In python 3.17 LAB: Convert to dollars
Given four values representing counts of quarters, dimes, nickels and pennies, output the total amount as dollars and cents
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print(f'Amount: ${dollars:.2f}'
Ex: If the input is
4
3
2
1
where 4 is the number of quarters, 3 is the number of dimes, 2 is the number of nickels, and 1 is the number of pennies, the output is:
Amount: $1.41
For simplicity, assume inputis non-negative

Answers

Answer 1

To convert the inputs to dollars and cents, we make use of a combination of multiplication and addition.

The program written in Python where comments are used to explain each line is as follows:

#This gets input for the number of quarters

quarters = int(input("Quarters: "))

#This gets input for the number of dimes

dimes = int(input("Dimes: "))

#This gets input for the number of nickels

nickels= int(input("Nickels: "))

#This gets input for the number of pennies

pennies= int(input("Pennies: "))

#This converts the amount to dollars and cents

dollars = quarters * 0.25 + dimes * 0.10 + nickels * 0.05 + pennies * 0.01

#This prints the amount to 2 decimal places

print("Amount ${:.2f}".format(dollars))

Read more about Python programs at:

https://brainly.com/question/22841107


Related Questions

What power points feature will you use to apply motion effects to different objects of a slide

Answers

Answer:

Animation scheme can be used to apply motion effects to different objects of a slide.

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

irving is running cable underground beside his driveway to power a light at his entrance .what type of cable is he most likely using?
A.MC
B.NNC
C.UFD
D.UF

Answers

Based on the given information, Irving is running cable underground beside his driveway to power a light at his entrance. The most likely type of cable he would use in this scenario is "D. UF" cable.

Why is the cable Irving is using a UF cable and its importance

UF stands for "Underground Feeder" cable, which is specifically designed for underground installations.

It is commonly used for outdoor applications, such as running power to lights, pumps, or other outdoor fixtures. UF cable is moisture-resistant and has insulation suitable for direct burial without the need for additional conduit or piping.

Read more about cables here:

https://brainly.com/question/13151594

#SPJ1

Perform an “average case” time complexity analysis for Insertion-Sort, using the given proposition
and definition. I have broken this task into parts, to make it easier.
Definition 1. Given an array A of length n, we define an inversion of A to be an ordered pair (i, j) such
that 1 ≤ i < j ≤ n but A[i] > A[j].
Example: The array [3, 1, 2, 5, 4] has three inversions, (1, 2), (1, 3), and (4, 5). Note that we refer to an
inversion by its indices, not by its values!
Proposition 2. Insertion-Sort runs in O(n + X) time, where X is the number of inversions.
(a) Explain why Proposition 2 is true by referring to the pseudocode given in the lecture/textbook.
(b) Show that E[X] = 1
4n(n − 1). Hint: for each pair (i, j) with 1 ≤ i < j ≤ n, define a random indicator
variable that is equal to 1 if (i, j) is an inversion, and 0 otherwise.
(c) Use Proposition 2 and (b) to determine how long Insertion-Sort takes in the average case.

Answers

a. Proposition 2 states that Insertion-Sort runs in O(n + X) time, where X is the number of inversions.

b. The expected number of inversions, E[X],  E[X] = 1/4n(n-1).

c. In the average case, Insertion-Sort has a time complexity of approximately O(1/4n²).

How to calculate the information

(a) Proposition 2 states that Insertion-Sort runs in O(n + X) time, where X is the number of inversions. To understand why this is true, let's refer to the pseudocode for Insertion-Sort:

InsertionSort(A):

  for i from 1 to length[A] do

     key = A[i]

     j = i - 1

     while j >= 0 and A[j] > key do

        A[j + 1] = A[j]

        j = j - 1

     A[j + 1] = key

b. The expected number of inversions, E[X], can be calculated as follows:

E[X] = Σ(i,j) E[I(i, j)]

= Σ(i,j) Pr((i, j) is an inversion)

= Σ(i,j) 1/2

= (n(n-1)/2) * 1/2

= n(n-1)/4

Hence, E[X] = 1/4n(n-1).

