Professor Gekko has always dreamed of inline skating across North Dakota. He plans to cross the state on highway U.S. 2, which runs from Grand Forks, on the eastern border with Minnesota, to Williston, near the western border with Montana. The professor can carry two liters of water, and he can skate m miles before running out of water. (Because North Dakota is relatively flat, the professor does not have to worry about drinking water at a greater rate on uphill sections than on flat or downhill sections.) The professor will start in Grand Forks with two full liters of water. His official North Dakota state map shows all the places along U.S. 2 at which he can refill his water and the distances between these locations. The professor’s goal is to minimize the number of water stops along his route across the state.

a. Give an efficient algorithm by which he can determine which water stops he should make.

b. Prove that your strategy yields an optimal solution, and give its

Answers

Answer 1

The efficient algorithm by which he can determine which water stops he should make; has been determined below and the strategy which is the greedy strategy has been proven to yield an optimal solution.

To solve this question optimally, we will make use of the greedy solution.

In this method, we will maximize the distance that can be covered from a particular point in such a way that there must be a place where water can be gotten before a run out is experienced.

Now, the first point at which there will be a stop should be located at a point that is farthest from the starting position and is also made to be ≤ m miles from the starting position.

Now, this this situation is one that shows optimal substructure and since our  first stopping point will be made to be at p, it means that we are solving the sub-question with the assumption that our starting point is at p.

When we combine the two stated plans above, we will arrive at an optimal solution for the normal reasons via cut and paste.

B) Now we need to show that the greedy approach earlier used produce a first stopping point which is contained in the optimal solution.

Let O represent any optimal solution whereby the professor stops at positions o₁, o₂, o₃....oₙ.

Let h₁ represent the farthest stopping point that is reachable from the starting point. Then we can replace o₁ by h₂ to generate a modified solution H since o₁ - o₂ < o₂ - h₁.

Finally, we can really make it to the positions in H without having to run out of water and since H has the same number of stops, we can conclude that h₁   is contained in one of optimal solution.

Therefore our strategy which is the greedy strategy has been proven to work.

Read more about algorithms at; https://brainly.com/question/24793921


Related Questions

Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string, hours: integer) Enrollment(sid: integer, cid: integer, grade: real) Write a relational algebra expression that satisfies this query? Find the distinct names of all students that take at least three courses and major in "Philosophy".

Answers

Solution :

Here, we need to perform JOIN operation of the students and registration.

Use NATURAL JOIN operator [tex]\Join[/tex] and so no need to specify Join condition.

Also we need to selection operator tp select only those course whose major in "philosophy".

Finally we projection operator π to project only distinct students name who took at least three courses.

[tex]$\pi [\sigma_{\text{student's nam}e} [ \sigma(\text{three courses}) \Join \text{"Philosophy"}]]$[/tex]

The tax calculator program of the case study outputs a floating-point number that might show more than two digits of precision. Use the round function to modify the program to display at most two digits of precision in the output number.

Answers

Answer:

Explanation:

The following code is written in Python. The tax calculator program was not provided, therefore I created a tax calculator that takes in the total price as an input and adds a 7% tax to it. Then it uses the round() function to make sure that the total is outputted as a decimal with two decimal digits at most.

def taxCalculator(price):

   total = price * 1.07

   formattedTotal = round(total, 2)

   return formattedTotal

How does Accenture view automation?

Answers

Answer:

The description of the given question is summarized below.

Explanation:

These organizations retrained, retooled, and empowered our employees amongst all organization's internal management operating areas throughout order to create an increased automation attitude.Accenture's Innovative Software department was indeed adopting a concept called Human Plus technology, which includes this type of training.

