Consider the following code fragment in C++: int *p; *p = 5; What happens as a result of the above code?
Question 13 options:
A dangling pointer is being deferenced, which could cause the program to crash
Automatic garbage collection occurs
Garbage is created that can never be deallocated
The above code will not compile

Answers

Answer 1

Consider the following code fragment in C++: int *p; *p = 5; The code fragment mentioned above results in a dangling pointer being dereferenced, which could cause the program to crash.

What is a dangling pointer?

Dangling pointers are those pointers that refer to a memory location that has been freed or deleted. When a memory area is deallocated, the pointers pointing to that area become invalid, which can cause the program to crash. It's also referred to as a pointer that doesn't point to a valid object.

Dangling pointers arise in C++ when an object is deleted, but some pointer variables still refer to the memory location of the deleted object. This is a significant issue because attempting to use the pointer variable will cause the program to crash.

Learn more about pointers here:

https://brainly.com/question/30460618

#SPJ11


Related Questions

10.1 lab: pet information (derived classes) the base class pet has attributes name and age. the derived class dog inherits attributes from the base class pet class and includes a breed attribute. complete the program to:

Answers

This code is a specimen of class methods. Class methods are methods bound to a class and not the object of the class. The code is given below.

What is the code described above?

The program in Python, where comments are used to explain each line is as follows:

#This creates the pet class

class Pet:

  #This creates an instance of the pet class

  def __init__(self):

      #These initialize the name and the age of the pet

      self.name = ''

      self.age = 0

   

  #This creates the print_info method

  def print_info(self):

      #These print the pet information; name and age

      print('Pet Information:')

      print('   Name:', self.name)

      print('   Age:', self.age)

#This creates the dog class

class Dog(Pet):

  #This creates an instance of the dog class

  def __init__(self):

      #This initializes the breed of the dog

      Pet.__init__(self)

      self.breed = ''

#This defines the main method

def main():

  #This creates a pet object

  my_pet = Pet()

  #This creates a dog object

  my_dog = Dog()

  #This gets input for the pet name

  pet_name = input()

  #This gets input for the pet age

  pet_age = int(input())

  #This gets input for the dog name

  dog_name = input()

  #This gets input for the dog age

  dog_age = int(input())

  #This gets input for the dog breed

  dog_breed = input()

  #This sets the pet name

  my_pet.name = pet_name

  #This sets the pet age

  my_pet.age = pet_age

  #This calls the print_info method

  my_pet.print_info()

  #This sets the dog name

  my_dog.name = dog_name

  #This sets the dog age

  my_dog.age = dog_age

  #This sets the dog breed

  my_dog.breed = dog_breed

  #This calls the print_info method

  my_dog.print_info()

  #This prints the dog breed

  print('   Breed:', my_dog.breed)

#This calls the main method

main()

Learn more about class methods:
https://brainly.com/question/15230312
#SPJ1

Full Question:

The base class Pet has attributes name and age. The derived class Dog inherits attributes from the base class Pet class and includes a breed attribute. Complete the program to: Create a generic pet, and print the pet's information using print_info(). Create a Dog pet, use print_info() to print the dog's information, and add a statement to print the dog's breed attribute.

the user needs to retrieve a list of medicare patients discharged on may 1. the query is written in plain english. this type of query is known as

Answers

The type of query written in plain English to retrieve a list of Medicare patients discharged on May 1 is called a natural language query.

The type of query described is called a natural language query. It is a type of search query that is written in plain English or other natural language, rather than using a programming language or formal query syntax. Natural language queries are designed to be easier for users to understand and use, as they can be expressed in a way that more closely resembles how people think and communicate.

Learn more about Medicare here https://brainly.com/question/11224262

#SPJ11

A RISC processor has 8 global registers and 10 register windows. Each window has 4 input registers, 8 local and 4 output. How many total registers are in this CPU

Answers

There are a total of 168 registers in this RISC processor.

To find the total number of registers in a RISC processor with 8 global registers and 10 register windows, where each window has 4 input registers, 8 local registers, and 4 output registers, we need to calculate the number of registers in each category and add them up.

Step 1: Count global registers
There are 8 global registers.

Step 2: Count registers in register windows
Each register window has 4 input, 8 local, and 4 output registers.
Total registers per window = 4 input + 8 local + 4 output = 16 registers per window.