(c) Using Proposition 2 and the result from part (b), we can determine the average case time complexity of Insertion-Sort. The average case time complexity is given by O(n + E[X]).

Substituting the value of E[X] from part (b):

Average case time complexity = O(n + 1/4n(n-1))

Simplifying further:

Average case time complexity = O(n + 1/4n^2 - 1/4n)

Since 1/4n² dominates the other term, we can approximate the average case time complexity as:

Average case time complexity ≈ O(1/4n²)

Therefore, in the average case, Insertion-Sort has a time complexity of approximately O(1/4n²).

Learn more about proposition on

https://brainly.com/question/30389551

You work as the IT administrator for a small corporate network. To accommodate specific network communication needs for an upcoming project, you need to upgrade the network connection's speed for the Windows workstation located in the Executive Office.
In this lab, your task is to:
- Install the network interface card with the fastest speed into the Exec computer.
- Connect the Exec computer to the local area network using the new network card and the appropriate cable.
- From the workstation's operating system, use the ping command to confirm that the workstation has a connection to the local network and the internet using the following:
Local server IP address: 192.168.0.10
ISP & internet provider: 198.28.2.254
cords consist of:
Coaxial cable, RG-59 ( 75 OHMs), F type
cable, fiber, St to sc
UTP cable, two pair, RJ-11
Cat6a cable, RJ45
network adapters consist of:
Network adapter, 1000baseSX Ethernet, SC multi mode, PCI, 32 bit, universal, 3.3/5 Volt
modem, 33.6 K, V .34 BIS, PCI
Modem, 56K, V .90\92, PCI
networker adapter, Ethernet 10/100/1000 base tx, PCI E
network adapter, Ethernet 10/100 base TX, PCI
network adapter, 10G base Sr Ethernet, SC multimode, PCI, 32 bit, universal, 3.3/5 Volt

Answers

To complete this task, you will need to follow the steps below:

1. Install the network interface card with the fastest speed into the Exec computer. The fastest network interface card in this case is the "network adapter, 10G base Sr Ethernet, SC multimode, PCI, 32 bit, universal, 3.3/5 Volt" because it has a speed of 10Gbps. To install the card, you will need to open the computer case, insert the card into an available PCI slot, and secure it with a screw.2. Connect the Exec computer to the local area network using the new network card and the appropriate cable. In this case, you will need to use the "cable, fiber, St to sc" because it is compatible with the SC multimode connector on the network interface card. Connect one end of the cable to the network interface card and the other end to the network switch or router.3. From the workstation's operating system, use the ping command to confirm that the workstation has a connection to the local network and the internet. To do this, open the command prompt and enter the following commands:
- ping 192.168.0.10 (to confirm connection to the local server)
- ping 198.28.2.254 (to confirm connection to the ISP and internet provider)

If the ping commands return a response, then the workstation is successfully connected to the local network and the internet. If there is no response, you will need to troubleshoot the connection by checking the network interface card, cable, and network settings.

Learn more about ping commands

https://brainly.com/question/13266992

#SPJ11

Answer:w

Explanation:

w

help on my homework, on c++, I'm new to this what do I do.

help on my homework, on c++, I'm new to this what do I do.

Answers

The program based on the information is given below

#take amount in quarters, dimes, nickels and pennies as input and store it in variables

quarters = int(input())

dimes = int(input())

nickels = int(input())

pennies = int(input())

#calculate amount in cents

cents = (quarters*25 + dimes*10 + nickels*5 + pennies)

#convert cents to dollars

# 1 dollar = 100 cents

# n cents = n/100 dollars

dollars = cents / 100.00

#Print the amount in dollars upto two decimal places

print("Amount: $"+"{:.2f}".format(dollars))

What is the program about?

