3. Explain the back-propagation algorithm, in detail, on a two-layer perceptron structure.

Answers

Answer 1

The back-propagation algorithm is a widely used method for training artificial neural networks, specifically multi-layer perceptrons (MLPs). It is an iterative algorithm that adjusts the weights and biases of the network based on the difference between the predicted output and the actual output, with the goal of minimizing the error.

Detailed explanation of the back-propagation algorithm on a two-layer perceptron structure is:

1.

Forward Propagation:

Initialize the weights and biases of the network randomly or using some predetermined values.Take an input vector and propagate it forward through the network.Compute the weighted sum of the inputs for each neuron in the hidden layer and pass it through an activation function to obtain the hidden layer activations.Compute the weighted sum of the hidden layer activations for each neuron in the output layer and pass it through an activation function to obtain the output layer activations.

2.

Error Calculation:

Calculate the error between the predicted output and the actual output using a suitable error metric, such as mean squared error (MSE).The error quantifies how well the network is performing and provides a measure of the discrepancy between the predicted and actual outputs.

3.

Backward Propagation:

Compute the gradient of the error with respect to the weights and biases of the output layer.Update the weights and biases of the output layer by taking a step proportional to the negative gradient, thereby minimizing the error.

4.

Update Hidden Layer Weights:

Compute the gradient of the error with respect to the weights and biases of the hidden layer.Update the weights and biases of the hidden layer using a similar approach as in the output layer.

5.

Repeat Steps 1-4:

Repeat steps 1 to 4 for a specified number of iterations or until the desired level of convergence is achieved.During each iteration, the forward propagation calculates the output of the network, the error is calculated, and the weights and biases are updated using the backward propagation step.

6.

Termination:

The algorithm terminates when the network has learned the underlying patterns in the training data sufficiently well, or when it has reached the specified number of iterations.

By iteratively adjusting the weights and biases through forward and backward propagation, the back-propagation algorithm enables the network to learn from its mistakes and improve its performance.

This process of iteratively updating the weights and biases based on the error gradients is what allows the network to converge towards a set of weights that minimize the overall error.

To learn more about perceptron: https://brainly.com/question/29669975

#SPJ11


Related Questions

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message whille it is in transit. What goal of cryptography is Gary attempting to achieve? A. Confidentiality B. Integrity C. Authentication D. Non-repudiation

Answers

The goal of cryptography that Gary is attempting to achieve is integrity.

So, the correct answer is B.

Integrity ensures that the message remains unaltered and authentic during transit. Gary wants to make sure that nobody tampers with the message while it is being transmitted.

Cryptography helps in achieving this by using various techniques such as digital signatures, message authentication codes, and hash functions. These techniques ensure that the message remains intact and any attempt to modify it is detected.

Cryptography also provides other goals such as confidentiality, authentication, and non-repudiation, but in this scenario, the primary goal is to maintain the integrity of the message.

Hence, the answer of the question is B.

Learn more about cryptography at https://brainly.com/question/31732516

#SPJ11

What is meant by the term internal hardware??
explain it in your own words ,do not use goo.gle thank you!

Answers

Answer:

Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners. The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals

Answer:

Internal hardware is the hardware that is inside the computer. For example, CPU, RAM, ROM BIOS, Motherboard, Graphics card.

Computer 1 on network a, with ip address of 10. 1. 1. 8, wants to send a packet to computer 2, with ip address of 172. 16. 1. 64. If the ttl value was set to 64 at the beginning, what is the value of the ttl once it reaches its destination?.

Answers

Computer 1 on network a, with IP address of 10. 1. 1. 8, wants to send a packet to computer 2, with IP address of 172. 16. 1. 64. If the ttl value was set to 64 at the beginning. The value of the TTL once it reaches its destination is 65.

What is IP address?

IP address is defined as a special string of characters used to identify each computer communicating across a network utilizing the Internet Protocol.