Step 3: Calculate total registers in all register windows
There are 10 register windows.
Total registers in all windows = 10 windows × 16 registers per window = 160 registers.

Step 4: Calculate total registers in the CPU
Total registers in the CPU = global registers + registers in all windows
Total registers = 8 + 160 = 168 registers.

To learn more about RISC processor, visit:

https://brainly.com/question/28393992

#SPJ11

What an RRD in computer?

Answers

Answer: RRDtool (round-robin database tool) aims to handle time series data such as network bandwidth, temperatures or CPU load. The data is stored in a circular buffer based database, thus the system storage footprint remains constant over time.

Explanation:

A candidate key is group of answer choices a. an attribute b. a binary relationship c. a collection of one or more tuples d. a non-empty set of attributes

Answers

A candidate key refers to a non-empty set of attributes that uniquely identify tuples (rows) in a database table.

It is one of the important concepts in the relational database model for ensuring data integrity and avoiding redundancy.

In a relational database, a candidate key serves as an identifier for each record within a table. It consists of a single attribute or a set of attributes that can uniquely identify a tuple. For instance, in a table of students, a student ID attribute might be a candidate key because it is unique to each student. Multiple candidate keys can exist within a single table. From these candidate keys, one is typically selected as the primary key for the table, while others remain as alternate keys. Understanding these keys and their role in database design is crucial to effectively manage data and ensure its integrity.

Learn more about candidate keys here:

https://brainly.com/question/28667425

#SPJ11

How many bit make a byte .​

Answers

Answer:

It is easy .8 bits.You have to note this

Answer: 8

1 byte = 8 bit

Which line of code converts 3 to 3.0?

int(3)

type(3)

float(3)

single(3)

Answers

Answer:

float

Explanation:

You want to use a theme for your presentation. When can you apply the theme?

Answers

Answer:

Slides: slide > change theme
PowerPoint: Design > themes

if it is another program, tell me which one it is

Activity Compare and contrast the features of the four computer career fields. Write a paragraph on each and specify how the four career options differ from each other, and explain how they are similar to each other. For your research, you can browse through the Bureau of Labor Statistics ​

Answers

Answer:

Socratic app it will be over in

What is the definition of filtering data?

O delete data that does not fit criteria from worksheet

O organize data that criteria

O hide data that does not fit criteria from display

O alphabetize data based on criteria

Answers

Answer:

C

Explanation:

Answer:

C. hide data that does not fit criteria from display

Explanation:

Have a good day:))

how should a security analyst review system generated events for signs of intrusion or other problems on the network?

Answers

A software program called an intrusion detection system (IDS) automates the intrusion detection procedure. Software that combines all the features of an intrusion detection system with the ability to try to thwart potential events is known as an intrusion prevention system (IPS).

What security analyst review system generated events?

Through the client-side injection of malicious scripts, XSS vulnerabilities give attackers the ability to manipulate user interactions with web applications, plan impersonations, and/or launch phishing campaigns.

Therefore, A network intrusion detection system (NIDS) is installed at one or more strategic locations so that it can keep track of all incoming and outgoing traffic between all networked devices.

Learn more about security here:

https://brainly.com/question/16354463

#SPJ1

Help please

What is an ordered pair?

1. a type of font in Microsoft Word

2. the end of the x-axis on a coordinate grid

3. two numbers that tell the location of a point on a coordinate grid

4. a type of table located in the Table drop-down menu

Answers

Answer:

two numbers that tell the location of a point on a coordinate grid

Explanation:

Answer:

Two numbers that tell the location of a point on a coordinate grid.

Explanation:

An ordered pair would look like this

(0, 4) or (7, 2)

the first number would be on the x-axis and then the second would be on the y-axis

What finger should be on the K key?
1. Pinky
2. Index
3. Middle
4. Ring

Answers

Answer:

The answer would be the middle

Explanation:

Hope this helps

Answer:

index has wonrg hahahahahh

Explanation:

Correct formula to reference cell a1 from alpha worksheet.

Answers

what are the application area of the computer?explain in brief.​

Answers

Answer:

In short, every corner of the world

Explanation: Take a look at the world around you, every job sector atleast owns a computer system for one work or the other. Computers can be found in military, hospitals, schools and universities, banks and every sector around you

one Q what will be the answer?

one Q what will be the answer?