Ann, a customer, purchased a pedometer and created an account or the manufacturer's website to keep track of her progress. Which of the following technologies will Ann MOST likely use to connect the pedometer to her desktop to transfer her information to the website?

a. Bluetooth
b. Infared
c. NFC
d. Tethering

Answers

Answer:

The technologies that Ann will MOST likely use to connect the pedometer to her desktop to transfer her information to the website are:

a. Bluetooth

and

c. NFC

Explanation:

Bluetooth and NFC (Near Field Communication) are wireless technologies that enable the exchange of data between different devices.  Bluetooth operates on wavelength.  NFC operates on high frequency.  The security of NFC over Bluetooth makes it a better tool of choice.  NFC also operates on a shorter range than Bluetooth, enabling a more stable connection. NFC also enjoys a shorter set-up time than Bluetooth.  It also functions better than Bluetooth in crowded areas.  Tethering requires the use of physical connectors.  Infrared is not a connecting technology but wave radiation.

slide transition can be defined as ____ of one slide after another​

Answers

Answer:

visual effect

Explanation:

A slide transition is the visual effect that occurs when you move from one slide to the next during a presentation. You can control the speed, add sound, and customize the look of transition effects.

you get a call from a customer who says she can't access your site with her username and password. both are case-sensitive and you have verified she is entering what she remembers to be her user and password correctly. what should you do to resolve this problem?

a. have the customer clear her browser history and retry

b. look up her username and password, and inform her of the correct information over the phone

c. have the user reboot her system and attempt to enter her password again

d. reset the password and have her check her email account to verify she has the information

Answers

Answer:

answer would be D. I do customer service and would never give information over the phone always give a solution

In order to resolve this problem correctly, you should: D. reset the password and have her check her email account to verify she has the information.

Cybersecurity can be defined as a group of preventive practice that are adopted for the protection of computers, software applications (programs), servers, networks, and data from unauthorized access, attack, potential theft, or damage, through the use of the following;

Processes.A body of technology.Policies.Network engineers.Frameworks.

For web assistance, the security standard and policy which must be adopted to enhance data integrity, secure (protect) data and mitigate any unauthorized access or usage of a user's sensitive information such as username and password, by a hacker, is to ensure the information is shared discreetly with the user but not over the phone (call).

In this context, the most appropriate thing to do would be resetting the password and have the customer check her email account to verify she has the information.

Read more: https://brainly.com/question/24112967

10. Question
What are the drawbacks of purchasing something online? Check all that apply.

Answers

Explanation:

1) the quality of purchased good may be low

2) there might me fraud and cheaters

3) it might be risky

4) we may not get our orders on time

There are many drawbacks of purchasing online, some of them are as follows,

Chance of pirated item in place of genuine product.Chances of fraud during digital purchase and transaction.Product not deliver on time as expected.Not getting chance to feel the product before purchase.

These are some of the drawbacks of purchasing something online.

Learn more: https://brainly.com/question/24504878

Using Java:
Background
Markdownis a formatting syntax used by many documents (these instructions, for example!) because of it's plain-text simplicity and it's ability to be translated directly into HTML.
Task
Let's write a simple markdown parser function that will take in a single line of markdown and be translated into the appropriate HTML. To keep it simple, we'll support only one feature of markdown in atx syntax: headers.
Headers are designated by (1-6) hashes followed by a space, followed by text. The number of hashes determines the header level of the HTML output.
Examples
# Header will become Header
## Header will become

Header


###### Header will become Header
Additional Rules
Header content should only come after the initial hashtag(s) plus a space character.
Invalid headers should just be returned as the markdown that was recieved, no translation necessary.
Spaces before and after both the header content and the hashtag(s) should be ignored in the resulting output.

Answers

what’s the question ? What are you suppose to do

Consider the following JavaScript code fragment:var greeting = function ( name ) {console.log ( name )}The best answer for what is wrong with this code is:Group of answer choices

Answers

Answer:

name is a reserved word in JS and cannot be used as an identifier

Explanation:

From the group of answer choices provided the only one that may be a problem would be using the word name as a parameter. Although name is not a reserved word per say in JS it is in HTML, and since JS targets HTML it could cause some errors. This however does not prevent this code from running correctly. JS does not require semicolons anymore, and the opening and closing braces for a body of code does not need to be on their own lines. Also, variable names are not Strings and do not need to be inside quotes, even for console.log()

you are the network administrator for a college. wireless access is widely used at the college. you want the most secure wireless connections you can have. which of the following would you use?
A WPA
B WEP2
CWEP
D WPA2

Answers

Answer:

D. WPA2

Explanation:

Required

Of the 4 options, which is the most secured?