1. Start by removing the plastic jacket from the cable's end, roughly 2 inches long. At this point, exercise extreme caution to avoid damaging the internal wiring. If you do, your cable's qualities can change, or worse, it might become worthless. One more time, look for nicks or cuts in the wires. Whack the entire end off if there are any. Thus, the TTL's value will be 62 + 3 = 65 after it reaches its destination.  

Thus, computer 1 on network a, with IP address of 10. 1. 1. 8, wants to send a packet to computer 2, with IP address of 172. 16. 1. 64. If the ttl value was set to 64 at the beginning. The value of the TTL once it reaches its destination is 65.

To learn more about IP address, refer to the link below:

https://brainly.com/question/16011753

#SPJ1

all of the following are critically important components to obtain good seo results except for _____________.

Answers

All of the following are critically important components to obtain good SEO results except for poor content.

What is SEO? SEO stands for "Search Engine Optimization," which is the process of optimizing a website for search engines. The purpose of this method is to increase the visibility of the website in search engine results pages (SERP). It aids in attracting organic (unpaid) traffic to your website. It's critical to remember that SEO isn't just about search engines. It's also about enhancing your website's user experience, as well as the perception of search engines.  

Poor content is not a critically important component to obtain good SEO results. It is instead an essential factor that can adversely affect your SEO performance. Creating high-quality, engaging, and informative content is critical for successful SEO. Poor quality content can lead to a higher bounce rate, low engagement rate, and a poor user experience, all of which can negatively impact your website's SEO.

To know more about SEO visit:

brainly.com/question/31657595

#SPJ11

which of the components of the​ five-component model is easier to change compared to​ software?

Answers

The five components of the model—data, method, hardware, software, and people—are more easily modifiable than software.

Which information system element is the most crucial?

The last, and arguably most crucial, element of information systems is the human element: the individuals required to operate the system and the procedures they adhere to in order for the knowledge contained in the enormous databases and data warehouses to be transformed into learning that can interpret what has occurred in the past.

Which five elements make up an information system?

Hardware, software, databases, networks, and people make up the core components of an information system. To execute input, process, output, feedback, and control, these five elements must work together.

To know more about software  visit:-

https://brainly.com/question/1022352

#SPJ4

How many bits of a Class A IP address are used for host information? 8 bits 32 bits 24 bits 16 bits. 24.

Answers

In a Class A IP address, the first octet is used to identify the network, and the remaining three octets are used to identify hosts on that network. Therefore, the answer is 24 bits.

How to calculate no. of bits of a Class A IP address?

Since each octet is 8 bits, the number of bits used for host information in a Class A IP address is:

32 bits (total number of bits in an IPv4 address) - 8 bits (used for network identification in Class A) = 24 bits.

Therefore, the answer is 24 bits.

To learn more about IP address, visit: https://brainly.com/question/29556849

#SPJ4

ron is the it director at a medium-sized company. he frequently gets requests from employees who want to select customized mobile devices. he decides to allow them to purchase their own devices. which type of policy should ron implement to include the requirements and security controls for this arrangement?

Answers

Bring Your Own Device is the type of policy that will be used to implement the conditions and security measures for this arrangement.

What is BYOD and why is BYOD important?Bring your own technology (BYOD) is the term used to describe the practice of employees connecting to their organizations' networks using personal devices to access work-related systems and possibly private or sensitive information. Mobile phones, desktop computers, tablet computers, and USB drives are examples of personal electronics.Organizational leaders should pay close attention to BYOD security since employees are likely to bring their own devices to work, whether or not IT has approved of it. BYOD options frequently boost staff morale and productivity. Personal device access to a company's network, however, can pose significant security risks if IT ignores the issue.Bring Your Own Device is the type of policy that will be used to implement the conditions and security measures for this arrangement.

Hence, Bring Your Own Device is the type of policy that will be used to implement the conditions and security measures for this arrangement.