Answers

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE

Create a letter of at least 250 words addressed to your newspaper editor that describes your storage options, and give at least three reasons why your option is the best choice.

Answers

Answer:

Following are the letter to this question:

Explanation:

Dear Raju:

For what journal is produced, I was composing to analyze the data collection possibilities. First of all, I should recognize how many documents you ’re expected to store: images, text files, news articles, and other records, even though going to weigh up the document is quite crucial to analyze that the best way to store this documents.  

For hardware depositors, people will save the documents through memory chips, because this is a network interface with a huge variety of subject areas. In this single and the small device are use the massive quantities of data, that can be protected and many memory locations can be published and authored at the very same procedure.

And if you'd like to view the files previous with releases, its cloud computing provides storage solutions that can be extended to the length for just a little money. But you'll have to keep in mind that even strong internet access is often required. Its information would also have to be stored digitally and managed to make readable by the computer. Its objective of all these alternatives would be to make life simple and efficient to store and manage information. its standard disc repayments involve memory space, remotes, disc cages, and authority. Users will save equipment and tech assistance expenses with this alternative and you will always maintain its content online even though it is big files. Even so, to preserve your content, it should make a regular backup.  

If you determine that option fits your needs, let me learn and I'll support you there.

Yours sincerely,

Dev

Don't Answer If You Are Going To Give Me a Link! DON'T WASTE MY POINTS!

Painters and photographers have many things in common. They both use the elements of art and principles of design to compose strong visual images. What is one other way that painters and photographers are similar?

A.
They both work with digital materials.

B.
They both capture action shots.

C.
They both use camera equipment.

D.
They both pose their subjects.

Answers

Answer:

B but don't be surprised if it is not the answer given.  It's just the best of a bunch of poor choices.

Explanation:

This is actually not an easy question to answer. It's one of those answers that has elements of "Some do and Some don't" in them.

A:  is not true for painters and it is not necessarily true for C for painters.

D: photographer can pose his subjects. A painter can pose someone, but not always.

C: Answered under A.

I think the answer you are forced to choose is B, but neither one has to do it. Still life painters ( a bowl of fruit, a bouquet of flowers) and photographs pose the subjects carefully and do not want the fruit or flowers to move around.

I'd pick B, but it does not have to be the answer. I just think it is less wrong than the others.

which answer illustrates “compound interest”

Answers

Answer:

d- you earn interest on the money in your savings account. Then you, in addition earn interest on interest

Explanation:

The compound interest means the interest i.e. earned on the money that saved by you and the interest you earned.

Therefore as per the given options, the last option is correct as it represents the interest earned in the saving account plus it earns interest on interest

Hence, all the other options are incorrect

Who wants to Play Sea of Thieves with me I am a Pirate Legend

Answers

Not me, I am here for your points...

Not me, I just answered so I don’t have to buy Brainly plus

students can use the following code structure or they can do it on their own code base. no need to usepthread unless they setup an env in which several processes make requests in parallel, which is notrequired. if they do it, they get bonus points for sure.

Answers

The code structure needs to allows students to choose whether they want to use a specific code structure provided or work on their own code base.

What is  code structure

The code construction admits students to pick either they be going to use a particular code building given or bother their own law base. The use of pthread (POSIX threads) is optional upon any less condition than they start an atmosphere where various processes create requests in parallel.

If pupils choose to implement the parallel treat with thread and favorably start the atmosphere as particularized, they would receive gratuity points. However, if they pick not to use pthread or parallel dispose of, seemingly it would not affect their orderly points or judgment.

Learn more about code structure  from

https://brainly.com/question/13147796

#SPJ4

Which type of VBA code is common for grouping statements that perform a certain task?

statement
procedure
variable
module

Answers

Answer:

Module

Explanation:

Don’t listen to this answer it’s probably not rt

T/F -Touchpads are found most often on desktop computers.

Answers

False. Touchpads are not typically found on desktop computers. While it's technically possible to attach a touchpad to a desktop computer, they are much more commonly found on laptops or notebooks.

Touchpads are a convenient way to control the movement of the cursor on a laptop or notebook, without the need for a separate mouse. They are typically located just below the keyboard and allow the user to move the cursor by sliding their finger across the surface of the touchpad.