It should be noted that the following weekend as illustrated:

1 quarter = 25 cents

1 dime = 10 cents

1 nickel = 5 cents

1 penny = 1 cent

1 dollar = 100 cents

Using the above data, the code to convert the given amount to dollars is shown above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1


Write
algorithm to read 100 numbers
then display the largest.

Answers

Answer:

see picture

Explanation:

There is no need to store all the values, you can just keep track of the highest. Up to you to create a numbers file with 100 values.

Writealgorithm to read 100 numbersthen display the largest.

STM-1 contains 63 primary 2-Mbps data streams and each of them contains 30 time slots for speech.
(a) How many simultaneous calls (64 Kbps) can be transmitted over a single fiber pair used by the STM-16 optical system?
(b) What is the number of simultaneous calls if a DWDM system using a
100- GHz wavelength grid from 1,528.77 nm/196.1 THz to 1,563.86
nm/191.7 THz is implemented?
(c) The STM-16 signal is transmitted through each optical channel. What
will be the total data rate of the DWDM system from part (b)?

Answers

It is C I hope this helps:)

"You win!" never displays. What line is responsible for this error?

Answers

Answer:

Line 3

Explanation:

Is it possible to beat the final level of Halo Reach?

Answers

It is impossible to beat this level no matter how skilled the player is.

Practice Question

What will be displayed after this

code segment is run?

count

0

REPEAT UNTIL (count = 3

count count + 1

DISPLAY

and"

DISPLAY count



"1 and 2 and 3"

"And 1 and 2 and 3"

"0 and 1 and 2"

"And 0 and 1 and 2"

Answers

Answer:

Follows are the code to the given question:

#include <stdio.h>//header file

int main()//main method

{

int count=0;//defining an integer variable

for(count=0;count<3;count++)//use for loop to count values

{

printf("%d\n",count);//print count values

}

return 0;

}

Output:

0

1

2

Explanation:

In this code, it declares the integer variable "count" which has a value of "0" and in the next step declares a loop, using the count variable to regulate count values, which is less than 3, and increases the count value, and prints its values. This variable is the count value.

The count variable holds a value of 0, and use a for loop that checks its value is less than 3, and print its value, that's why it will print the value that is 0,1, and 2.

As you consider computer hardware and software, what hardware element do you think impact software performance the most? Justify your answer.

Answers

Answer:

The central processing unit (CPU)

Explanation:

CPU contains the ALU- arithmetic and logical unit and other part which helps the to and fro information processing and allows to send data from the software back and front to the hardware.

HELP ASAP WILL MARK BRAINLIEST

HELP ASAP WILL MARK BRAINLIEST

Answers

Answer:

C, C, D, B

Explanation:

use a for loop to create a random forest model for each value of n estimators from 1 to 30;
• evaluate each model on both the training and validation sets using MAE;
• visualize the results by creating a plot of n estimators vs MAE for both the training and validation sets
After that you should answer the following questions:
• Which value of n estimators gives the best results?
• Explain how you decided that this value for n estimators gave the best results:
Why is the plot you created above not smooth?
• Was the result here better than the result of Part 1? Wha: % better or worse was it? in python

Answers

Answer:

nvndknnnnnnngjf

Explanation:

f4tyt5erfhhfr

if net force acting on an object is 0 then the force is considered to be ..

Answers

Answer:

it is considered to be balanced

in excel how do you enter a formula without using a function that references cell A6 in the Washington worksheet?

Answers

To enter a formula without a function that references cell A6 in the Washington worksheet in Excel, type "=" and then directly enter the formula using the cell reference, such as "A6*2".

Why is Microsoft Excel formula important?

Excel formulas are essential for performing complex calculations, data analysis, and automating tasks.

They allow users to quickly and accurately perform calculations, manipulate data, and create charts and graphs. Formulas also help ensure data accuracy and consistency, and can save time and reduce errors by automating repetitive tasks.

Note as well that , by allowing users to create custom formulas, Excel provides a flexible and powerful tool for data analysis and reporting.