To learn about more about Bring Your Own Device refer to:

https://brainly.com/question/29556030

#SPJ4

Declare an array of int values westboundHollandTunnelTraffic that can store the number of vehicles going westbound through the Holland Tunnel - on a particular hour (numbered 0 through 23) - on a particular day (numbered 0 through 6) - on a particular week (numbered 0 through 51) - over the last ten years (numbered 0 through 9). The innermost dimension should be years, with the next being weeks, and so on.

Answers

Answer:

Following are the declaration of the array:

int westboundHollandTunnelTraffic [10] [52] [7] [24];  //defining an integer array  that holds days, week, hour, and year value

Explanation:

In the above-given code, an array that's name is " westboundHollandTunnelTraffic " is declared and the type of the storing elements in the array is an integer.

In this array, it first stores the year's value, and in second, it stores week values, in third, it stores day value, and the last it stores hours value.    

Draw an inheritance diagram about motor vehicles that will
contain classes named Vehicle, Car, and Motorcycle.

Answers

In this diagram, we have a base class called "Motor Vehicle" which represents the common attributes shared by all motor vehicles, such as make, model, and year.

How to explain the information

The diagram shows three derived classes: Car, Motorcycle, and Truck, which inherit from the Motor Vehicle class.

The Car class adds an additional attribute called "numDoors" to represent the number of doors in a car.

The Motorcycle class adds an additional attribute called "engineSize" to represent the engine size of the motorcycle.

The Truck class adds an additional attribute called "cargoCapacity" to represent the maximum cargo capacity of the truck.

This inheritance diagram illustrates a basic hierarchy of motor vehicles, with each derived class inheriting the attributes and behaviors of the Motor Vehicle class while adding its specific attributes.

Learn more about vehicle on

https://brainly.com/question/30094730

#SPJ4

Draw an inheritance diagram about motor vehicles that willcontain classes named Vehicle, Car, and Motorcycle.

Explain how the skills you develop in learning how to make effective use of your professors will directly carry over in the computer science/software engineering world.

Answers

The skills developed in learning how to effectively utilize professors directly carry over in the computer science/software engineering world.

Explanation:
1. Effective communication: When interacting with professors, students learn how to communicate their ideas, ask questions, and seek clarification. This skill is crucial in the computer science/software engineering field, as professionals often need to collaborate with team members, explain complex concepts to non-technical stakeholders, and seek assistance from colleagues.
2. Problem-solving: Professors challenge students with difficult assignments and encourage them to think critically. This fosters problem-solving skills, which are vital in computer science/software engineering. Professionals in this field are often faced with complex technical problems that require logical thinking and creative solutions.
3. Time management: Students need to balance their coursework and deadlines when working with professors. This teaches them effective time management skills, which are essential in the fast-paced world of computer science/software engineering. Professionals must juggle multiple tasks, prioritize projects, and meet deadlines to ensure the successful completion of projects.

4. Research skills: Professors often encourage students to conduct research to deepen their understanding of concepts. This cultivates research skills, which are invaluable in the computer science/software engineering field. Professionals constantly need to stay updated with new technologies, frameworks, and methodologies to remain competitive and provide innovative solutions.
Overall, the skills acquired in learning how to effectively utilize professors, such as effective communication, problem-solving, time management, and research skills, directly transfer to the computer science/software engineering world, aiding professionals in their success and growth.

To know more about computer science refer to:

https://brainly.com/question/30186474

#SPJ11

What is the best gaming name you can come up with?

Answers

THE GAME that’s all I named it

If you ask a hoophobic if they like hoos, and they say yes, but they're not lying, but they're hoophobic, who's lying

Answers

No one is lying. Hoophobia is an irrational fear of something, which means that even if someone with hoophobia likes hoos, they may still experience fear and anxiety when faced with them.