Desktop computers, on the other hand, usually come with a separate mouse as the primary input device for controlling the cursor. While some desktop keyboards may have built-in touchpads or trackballs, these are much less common than traditional mice.

In summary, touchpads are primarily found on laptops or notebooks, while desktop computers typically rely on separate mice for cursor control.

Visit here to learn more about desktop computer:

brainly.com/question/29512583

#SPJ11

If a network security professional wants to connect some computers in the same building without using a router, what
type of network is being used?
star topology
WAN
LAN
peer-to-peer

Answers

Answer:

Peer to peer

Explanation:

Answer:

peer-to-peer

Explanation:

2020 edge unit test

how to turn on a computer

Answers

Answer:

Step 1: Find the 'on' button. It probably looks like this (but might be square or oblong!):

Step 2: Push the button. On some computers, the button lights up when the computer is on. ...

Step 3: Now you need to log in. If you're the only user of your computer, once it's turned on it may go straight to the desktop

Suppose a computer using direct mapped cache has 2³² bytes of main memory and a cache of 1024 blocks, where each block contains 32 bytes.
a How many blocks of main memory does this computer have?
b Show the format of a memory address as seen by cache; be sure to include the field names as well as their sizes.
c Given the memory address 0x00001328, to which cache block will this address map? (Give you answer in decimal.)

Answers

In a direct-mapped cache, the cache block to which a memory address maps can be determined by extracting the index field from the memory address. The index field is used to index into the cache, and it represents the cache block number.

How can we determine which cache block a memory address maps to in a direct-mapped cache?

a) To calculate the number of blocks of main memory, we divide the total size of main memory by the block size. In this case, the total size of main memory is 2^32 bytes, and each block contains 32 bytes. Therefore, the number of blocks of main memory is 2^32 / 32 = 2^27 blocks.

b) The format of a memory address as seen by the cache includes the following fields:

  - Tag field: The size of this field depends on the number of bits required to uniquely identify each block in the cache.

  - Index field: The size of this field is determined by the number of blocks in the cache.

  - Offset field: The size of this field is determined by the block size.

c) To determine which cache block the memory address 0x00001328 maps to, we need to extract the relevant fields from the memory address.

Assuming a direct-mapped cache, the index field determines the cache block. In this case, the index size is 1024 blocks, which can be represented by 10 bits. Taking the lower 10 bits of the memory address (1328 in decimal), we find that the address maps to cache block number 1328 % 1024 = 304.

Learn more about direct-mapped cache

brainly.com/question/31086075

#SPJ11

Cardinality Sorting The binary cardinality of a number is the total number of 1 's it contains in its binary representation. For example, the decimal integer
20 10

corresponds to the binary number
10100 2

There are 21 's in the binary representation so its binary cardinality is
2.
Given an array of decimal integers, sort it ascending first by binary cardinality, then by decimal value. Return the resulting array. Example
n=4
nums
=[1,2,3,4]
-
1 10

→1 2

, so 1 's binary cardinality is
1.
-
2 10

→10 2

, so 2 s binary cardinality is
1.
-
310→11 2

, so 3 s binary cardinality is 2 . -
410→100 2

, so 4 s binary cardinality is 1 . The sorted elements with binary cardinality of 1 are
[1,2,4]
. The array to retum is
[1,2,4,3]
. Function Description Complete the function cardinalitysort in the editor below. cardinalitysort has the following parameter(s): int nums[n]: an array of decimal integi[s Returns int[n] : the integer array nums sorted first by ascending binary cardinality, then by decimal value Constralnts -
1≤n≤10 5
-
1≤
nums
[0≤10 6
Sample Case 0 Sample inputo STDIN Function
5→
nums [] size
n=5
31→
nums
=[31,15,7,3,2]
15 7 3 Sample Output 0 2 3 7 15 31 Explanation 0 -
31 10

→11111 2

so its binary cardinality is 5 . -
1510→1111 2

:4
-
7 10

→111 2

:3
3 10

→11 2

:2
-
210→10 2

:1
Sort the array by ascending binary cardinality and then by ascending decimal value: nums sorted
=[2,3,7,15,31]
.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that array of decimal integers, sort it ascending first by binary cardinality, then by decimal value

Writting the code;

#include <iostream>

using namespace std;

int n = 0;