WPA was created as a solution to the vulnerabilities in WEP/WEP2. Then, WPA was upgraded to WPA2.

WPA2 is the least vulnerable to hacks because for every user that is connected to the network through WPA2, a unique encryption is made available for such connection.

Hence, the most secure connection, of the 4 is WPA2.

kỹ năng học tập ở bậc đại học là gì

Answers

Answer:

please translate

Thank you ✌️

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. Ex: If the input is: n Monday the output is: 1 n Ex: If the input is: z Today is Monday the output is: 0 z's Ex: If the input is: n It's a sunny day the output is: 2 n's Case matters. Ex: If the input is: n Nobody the output is: 0 n's n is different than N.

Answers

Answer:

The program in Python is as follows:

char = input("Character: ")[0]

string = input("String: ")

kount = string.count(char)

print(kount,char,end="")

if kount!=1:

   print("'s")

Explanation:

This gets character input

char = input("Character: ")[0]

This gets string input

string = input("String: ")

This counts the occurrence of char in string

kount = string.count(char)

This prints the number of occurrence and the character

print(kount,char,end="")

This prints 's, if kount is other than 1

if kount!=1:

   print("'s")

Create union floatingPoint with members float f, double d and long double x. Write a program that inputs values of type float, double and long double and stores the values in union variables of type union floatingPoint. Each union variable should be printed as a float, a double and a long double. Do the values always print correcly? Note The long double result will vary depending on the system (Windows, Linux, MAC) you use. So do not be concern if you are not getting the correct answer. Input must be same for all cases for comparison Enter data for type float:234.567 Breakdown of the element in the union float 234.567001 double 0.00000O long double 0.G0OO00 Breaklo n 1n heX float e000000O double 436a9127 long double 22fde0 Enter data for type double :234.567 Breakdown of the element in the union float -788598326743269380.00OGOO double 234.567000 long double 0.G00000 Breakolon 1n heX float 0 double dd2f1aa0 long double 22fde0 Enter data for type long double:

Answers

Answer:

Here the code is given as follows,

#include <stdio.h>

#include <stdlib.h>

union floatingPoint {

float floatNum;

double doubleNum;

long double longDoubleNum;

};

int main() {

union floatingPoint f;

printf("Enter data for type float: ");

scanf("%f", &f.floatNum);

printf("\nfloat %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

printf("\n\nEnter data for type double: ");

scanf("%lf", &f.doubleNum);

printf("float %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

printf("\n\nEnter data for type long double: ");

scanf("%Lf", &f.longDoubleNum);

printf("float %f ", f.floatNum);

printf("\ndouble %f ", f.doubleNum);

printf("\nlong double %Lf ", f.longDoubleNum);

printf("\n\nBreakdown in Hex");

printf("\nfloat in hex %x ", f.floatNum);

printf("\ndouble in hex %x ", f.doubleNum);

printf("\nlong double in hex %Lx ", f.longDoubleNum);

return 0;

}

Write a method, including the method header, that will receive an array of integers and will return the average of all the integers. Be sure to use the return statement as the last statement in the method. A method that receives an array as a parameter should define the data type and the name of the array with brackets, but not indicate the size of the array in the parameter. A method that returns the average value should have double as the return type, and not void. For example: public static returnType methodName(dataType arrayName[]) 3 The array being passed as a parameter to the method will have 10 integer numbers, ranging from 1 to 50. The average, avgNum, should be both printed in the method, and then returned by the method. To print a double with 2 decimal points precision, so use the following code to format the output: System.out.printf("The average of all 10 numbers is %.2f\n", avgNum);