What is Hoophobia?
Hoophobia
is the fear of feeling or demonstrating a strong emotion, especially one that is considered socially unacceptable. It is an anxiety disorder characterized by an extreme, irrational fear of expressing emotions, especially those associated with vulnerability, such as sadness, joy, or anger. People with hoophobia may have difficulty expressing themselves, communicating with others, and forming meaningful relationships. They may also struggle to trust others and may experience social isolation, depression, and anxiety. Symptoms of hoophobia can include avoiding social situations, avoiding eye contact, difficulty expressing oneself, feeling shame or guilt when expressing emotions, and avoiding talking about emotions. Treatment options include cognitive-behavioral therapy, psychotherapy, and medications.

To learn more about Hoophobia
https://brainly.com/question/29843477
#SPJ1

Writing on social media has helped users be:

A. more formal.

B. slower.

C. more concise.

D. wordy.​

Answers

Answer:

C

Explanation:

more concise

Why would you clear a computer’s cache, cookies, and history?

to ensure that your computer’s settings and security certificates are up to date
to ensure that your computer’s settings and security certificates are up to date

to make sure that nothing is preventing your computer from accessing the internet
to make sure that nothing is preventing your computer from accessing the internet

to prevent intrusive ads from delivering malware to your computer
to prevent intrusive ads from delivering malware to your computer

to ensure that they are not clashing with the web page or slowing your computer down

Answers

Answer:

prevents you from using old forms. protects your personal information. helps our applications run better on your computer.

q9. big o notations and runtime of algorithms: suppose you have the option of running three algorithms, alg1, alg2, alg3, with running times o(1000n ln n), o(n3), 300n2, respectively. which algorithm would you select (i.e., which one is the fastest according to big-oh analysis) to run on input instances with arbitrarily large sizes n?

Answers

Big O predicts how an algorithm's performance will change as the input size increases and uses this information to define the runtime necessary to carry out an algorithm. The runtime of your algorithm is not, however, indicated. Using time and space complexity, Big O notation evaluates your algorithm's effectiveness and performance.

What is Big O?A representation of an algorithm's worst-case complexity is Big O, commonly referred to as Big O notation. The complexity of an algorithm is described using algebraic language.Big O predicts how an algorithm's performance will change as the input size increases and uses this information to define the runtime necessary to carry out an algorithm. The runtime of your algorithm is not, however, indicated.Using time and space complexity, Big O notation evaluates your algorithm's effectiveness and performance.The hardware, OS, and CPU you utilise are a significant underlying component determining the effectiveness and performance of your software.When examining an algorithm's performance, however, you don't take this into account. What matters is the time and space complexity as a function of the amount of the input, not the other way around.

To Learn more About Big O Refer To:

https://brainly.com/question/29647434

#SPJ4

Big O uses this information to define the runtime required to execute an algorithm and predicts how an algorithm's performance will change as the input size grows.

However, your algorithm's runtime is not shown. Big O notation evaluates the efficiency and performance of your algorithm using time and space complexity.

Big O: What is it?

Big O, or Big O notation, is a representation of an algorithm's worst-case complexity. An algebraic language is used to describe an algorithm's complexity. Big O uses this information to define the runtime required to execute an algorithm and predicts how an algorithm's performance will change as the input size grows. However, your algorithm's runtime is not shown.

Big O notation evaluates the efficiency and performance of your algorithm using time and space complexity. The effectiveness and performance of your software are heavily influenced by the hardware, operating system, and CPU you use.

However, this is not taken into account when evaluating an algorithm's performance. The time and space complexity as a function of the quantity of input is what matters, not the other way around.

Learn more about Big O :

brainly.com/question/15691129

#SPJ4

Why must game development team prioritize which bugs must be fixed and which bugs are minor and can remain in the game?

Answers

Answer:

Game development teams prioritize which bugs must be fixed and which bugs are minor and can remain in the game because of several reasons:

Limited Resources: Game development teams have limited resources, including time, budget, and staff. Prioritizing which bugs to fix helps them to allocate their resources more effectively.

Severity of Bugs: Some bugs can cause the game to crash or become unplayable, while others are minor and do not affect gameplay. Prioritizing the most severe bugs helps to ensure that players can enjoy the game without major issues.