// Define cardinalitySort function

int *cardinalitySort(int nums[]){

   // To store number of set bits in each number present in given array nums

   int temp[n];

   int index = 0;

   /*Run a for loop to take each numbers from nums[i]*/

   for(int i = 0; i < n; i++){

       int count = 0;

       int number = nums[i];

       // Run a while loop to count number of set bits in each number

       while(number > 0) {

           count = count + (number & 1);

           number = number >> 1;

       }

       // Store set bit count in temp array

       temp[index++] = count;

   }

   

   /*To sort nums array based upon the cardinality*/

   for(int i = 0; i < n; i++){

       for(int j = 0; j < n-i-1; j++){

           if(temp[j] > temp[j+1]){

               int tmp = nums[j];

               nums[j] = nums[j+1];

               nums[j+1] = tmp;

           }

       }

   }

   // Return resulting array

   return nums;

   

}

// main function

int main(){

   n = 4;

   // Create an array nums with 4 numbers

   int nums[] = {1, 2, 3, 4};

   int *res = cardinalitySort(nums);

   // Print resulting array after calling cardinalitySort

   for(int i = 0; i < n; i++){

       cout << res[i] << " ";

   }

   cout << endl;

   return 0;

}

public class CardinalitySortDemo {

// Define cardinalitySort function

public static int[] cardinalitySort(int nums[]){

    // To store number of set bits in each number present in given array nums

 int n = nums.length;

    int temp[] = new int[n];

    int index = 0;

    /*Run a for loop to take each numbers from nums[i]*/

    for(int i = 0; i < n; i++){

        int count = 0;

        int number = nums[i];

        // Run a while loop to count number of set bits in each number

        while(number > 0) {

            count = count + (number & 1);

            number = number >> 1;

        }

        // Store set bit count in temp array

        temp[index++] = count;

    }

   

    /*To sort nums array based upon the cardinality*/

    for(int i = 0; i < n; i++){

        for(int j = 0; j < n-i-1; j++){

            if(temp[j] > temp[j+1]){

                int tmp = nums[j];

                nums[j] = nums[j+1];

                nums[j+1] = tmp;

            }

        }

    }

    // Return resulting array

    return nums;

   

}

public static void main(String[] args) {

 

 int n = 4;

    // Create an array nums with 4 numbers

    int nums[] = {1, 2, 3, 4};

    int res[] = cardinalitySort(nums);

    // Print resulting array after calling cardinalitySort

    for(int i = 0; i < res.length; i++){

        System.out.print(res[i] + " ");

    }

}

}

See more about C++ at brainly.com/question/15872044

#SPJ1

Cardinality Sorting The binary cardinality of a number is the total number of 1 's it contains in its

why key logger are essential for computer system

Answers

Answer:

This question kind of confusing but I'm gonna try to answer it:

Keyloggers are activity monitoring software programs that provide hackers access to your data.

So its not really good to have on you're computer since is a spyware and they can access to your personal data

Given the following traversals of a Binary Tree In Order: 22-34-41-57-65-89-10 Pre Order : 57-34-22-41-89-66-10
I. Draw the Binary Tree
II. Write the Post Order Traversal of the above tree.

Answers

The resulting binary tree is:

```
       57
     /    \
   34      89
 /   \       \
22   41      10
         /
       65
```

To draw the Binary Tree, we can start with the root node as 57, then we can split the In-Order traversal into two parts: the left subtree and the right subtree. We know that the first element in the Pr-Order traversal is always the root node, so we can see that 57 is the root node of the tree. Now we can split the In Order traversal into two parts: 22-34-41 and 65-89-10. The left subtree will contain 22-34-41, and the right subtree will contain 65-89-10. We can now see that the Pre Order traversal gives us the information that the left subtree starts with 34, which means that the root node of the left subtree is 34. Similarly, we can see that the right subtree starts with 89, which means that the root node of the right subtree is 89. Continuing in this way, we can fill in all the nodes of the tree.

To find the Post-Order traversal of this tree, we visit the nodes in the following order: Left subtree, Right subtree, Root node. Therefore, the Post Order traversal of the Binary Tree is: 22-41-34-65-10-89-57.

Learn more about binary tree here:

https://brainly.com/question/30217803

#SPJ11

cloud kicks users are seeing error messages when they use one of their screen flows. the error messages are confusing but could be resolved if the users entered more information on the account before starting the flow. how should the administrator address these issues?

