given specifications which shows
that the company will receive high volume of calls and messages from its
customers. You have been told that the users (customers and employees of the
company) of the system should be given fair amount of time for services and
the response time should be minimized. The management of the company have
already bought other software tools but are not sure what kind of operating
system to deploy. You have been requested to recommend the best operating
system based on their requirements (fair amount time for services and
minimized response time). Convince the management that your choice is
right

Answers

Answer:

Linux

Explanation:

The best operating system to deploy for this project would be Linux. Linux is a powerful operating system that is optimized for performance and is widely used in high volume call center environments. It is open source, which means that it is highly customizable and can be tailored to meet the specific needs of the company.

One of the key advantages of Linux is its stability and reliability. It is designed to run continuously for long periods of time without crashing or requiring rebooting, which is essential for a telecommunications company that requires a high level of uptime for its systems.

Linux is also highly secure, which is crucial for a company that will be handling sensitive customer data. The open-source nature of Linux means that security vulnerabilities are identified and patched quickly, reducing the risk of security breaches.

Finally, Linux is known for its low response time and quick processing speed. It is optimized for multitasking, which means that it can handle multiple requests simultaneously without slowing down the system. This will ensure that the users of the system are provided with a fair amount of time for services and that the response time is minimized.

What is meant by Slide Show​

Answers

Answer:

A slide show is a presentation of a series of still images on a projection screen or electronic display device, typically in a prearranged sequence . The changes may be automatic and at regular intervals or they may be manually controlled by a presenter or a viewer.

I hope it helped you...

If I got it right...

MARK ME AS BRAINLIEST

Discuss the (FIVE) risk possess of forensic investigation

Answers

Answer:

Contamination of Evidence: One of the primary risks of forensic investigation is the contamination of evidence. Contamination can occur when evidence is mishandled, improperly stored, or mixed with other evidence. This can result in unreliable or inaccurate results, which can compromise the integrity of the investigation.

False Accusations: Forensic investigation can sometimes lead to false accusations if the evidence is misinterpreted or misrepresented. This can occur if the investigator lacks the necessary expertise to properly analyze the evidence or if the evidence is tampered with. False accusations can result in wrongful convictions, which can have severe consequences for the accused.

Bias: Forensic investigators may have preconceived notions or biases that can influence the way they analyze evidence. For example, investigators may be influenced by the social, cultural, or political climate surrounding the case. This can result in a skewed interpretation of the evidence, which can compromise the investigation.

Human Error: Forensic investigation is a complex process that involves many steps, and errors can occur at any stage. For example, evidence may be mishandled, lost, or mislabeled, or the analysis may be flawed. These errors can result in inaccurate results, which can compromise the investigation.

Legal and Ethical Issues: Forensic investigation involves legal and ethical issues that must be carefully navigated. For example, investigators must ensure that they have obtained the necessary permissions to collect and analyze evidence. They must also ensure that they are following proper procedures and protocols to avoid any legal or ethical violations.

In conclusion, forensic investigation is a complex and risky process that requires careful planning, attention to detail, and expertise. Investigators must be aware of the risks involved and take the necessary steps to mitigate them to ensure that the investigation is conducted with integrity and accuracy.

Explanation:

In 25 words or fewer, explain why it would be helpful to have access to
the organizational chart for the company where you work.

Answers

Answer:

Access to an organizational chart helps understand the company's structure, reporting relationships, and decision-making processes, leading to better communication and collaboration.

Explanation:

What is the cpu,storage size and ram size of mainframe,supercomputers,minicomputer and microcomputer

Answers

Mainframe:

CPU: 256 cores

Storage size/RAM size : 32 GB

Supercomputer:

CPU: Tens/hundreds of thousands of cores

Storage size/RAM size: 200-300 GB

Minicomputer:

CPU: 2 or more cores

Storage size/RAM size: 128,000 Bytes, or 0.000128 GB

Microcomputer:

CPU: 1 core

Storage size/RAM size: 512 Mb, or 0.512 GB

While using a datasheet to track shoe orders, Gustav wants to see a picture of the shoes and read details about the shoes' materials. Which steps should he follow?

A.) Double-click on the record in the Customer ID field, then double-click on the customer dialog box.
B.) Create a new field, select images of the shoes from the Internet, and embed images into OLE type.
C.) Create a new shoe identification field by clicking on "Click to Add," and type notes using "memo" type.
D.) Double-click on the record in the Attachment field, then double-click on the attachment in the dialog box.

Answers

Answer:

B.) Create a new field, select images of the shoes from the Internet, and embed images into OLE type.