Impact on User Experience: Bugs that affect the core gameplay mechanics or prevent players from progressing in the game can have a significant impact on the user experience. Prioritizing these bugs helps to ensure that players can enjoy the game as intended.

Development Cycle: Game development teams often work on tight schedules and deadlines. Prioritizing which bugs to fix helps to ensure that the most critical issues are resolved before the game is released, while less critical issues can be addressed in future updates or patches.

Overall, prioritizing which bugs to fix is an essential part of game development, as it helps to ensure that the game is as enjoyable and functional as possible, given the resources and time available to the development team.

what does setting interrogation succeeded voice call forwarding?

Answers

Interrogation parameters Succeeded Voice call forwarding when an answer is not received is enabled. On each call. Disabled.

If forwarding is displayed as being enabled (it will say "Enabled" and display the number it is configured to forward to), you can disable it by returning to the keypad and inputting ##21# and touching. Voice calling is the capacity to reach out to and speak on the phone in real time with other people. When the caller and the callee—or both—are using a phone line—either a mobile device or a landline phone—then the call is being made in the classic sense. An entirely software-based call, in-app voice calling involves the transmission of audio and/or video data between the caller and the callee over the Internet. Voice calls come in a variety of forms, such as individual calls, talk group calls, phone calls, and gateway calls. Watch the video below and read the Voice Calls lesson that it is accompanied with if you want to understand more about these calls and how they function.

Learn more about Voice call here

https://brainly.com/question/14309663

#SPJ4

Describe how a cell’s content and format attributes are related.

Answers

Answer: They are independent and not related.

Explanation: Changing the format affects the content. Which of the following is NOT a way to change the column width in Excel?

a cell's content and format are similar. a cell's content and format are unrelated. the content of a cell is influenced by changing its format. the format of the cell is also affected when the content of the cell is changed.

hope this helps

The algorithm below is used to find the largest element in a list of numbers.
By modifying one of the lines in the program it is possible to make the algorithm find the SMALLEST element. Which line would need to be modified and how?

The algorithm below is used to find the largest element in a list of numbers.By modifying one of the

Answers

The line that can be modified in the algorithm to return the smallest of the list is line 04

From the question, we understand that:

The algorithm returns the largest of all elements in a list

The above action is executed on line 04

To change the function of the algorithm to return the smallest, line 04 must be modified as follows:

IF (num < target)

Hence, the line that can be modified in the algorithm to return the smallest of the list is line 04

Read more about algorithms at:

https://brainly.com/question/24793921

How to save a file for the first time?​

Answers

Answer:

i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it

If a student needs work on phonics and decoding, what kind of informal diagnostic assessment would provide the most useful information on how to help this student with these skills?.

Answers

The  kind of informal diagnostic assessment would provide the most useful information on how to help this student with these skills is option b. a word-reading survey to show which sound-symbol correspondences the student knows and which ones still need practice.

What is a word reading survey?

An informal assessment instrument called the Phonics and Word Reading Survey (PWRS) can be used to determine which phonics correspondences and patterns a pupil has mastered and which ones still need to be taught.

Note that Teachers try not examine student performances based on grades or other metrics when using the informal evaluation approach, which is an intuitive assessment method. Instead, they concentrate on watching how pupils perform and develop over the course of their learning period.

Learn more about informal diagnostic assessment from

https://brainly.com/question/22563714
#SPJ1

See full question below

true or false

If a student needs work on phonics and decoding, what kind of informal diagnostic assessment would provide the most useful information on how to help this student with these skills?

a. a spelling inventory to show which features of English spelling the student has mastered

b. a word-reading survey to show which sound-symbol correspondences the student knows and which ones still need practice

c. a vocabulary test to show student understanding of word meanings in context

d. a test of reading comprehension to show how well the student can answer questions about a grade-level text

What type of data is the result of each of the following lines of code?
str(2.34)

int('2')

float(2)

Answers

Answer:

snag

Explanation:

What is the name of the item that supplies the exact or near exact voltage at the required wattage to all of the circuitry inside your computer?