Answers

To address the issues faced by Cloud Kicks users regarding error messages in one of their screen flows, the administrator can :

Analyze the Error MessagesIdentify Required InformationProvide Clear Instructions

What is cloud kicks

To fix Cloud Kicks error messages, the admin should analyze user reports. Error codes/descriptions give insights to problem's root cause. Identify missing/incomplete info causing screen flow error.

Provide clear instructions for users before starting the flow. Prevent confusing errors, ensure upfront details entry. Improve error messages by updating UI for clearer instructions.

Learn more about  cloud kicks from

https://brainly.com/question/29240780

#SPJ4

Other Questions
a fair coin is flipped 5 times. what is the probability that the first three flips come up heads or the last three flips come up tails (or both)? A rock is thrown with an initial vertical velocity 50 m/s at an angle of 40 degrees.a. What is the horizontal component of the velocity?b. What is the vertical component of the velocity?c. What is the hang timel?d. What is the peak height?e. What is the range? What do Claudius and Laertes do at the end of Act IV? Solve for x: -2x - 5 = 4 Select the correct answer.From the following balances for Alpha Inc., calculate the working capital of the company.Amount ($)50,00080,00010,00080,0002,000ItemsAccounts payableInventoryTax payableCash at bankPrepaid rentOA. $62,000OB. $102,000OC. $60,000O D. $222,000 Industry members tend to have considerable power in bargaining with key suppliers when Copyright by Go-Plus Software, Inc. Copying, distributing, or Jd party website posting expressly prohibited and constitutes copyright violation O suppliers have the resources and also a profit incentive to integrate forward into the business of industry members. O a few suppliers are regarded as the best or preferred sources of a particular item. certain suppliers provide equipment or services that deliver valuable cost-saving efficiencies to industry members in operating their production processes. O it is difficult or costly for industry members to switch their purchases from one supplier to another or to switch to attractive substitute inputs. O industry members are major customers of suppliers and when good substitutes exist for the products/services of suppliers. Copying, redistributing. or website posting is everestly Use Figure 1 to evaluate each trigonometric function of angle A . The side adjacent to angle A has length 8 and the side opposite angle A has length 10. Is -6 greater than -5 Yannick Benjamin was paralyzed from the waist down by a car accident when he was 25. An aspiring sommelier, Mr. Benjamin could no longer work at his old job. Over time he participated in sommelier competitions to improve his skills and eventually found a new job in a wine store, completed his undergraduate degree, and developed a nonprofit organization to support other people with disabilities. He developed new tools and strategies to help him turn his disability into a learning and development experience.2. In this situation, Mr. Benjamin is using ------- response to adversity.a. a survivingb. a managingc. a harnessingd. an avoiding I only need question 48 please Verify that r(x)and r-1(x) are inverses by evaluating r(5) and r-1(r(5)). Suppose that a famer planned to borrow $5,400 from the bank and repay the loan at the end of the year. The interest rate at the bank is 7.36% compounded annually.(i) Calculate the amount of interest paid to the Iron Bank.(ii) Calculate the effective interest rate at the Iron Bank.(i) $397.25(ii) 7.36% Cul es el pasatiempo favorito de tu sobrino?El pasatiempo favorito de mi sobrino es el ftbol.El pasatiempo favorito de mi sobrino ser el ftbol.El pasatiempo favorito de mi sobrino est el ftbol.El pasatiempo favorito de mi sobrino estoy el ftbol. What are the 12 sentences? What is the process of interaction and integration among people, businesses, and governments of different countries?is a process of interaction and integration among people, businesses, and governments of different countries. Xenophobia is a world wide problem Four different positive integers , , , satisfy the equation (9 ) (9 ) (9 ) (9 ) = 9. What is the value of + + + ? which of these lists has all pure substancesa) milk water copperb) gold oxygen nickelc) tea sale concreted) orange juice with pulp silver soda water panic disorder appears to be related to abnormal activity of which neurotransmitter? A firm has a total value of $2,000,000, the total debt of$600,000, the cost of debt is 10%, and cost of equity is 15%. Whatis a firm's WACC if it pays zero tax rate?a. 9%b.11.5%c.13.5%d.14.4%