Learn more about Microsoft Excel formula:

https://brainly.com/question/16869635

#SPJ1

which of the following was not identified as a reason that iot (internet of thing) security should be a concern?

Answers

Answer:

please give the following

Explanation:

you can either update the question or post a new one

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

Which of the following is an example of critical reading?
Select all that apply:
Accepting textual claims at face value Considering an argument from a different point of view
Reviewing an argument to identify potential biases
Skimming a text to locate spelling errors or typos
Looking for ideas or concepts that confirm your beliefs​

Answers

Answer:

Which of the following is an example of critical reading? Select all that apply:

a.Accepting textual claims at face value

b.Considering an argument from a different point of view

c. Reviewing an argument to identify potential biases

d. Skimming a text to locate spelling errors or typos

e. Looking for ideas or concepts that confirm your beliefs

Which term best describes these lines?

count = 0

loop through list

if “basketball” is found

add one to count

output count

Python 3 code
selection program
pseudocode
sequential program

Answers

The term best describing these lines is called pseudocode. Essentially a “text-based” detail (algorithmic) design tool.

Sharon, a network user needs to apply permissions to a folder that another network user will need to access. The folder resides on a partition that is formatted with exFAT. Which type of permissions should Sharon configure on the folder?

Answers

The suggested format for drives that will be used with the Windows operating system is NTFS (New Technology for File System). ExFAT is the best format, nevertheless, if you wish to use a storage device with both Windows and macOS.

What is the network user will need to access exFAT?

If you want to build large partitions, store files larger than 4 GB, or require more compatibility than NTFS can offer, you can utilize the ExFAT file system.

ExFAT performs more quickly, but, when used as the file system for external devices because read/write rates behave differently when connected through USB and depending on the operating system.

Therefore, As a file system for internal drives, NTFS is quicker. ExFAT efficiency is regularly outperformed, and it requires less system resources.

Learn more about exFAT here:

https://brainly.com/question/28900881

#SPJ1

Choose the type of collection created with each assignment statement

____ collection A = {5:2}
Options: tuple, dictionary, list

____ collection B = (5,2)
Options: tuple, dictionary, list

____ collection C = [5,2]
Options: tuple, dictionary, list

 Choose the type of collection created with each assignment statement____ collection A = {5:2}Options:

Answers

Answer:

dictionary

tuple

list

Explanation:

What does ransomware do to an endpoint device?
1 Infects the endpoint devices and launches attacks on the infected endpoint and other devices connected to the network.
2. Attacks the endpoint device without the consent of the user or the device, discreetly collecting and transmitting information, causing harm to the end user.
3. Gets accidentally installed in the endpoint device as software along with other programs during the installation process. This happens when the user's installation and download options are overlooked, thus affecting the user application adversely.
4. Attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded.​

Answers

Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded.

For better understanding, let us explain what the ransomware attack means

A ransomware attack is commonly called "man in the middle". It is a form of hacking attack on a system where a ransomware virus can stay dormant for an extended time being until it is activated by a hacker over the internet.

It is regarded as a malicious software that is made to hinder (obstruct) the access to a computer system until a sum of money is paid.

From the above, we can therefore say that ransomware is activated by a hacker over the internet and hinder (obstruct) the access to a computer system until a sum of money is paid.

Learn more about ransomware attack from:

https://brainly.com/question/18165199

Select the correct answer from each drop-down menu.
Which two components help input data in a computer and select options from the screen, respectively?
✓inputs data into computers in the form of text, numbers, and commands. However, a
commands from the screen.
A
Reset
Next
✓selects options and

Answers

Which two components help input data in a computer and select options from the screen, respectively?

✓ Keyboard inputs data into computers in the form of text, numbers, and commands. However, a

✓ Mouse selects options and commands from the screen.

A

Reset

Next

To know more about input data refer here

https://brainly.com/question/30256586#

#SPJ11

Looking at the code below, what answer would the user need to give for the while loop to run?