Answers

Answer:

A voltage regulator.

Explanation:

A voltage regulator, controls the output of an alternating current or a direct current (depending on the design), allowing the exact amount of voltage or wattage to be supplied to the computer hardware. This device sometimes uses a simple feed-forward design or may include negative feedback. The two major types of voltage regulator are based on either the electromechanical or electronic components.

The electronic types were based on the arrangement of resistor in series with a diode or series of diodes, and the electromechanical types are based on coiling the sensing wire to make an electromagnet.

My Macbook computer charger is burned from the side od the cord. -_- Great way to start school. Anything i should do?

Answers

Hello :D

i would recommend you to get your macbook checked by a technician. Otherwise, buy a new charger if you are certain if no damage to port

Answer:

Oh no!! Take it to an Apple store but before you do that call Apple support, tell them that your house could've caught fire because of the burnout. Hopefully, they can mail you a brand new computer!

A computer would do a better job than a human at solving lengthy, complex math problems. True False

Answers

Answer:

I would say true

Explanation:

Humans, by contrast, can master many things, from tying our shoes to cooking an omelet to solving complex math equations. The best AI hardly comes close to the incredible creativity and design of any human, and it’s an open question whether AI can ever become what its prophets claim. Second, when we make AI, we are basically copying our Creator.

Answer:

Its true and give the man brainlyest! or me. that would be nice too!

Explanation:

Need answer ASAP

In which phrase does software coding and testing happen in the spiral model?

The spiral model does not have a separate testing phase. Both software coding and testing occurs during the _____ phase.

Answers

both software coding and testing occurs during Engineering phase

A chip is a file installed on a customer's device or web browser to track personal preferences or browsing activity.
A) True
B) False

Answers

False because I did this question before

Which is an example of an input device?

A. Headphones

B. Monitor

C. Mouse

D. Printer

Answers

Answer:

Explanation:

Mouse is an example of input device

Answer:

C.) Mouse

Explanation:

This is because, for mice to work, they transmit a signal through Bluetooth, a USB drive, or a wire which is also usually USB to control the cursor. The rest of the answers are output devices.

Three of these simple machines are similar to one another. Choose the one that does not belong with this group. pulley, wheel and axle, lever, wedge.​

Three of these simple machines are similar to one another. Choose the one that does not belong with this

Answers

Answer:

wedge

Explanation:

the rest all move by pulling while the wedge needs to be hit

When should a user consider restoring the operating system.

Answers

A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.

What is an operating system?

This is known to be a software that aids a computer's basic functions, such as working on tasks and others.

Note that A user can consider restoring the operating system if the programs or apps do not start properly or when they are hanging/freezing.