To see a picture of the shoes and read details about the shoes' materials while using a datasheet to track shoe orders, Gustav should create a new field in the datasheet and embed images of the shoes into that field using the OLE (Object Linking and Embedding) type. This will allow him to view the images within the datasheet and access any details or information associated with them. Double-clicking on records in the Customer ID field, Attachment field, or using memo type notes will not provide the desired outcome.

Explanation:

________ determines which actions are allowed or not allowed by a user or system.

Answers

Answer:

access control

Explanation:

Access control defines allowable operations of subjects on objects: it defines what different subjects are allowed to do or defines what can be done to different objects

peoplecsrutgers

There are three emerging areas associated with technologies to monitor employees. Which of the following is one of those emerging areas?
Question 21 options:

How companies implement technology loss prevention programs.

How companies ban the use of social media.

How companies cope with employee misconduct.

How companies cope with BYOD.

Answers

Programs for preventing technology loss are a developing field related to technologies used to monitor employees. These programmes are intended to safeguard sensitive information and intellectual property.

What is technology for preventing data loss?

Users are prevented from sending sensitive or important information outside the company network by data loss prevention (DLP). The phrase refers to software tools that assist a network administrator in managing the data that users may send.

How can a firm be protected by a data loss prevention DLP strategy?

Data loss prevention (DLP) software keeps an eye on and guards against loss of network, endpoint, and cloud data. Reporting is a crucial component of data loss prevention since it demonstrates legal compliance and satisfies audit obligations.

To know more about Programs visit:-

https://brainly.com/question/10509036

#SPJ1

Imad is a manage working in. Rang Mobile he can access the new customers report at any place with he need it what Characteristic of information is. best applied in this scenario 1_Reliable 2_Timely 3_Accurate 4_Secure​

Answers

"Timely" is the quality of information that fits this situation the best. Imad requires access to the new customer report whenever and wherever he wants it because he is a manager.

What essential qualities exist?

an essential quality. A product feature for which testing or inspection is necessary prior to shipment to assure conformance with the technical requirements under which the approval was obtained and which, if not manufactured as approved, could have a direct negative influence on safety.

What essential elements make up information integrity?

Integrity safeguards the information's accuracy or correctness while it is being processed, stored, or in transit. It serves as a guarantee that the information is accurate and unaltered.

To know more about access visit:-

https://brainly.com/question/14286257

#SPJ1

A web designer finds out after the launch that the website created is not supported by some versions of Internet Explorer. Which phase could have corrected this issue? O O

A. wireframing

B. need testing design testing

C. Design testing

D. usability testing

E. page description diagrams ​

Answers

Answer:

The phase that could have corrected this issue is Design testing. During this phase, designers typically test the website's functionality and compatibility across multiple browsers and platforms to identify and fix any issues before launching the website.

Explanation:

14. What does it mean to unplug?
O A. To move to a country or town
that has much slower Internet access
B. To make sure that your devices
aren't always plugged in so the battery
lasts longer
O C. To take time away from phones,
computers, tablets, and other devices
O D. To reset your Internet by turning
the modem off and on again

Answers

I would say B for unplug

I got phished and logged into my bank account t what information did I give to the hacker

Answers

Answer:

You give your email to them that is why the hacker hacks you.

Explanation:

Using assembly
Read 1 byte. Write a program that prints:

It's a B

if the input is a B

It's NOT a A

if the input is not the letter B

helpful code
;nasm 2.13.02

section .data
message: db 'Same',10
messageLen: equ $-message

messageNOT: db 'NOT same',10
messageNOTLen: equ $-messageNOT

section .text
global _start

_start:

; compare if I have a 5
mov al,'X'
cmp al,'C'
je same

mov eax,4
mov ebx,1
mov ecx,messageNOT
mov edx,messageNOTLen
int 80h
jmp end
same:
mov eax,4
mov ebx,1
mov ecx,message
mov edx,messageLen
int 80h
end:
mov eax,1
mov ebx,0
int 80h;

Answers

Answer:

Here's an example program written in NASM x86 assembly that reads one byte of input and prints a message depending on whether the input is a B or not:

section .data

message_b: db "It's a B",10

message_not_b: db "It's NOT a B",10

section .bss

input_buffer: resb 1

section .text

global _start

_start:

   ; read one byte of input from stdin

   mov eax, 3

   mov ebx, 0

   mov ecx, input_buffer

   mov edx, 1

   int 0x80

   ; check if input is B

   cmp byte [input_buffer], 'B'

   jne not_b

   ; print "It's a B" message

   mov eax, 4

   mov ebx, 1

   mov ecx, message_b

   mov edx, 8

   int 0x80

   jmp end

not_b:

   ; print "It's NOT a B" message

   mov eax, 4

   mov ebx, 1

   mov ecx, message_not_b

   mov edx, 12

   int 0x80

end:

   ; exit program

   mov eax, 1

   xor ebx, ebx

   int 0x80

Explanation:

The program first declares two messages, one for when the input is a B and another for when it's not. It then reserves one byte of memory for the input buffer using the .bss section.