System.out.println("Pick a number!");
int num = input.nextInt();

while(num > 7 && num < 9){
num--;
System.out.println(num);
}


9

2

7

8

Answers

The number that the user would need for the whole loop to run would be D. 8.

What integer is needed for the loop to run ?

For the while loop to run, the user needs to input a number that satisfies the condition num > 7 && num < 9. This condition is only true for a single integer value:

num = 8

The loop will only run if the number is greater than 7 and less than 9 at the same time. There is only one integer that satisfies this condition: 8.

If the user inputs 8, the while loop will run.

Find out more on loops at https://brainly.com/question/19344465

#SPJ1

Round 2,834 to the nearest hundred.

Answers

Answer:

it's 2,800

Explanation:

i hope this helps

Answer:

Explanation:

2 834 ≈ 2 800

Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?

Answers

Answer: NAT

Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP? One-to-many NAT allows multiple devices on a private network to share a single public IP address.

The following that allows for  hundreds of computers all to have their outbound traffic translated to a single IP is the One-to-many NAT.     Option C

How does One-to-many NAT works

One-to-many NAT allows hundreds of computers to have their outbound traffic translated to a single IP this is done by designating each computer to  a unique port number, that is used to identify the specific device within the the network address transition NAT, where all private network gain access to public network     .

The NAT device serves as translator, keeping track of the original source IP and port number in the translation table, translates the source IP address and port number of each outgoing packet to the single public IP address,  This allows for a possible multiple devices to share a single IP address for outbound connections.

Learn more about One-to-many NAT on brainly.com/question/30001728

#SPJ2

The complete question with the options

Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?

a. Rewriting

b. Port forwarding

c. One-to-many NAT

d. Preservation

You have written a program to keep track of the money due to your company. The people in accounting have entered the information from the invoices they have sent out. However, the total from accounting does not agree with a total of a second listing of items that can be billed from the production department.

Using the drop-down menus, complete the sentences about the steps in the debugging process.

As a first step in diagnosing the problem, you will
✔ reproduce the error.
A good place to begin is by examining the
✔ error codes.
Next, you can
✔ troubleshoot
the problem.
This will help you
✔ identify the source of the problem.

Answers

Answer:

1. REPRODUCE THE ERROR

2. ERROR CODES

3. TROUBLESHOOT

4. IDENTIFY THE SOURCE OF THE PROBLEM

Explanation:

Debugging a program simply means a sequence of steps which one takes to correct an imperfect program, that is a program that does not run as intended.

A good way to start debugging is to run the code, by running the code, one will be able to determine if the program has a bug. If it has then it produces an error. This error is a good starting point as the error code gives a headway into where the bug may lie.

The error code gives a hint into the type of error causing a program to malfunction which could be a syntax error, logic, Runtime and so on. In some case probable lines where there error lies are spotted and included in the error code produced.

After evaluating the error code, then we troubleshoot the probable causes of the error. By troubleshooting all the possible causes, the source of the error will eventually be identified.

Answer:

As a first step in diagnosing the problem, you will

✔ reproduce the error.

A good place to begin is by examining the

✔ error codes.

Next, you can

✔ troubleshoot

the problem.

This will help you

✔ identify the source of the problem.

Explanation:

Which topic would be included within the discipline of information systems

Answers

, , , , , are only a few of the subjects covered within the study area of information systems. Business functional areas like business productivity tools, application programming and implementation, e-commerce, digital media production, data mining, and decision support are just a few examples of how information management addresses practical and theoretical issues related to gathering and analyzing information.

Telecommunications technology is the subject of communication and networking. Information systems is a branch of computer science that integrates the fields of economics and computer science to investigate various business models and the accompanying algorithmic methods for developing IT systems.

Refer this link to know more- https://brainly.com/question/11768396

how do I make my own algorithms ​

Answers

Answer:

Step 1: Determine the goal of the algorithm. ...

Step 2: Access historic and current data. ...