Learn more about  operating system from

https://brainly.com/question/22811693

#SPJ1

Other Questions
Exercise 1 Fill in the blank with the correct personal pronoun. Underline the antecedent for each pronoun. In the spring, the robin was busy building ________________ nest. suppose you deposit $2,500 today in a savings account at 3.5% interest compounded annually. assuming no withdrawal, how much would you have at the end of 10 years? 11. Explain why 7y 4y8 + 6y3)2 + 4 is not a polynomial. Please help me im fr struggling rn... a container holds 0.478 m3 of oxygen at an absolute pressure of 4.13 atm. a valve is opened, allowing the gas to drive a piston, increasing the volume of the gas until the pressure drops to 1.00 atm. if the temperature remains constant, what new volume does the gas occupy? Use absolute value to determine the magnitude of each quantity, and then complete each statement. a. A porpoise dove into the water and traveled 16 feet below the surface. The porpoise is feet from the surface of the water. b. Chelsea's bank account shows a withdrawal for the payment of her electric bill as $250. Chelsea paid the electric company dollars. c. The temperature -54 degrees Fahrenheit is degrees below zero degrees Fahrenheit. d. Adelphi is 34.3 miles east of Sterling. The distance between Adelphi and Sterling is what's the missing angles i said 167 and 16 and 56 ONLY ANSWER THIS IF YOU ARE FLUENT IN FRENCH OUI NON Inversion J' ai Je n'ai pas ai - je ? tu as tu n'as pas as - tu ? il a il n'a pas a - t - il ?elle a elle n'a pas a - t - elle ? nous avons nous n'avons pas avons - nous ?vous avez vous n'avez pas avez - vous ?ils ont ils n'ont pas ont - ils ?elles ont elles n'ont pas ont - elles ? Exercice : Compltez avec le verbe avoir1. J' __ un chapeau que je mets tous les jours.2. Tu n' ___pas de livre pour rviser.3. Est-ce qu'il __ un professeur particulier?4. ____ -t-elle entendu ce que je viens de dire?5. Nous n' ____ pas d'ailes mais rvons de voler.6. _____ -vous retrouv vos cls?7. Ils _____ un stylo par personne.8. Elle n' _____ pas de serviette, il faut lui en prter.9. _____ -vous deux mains et deux pieds ?10. Est-ce que la petite fille ______la force de tenir ce chien ? Expenditures for major additions, improvements and flight equipment modifications are capitalized when such costs are determined to extend the useful life of the asset or are part of the cost of acquiring the asset. Expenditures for equipment overhaul costs of engines or airframes prior to their operational use are capitalized as part of the cost of such assets as they are costs required to ready the asset for its intended use. Maintenance and repairs costs are charged to expense as incurred.Assume that FedEx made extensive repairs on an existing building and added a new wing. The building is a garage and repair facility for delivery trucks that serve the Denver area. The existing building originally cost $720,000, and by the end of 2010 (10 years), it was half depreciated on the basis of a 20-year estimated useful life and no residual value. Assume straight-line depreciation was used. During 2011, the following expenditures related to the building were made: a. Ordinary repairs and maintenance expenditures for the year, $7,000 cash. b. Extensive and major repairs to the roof of the building, $122,000 cash. These repairs were completed on December 31, 2011. c. The new wing was completed on December 31, 2011, at a cash cost of $230,000. Required:Apply the policies of FedEx. Enter the value of : If it is 11:45 a.m., what will the time be 3 hours and 15 minutes later?4:15 p.m.3:00 p.m.3:15 a.m.2:45 p.m. What are utopian beliefs? 6. Which organism(s) is/are NOT plant-like protists? (means they areanimal-like or fungi-like.) Select all that apply.6. Qu organismo(s) NO es(n) protista(s) vegetal(es)? Seleccione todas lasque correspondan.1 Algae Algas2 Amoeba Ameba3 Slime mold Moho de fango4 Paramecium paramecio5 Kelp (sea weed) Kelp (algas marinas) Which of the following is an element of natural disaster and human induced environmental problems?The internetHealth, food, stressTaxationCompetitors and supply chainLifestyle changes Read the excerpt from the Publius.In framing a government which is to be administered by men over men, the great difficulty lies in this: you must first enable the government to control the governed; and in the next place oblige it to control itself. PubliusHow would Federalists most likely respond to this?They would agree but doubt the Constitution could make that happen.They would doubt that any central government could meet these goals.They would argue that the government does not need to control itself.They would agree and be confident that the Constitution meets those goals. how were the concepts of liberalism and nationalism related in the 1830s Which of the following is a characteristic seen in prophase I that does not occur in prophase II?A) Chromosomes move to the middle of the cell.B) Spindle formation occurs.C) Chromosomes have been duplicated.D) Crossing over occurs. evaluate to 212 base 3 - 121 base 3 + 222 base 3 Porfa aydenme a resolver lo de la ficha, plis. 7. What is the DEPENDENT CLAUSE in the following sentence: When leaders 1 pointattempt to navigate the slippery slope of fairness, they will find themselvesarbiter of public opinion and hostage to the politically correct.when leaders attempt to navigate the slippery slope of fairnessthey will find themselves arbiter of public opinion and hostage to the politicallycorrect.none of the above