In the .text section, the program first reads one byte of input from stdin using the read system call. It then compares the input to the ASCII value of the letter B using the cmp instruction. If the input is not B, it jumps to the not_b label to print the "It's NOT a B" message. If the input is B, it continues to print the "It's a B" message.

The program uses the mov instruction to load the appropriate values into the registers required by the write system call. The message to be printed is stored in the ecx register, while the length of the message is stored in the edx register. The int 0x80 instruction is then used to invoke the write system call and print the message to stdout.

Finally, the program exits using the exit system call by loading the value 1 into the eax register and calling int 0x80.

Question 18 of 50
A value inventory is a self-assessment test that measures the importance of certain values in order to guide an individual
his/her career path.
True
False

Answers

Answer:

true trust

explanation trust

Answer is true not false

consider this list of numbers: 9 3 6 8 4 7. after three comparisons have been made the list is 3 6 9 8 4 7 . which algorithm is being applied

Answers

Answer: The algorithm being applied is "Insertion Sort".

Explanation:

Insertion sort works by iteratively inserting each element of the input list into its proper place in a growing sorted list. In each iteration, the algorithm selects the first unsorted element and compares it with each element in the sorted portion of the list until it finds its correct position. It then inserts the element into the sorted portion of the list and moves on to the next unsorted element.

In the given example, the first three elements of the list (9, 3, and 6) are compared and swapped to produce the partially sorted list 3 9 6 8 4 7. Then, the next unsorted element (6) is compared with the sorted elements (3 and 9) and inserted in its correct position between 3 and 9, resulting in the list 3 6 9 8 4 7.

Which practice indicates integrity? A. manipulating people for everyone’s benefit B. inflating product costs in accounting ledgers C. actively participating in team practices and team meetings D. indiscriminately providing company data to external parties

Answers

Answer:

The practice that indicates integrity is C. actively participating in team practices and team meetings.

Explanation:

Describe the basic internal operation of optical disc reader/written

Answers

Explanation:

An optical disc reader/writer is a device that is used to read or write data to an optical disc, such as a CD, DVD, or Blu-ray disc. The basic internal operation of an optical disc reader/writer can be described as follows:

Disc loading: The optical disc reader/writer has a tray or slot where the disc is loaded. When the disc is inserted, the tray or slot mechanism moves the disc into position and holds it in place.

Spinning: The disc is spun by a motor inside the optical disc reader/writer. The speed at which the disc spins varies depending on the type of disc and the location of the data being read or written.

Laser reading/writing: The optical disc reader/writer uses a laser to read or write data to the disc. The laser is focused on the disc's surface, and the reflection of the laser light is detected by a sensor. The sensor then translates the reflection into digital data that can be read or written to the disc.

Tracking: The laser is moved across the disc's surface by a tracking mechanism. This ensures that the laser stays in the correct position to read or write data to the disc.

Data processing: The digital data that is read or written to the disc is processed by a controller inside the optical disc reader/writer. The controller is responsible for interpreting the data and sending it to the computer or other device that the optical disc reader/writer is connected to.

Ejecting: When the disc is finished being read or written to, the tray or slot mechanism releases the disc, and it can be removed from the optical disc reader/writer.

leave a comment

Write a C++ program that displays the total running time of a given algorithm based on
different situations such as processor speed, input size, processor load, and software
environment (DOS and Windows).

Answers

Answer: Your welcome!

Explanation:

#include <iostream>

#include <cmath>

using namespace std;

int main()

{

 int processorSpeed; //in MHz

 int inputSize; //in Kb

 int processorLoad; //in %

 int softwareEnvironment; //1: DOS, 2: Windows

 int runningTime; //in ms

 

 cout << "Enter processor speed (MHz): ";

 cin >> processorSpeed;

 

 cout << "Enter input size (Kb): ";

 cin >> inputSize;

 

 cout << "Enter processor load (%): ";

 cin >> processorLoad;

 

 cout << "Enter software environment (1-DOS, 2-Windows): ";

 cin >> softwareEnvironment;

 

 if(softwareEnvironment == 1)

 {

   //DOS running time calculation

   runningTime = (inputSize / processorSpeed) + (processorLoad / 10);

 }

 else

 {

   //Windows running time calculation

   runningTime = (inputSize / (processorSpeed/2)) + (processorLoad / 10);

 }

 

 cout << "Total running time: " << runningTime << "ms" << endl;

 

 return 0;