Step 3: Choose the right model(s) ...

Step 4: Fine tuning. ...

Step 5: Visualise your results. ...

Step 6: Running your algorithm continuously.

Get a basic understanding of the algorithm.
Find some different learning sources.
Break the algorithm into chunks.
Start with a simple example.
Validate with a trusted implementation.
Write up your process.
Other Questions
HELP ASAP!!! GIVING BRAINLIEST AND EXTRA POINTS!!!1. If p || q. m2 = (10x+2), and m7 = (14x-50), find the angle measure.Solve for m1, m2, m3, m4, m5, m6, m7, m8. When you are born, your parents deposited $500 into a simple interest account thatearns 2.5% annually. How much money would be in the account, for you, when youturn 30 years old? What is average variable cost formula? choose two words that mean the opposite of the word allegiance as it is used in paragraph one. " he decided that the division wpuld be based upon the pledges of love and allegiance that he recieved from each of his daughters A clothes manufacturer has 10 yards of cotton material, 10 yards of wool material, and 6 yards of silk material. a pair of slacks requires 1 yard of cotton, 2 yards of wool, and 1 yard of silk. a skirt requires 2 yards of cotton, 1 yard of wool, and 1 yard of silk. the net profit on a pair of slacks is $3 and the net profit on a pair of skirt is $4. how many skirts and how many slacks should be made to maximize profit? which integer represents each situation deposit of $15 Obtaining resources from consumers in return for the value they create is a basic tenet of the _____, which is a theory explaining why companies succeed or fail. A food worker uses a spatula to flip hamburger patties. Which of the following does NOT correctly match a fault with its boundary?normal fault & convergent boundarynormal fault & divergent boundaryreverse fault & convergent boundarystrike-slip fault & transform boundary Prove or disprove. a) If two undirected graphs have the same number of vertices, the same number of edges, the same number of cycles of each length and the same chromatic number, THEN they are isomorphic! b) A relation R on a set A is transitive iff R CR. c) If a relation R on a set A is symmetric, then so is R. d) If R is an equivalence relation and [a]r ^ [b]r , then [a]r = [b]r. The points on the graph below represent both an exponential function and a linear function. Complete this table by reading the values from the graph. Estimate any function values that are less than 1. -3 -2 -1 0 1 2 3 Exponential function Linear function At approximately what values of do both the linear and exponential functions have the same value for ? When a rubber ball dropped from rest bounces off the floor, its direction of motion is reversed becaue(A) energy of the ball is conserved(B) momentum of the ball(C) the floor exerts a force on the ball that stops its fall and then drives it upward(D) the floor is in the way and the ball has to keep moving(E) none of the above you measured a force of [var:force meas] n. the glider in your trial has a mass of [var:mass] g. what equation allows you to calculate acceleration using the force and mass? Quinn witnesses drug dealing and other gang-related criminal activities in his neighborhood. What is the best wayfor him to avoid becoming a participant?O Skip school to avoid gang members. Ask for a ride home if he feels threatened by a gang member.O Wear gang colors to blend in with members in the community. Listen to music and ignore gang-related crimeswhen walking to school. pls help me with number 12 I dont know the answer I have been trying for a long time pls help 10 points for each answer no linksEthan began making a model to show the processes which resulted in the formation of oceans. Which of the following would be the next step in the process?A. The crust is broken downB. Earths crust movesC. Earths plates meetD. Seafloor spreading f(x)=47* - 55f(f(x)) = A company sells widgets. The amount of profit, y, made by the company, is related tothe selling price of each widget, x, by the given equation. Using this equation, find outwhat price the widgets should be sold for, to the nearest cent, for the company tomake the maximum profit.y = -6x + 190x-826 In New York Times v. Sullivan, the Supreme Court ruled that statements about public figures are examples of libel only when they are made with malice and and reckless disregard for the truth. How does this ruling support a healthy democracy? The graph of a quadratic function is shown on the grid. Which function is best represented by this graph