}

Other Questions
Tommy Sweeney could easily be elected in the next mayoral electionis this sentence passive or action voice Under her cell phone plan, Sydney pays a flat cost of $35.50 per month and $5 per gigabyte. She wants to keep her bill under $50 per month. Write and solve an inequality which can be used to determine x, the number of gigabytes Sydney can use while staying within her budget. Consider a two-period endowment economy populated by identical households with preferences defined over consumption in period 1, C1 and consumption in period 2, C2, and described by the utility functionlnC1 +ElnC2where C1 denotes consumption in period 1, C2 denotes consumption in period 2, and E denotes the expected value operator. Each period, the economy receives an endowment of 10 units of food. Households start period 1 carrying no assets or debts from the past (B0 = 0). Financial markets are incomplete. There is a single internationally traded bond that pays the interest rate r = 0.a) Compute consumption, the trade balance, the current account, and national saving in period 1.b) Assume now that the endowment in period 1 continues to be 10, but that the economy is prone to severe natural disasters in period 2. Suppose that these negative events are very rare, but have catastrophic effects on the countrys output. Specifically, assume that with probability 0.01 the economy suffers an earthquake in period 2 that causes the endowment to drop by 90 percent with respect to period 1. With probability 0.99, the endowment in period 2 is 111/11. What is the expected endowment in period 2? How does it compare to that of period 1?c) What percent of period 1 endowment will the country export? Compare this answer to what happens under certainty and provide intuition.d) Suppose that the probability of the catastrophic event increases to 0.02, all other things equal. Compute the mean and standard deviation of the endowment in period 2. Is the change in probability mean preserving?e) Calculate the equilibrium levels of consumption and the trade balance in period 1. d) Science gives more evidence for creation than a belief in GodEvaluate this statement considering argumentsboth for and against. In your answer you should:Refer to Catholic teachingRefer to different Christian and non-religiousbeliefsReach a justified conclusion Researchers were able to observe changes in bacterial populations that resulted from mutations. How were the later generations of bacteria different from the original population?1.) They were 25 percent faster due to having more tails.2.)They lost the ability to reproduce.3.) They were 25 percent faster due to having fewer tails.4.) They required less food to grow and reproduce. 1. The graph shown is a graph of f'(x). If f(2)=5, use the graph to find f(8). A. 16.5C. 25.5D. 21.5E. 25 7. Which of the following is an element? a) Sugar b) Copper c) Salt d) Water -5/8 - -4/3 in simplest form FILL IN THE BLANK. A director chooses the ____________ frame when the characters in the story are restricted () in their movements, often due to outside forces, such as social or economic forces. Often used in horror, thriller, dramas, or anything not wishing to refer to the real. Typically features the exaggerated and stylized depth, the distorted light and shadow, and distorted shadow. In the _______ frame, the design elements call attention to themselves and may be more important than the characters. Dima has twice as many books as Ramiro. If dima gives 12 books to Ramiro, they will have the same number of books.How many books do they have in total Sanjay attempts a 49-yard field goal in a football game. For his attempt to be a success, the football needs to pass through the uprights and over the crossbar that is 10 feet above the ground.Sanjay kicks the ball from the ground with an initial velocity of 73 feet per second, at an angle of 34 with the horizontal.What is true of Sanjay's attempt?ResponsesThe kick is not successful. The ball is approximately 5 feet too low.The kick is not successful. The ball is approximately 8 feet too low.The kick is not successful. The ball is approximately 2 feet too lowThe kick is good! The football clears the crossbar by approximately 5 feet. Which of the following would you expect to see written as separated ions in an ionic equation?H2(g)H2O(l)H2S(g)HCl(aq) Find the length of the diagonals of rectangle WXYZ. WY = 14x + 10; XZ = 11x + 22 What fats are and where they are found . What are the three different types? Roberto will put a border around the edges of the platform how much border will he need if the area is 12 square units? PLEASE HELP QUICK 30 POINTSWhat is the relationship between the radian measure of an angle and the length of the arc intercepted by that angle on the unit circle? A NFL kicker misses 2 out of every 11 field goals. If he misses 8 field goals throughout the season, how many did he attempt Ron has an average of 83.5 on the first four mathematics tests this marking period. He needs an average of 85 to make the honor roll. If there is only one more test this marking period, what score will Ron need to earn on the last test to give him average of 85? Show your work and explain how you arrived at your answer. Use what you have learned about secured and unsecured loans to complete these sentences.A loan that is associated with a valuable asset that can be taken by the lender is .Ray needs to get a new set of tires for her car, so she uses her credit card. If she does not pay her bills, there is no asset that can be seized. This means her loan is .Jack agrees to take out a mortgage. If he fails to make his payments, the bank may repossess his house, so his loan is Answer the question below:Fill in the Box and give the frequency for A,B,C and D.