Answers

Answer:

The method is as follows:

public static double average(int [] arrs){

    double sum = 0,avgNum;

    for(int i = 0;i<arrs.length;i++){

        sum+=arrs[i];

    }

    avgNum = sum/arrs.length;

    System.out.printf("The average of all numbers is %.2f\n", avgNum);

    return avgNum;

}

Explanation:

This defines the method

public static double average(int [] arrs){

This declares sum and avgNum as double; sum is then initialized to 0

    double sum = 0,avgNum;

This iterates through the array

    for(int i = 0;i<arrs.length;i++){

This adds up the array elements

        sum+=arrs[i];     }

This calculates the average

    avgNum = sum/arrs.length;

This prints the average to 2 decimal places

    System.out.printf("The average of all numbers is %.2f\n",

avgNum);

This returns the average to main

    return avgNum; }

how do you format a cd or a DVD ​

Answers

No. The DVD format can't be read by a CD.

Write a program that prompts the user to enter a positive integer and displays all its smallest factors in decreasing order.

Answers

Answer:

<fact>[ZRjKt9sw6V(gh6E)ehNM3]<zip>

Explanation:

Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options.

provides access to more networks

higher speeds

more secure

lower cost

greater geographic reach

Answers

higher speeds lower cost more secure

Answer:

✅ more secure

✅ lower cost

✅ higher speeds

Explanation:

Edge 2022

Brooke is trying to save enough money in the next year to purchase a plane ticket to Australia. Every month Brooke saves $200. Write a for loop that displays how much money Brooke will save at the end of each month for the next 12 months.

Answers

Answer:

var monthlyDeposit = 200;

var accountBalance = 0;

for(var i = 0;i<12;i++){

   accountBalance += monthlyDeposit;

   console.log(accountBalance);

}

Feiya has several computing devices around the home that are connected to the Internet:
A smart home assistant (connected via wireless)
A laptop computer (connected via wireless)
A desktop computer (connected via Ethernet)
Which of her devices use the Internet Protocol (IP) when sending data through the Internet?

Answers

Answer:

roaming

bluetooth

Explanation:

its right

The device that use the Internet Protocol (IP) when sending data through the Internet is every device she is using.

What is internet protocol?

The Internet Protocol (IP) is a protocol, or set of rules, that is used to route and address data packets so that they can travel across networks and arrive at their intended destination.

Data traveling across the Internet is split up into smaller slices known as packets.

Essentially, it enables linked gadgets to interact with one another despite differences in internal processes, structure, or design.

Network protocols enable easy communication with people all over the world and thus play an important role in modern digital communications.

The Internet can be accessed by a wide range of computing devices. To send data over the Internet, all devices must use the Internet Protocol.

Thus, all the given device will use the Internet Protocol (IP) when sending data through the Internet.

For more details regarding internet protocol, visit:

https://brainly.com/question/27581708

#SPJ2

Which of the following is an example of a long-term goal?Developing a lifetime savings plan

Answers

Answer:

Retirement fund/plan ?

Explanation:

In the welding operations of a bicycle manufacturer, a bike frame has a long flow time. The set up for the bike frame is a 7 hour long operation. After the setup, the processing takes 6 hour(s). Finally, the bike frame waits in a storage space for 7 hours before sold. Determine the value-added percentage of the flow time for this bike frame. Round your answer to the nearest whole number for percentage and do NOT include the "%" sign in the answer. For example, if your answer is 17.7%, please answer 18. If your answer is 17.4%, please answer 17. No "%" sign. No letter. No symbols. No explanation. Just an integer number.

Answers

Answer:

Bike Frame Flow Time

The value-added percentage of the flow time for this bike frame is:

= 46.

Explanation:

a) Data and Calculations:

Bike Frame Flow Time:

Setup time = 7 hours

Processing time = 6 hours

Storage time = 7 hours

Flow time of the bike frame = 13 hours (7 + 6)

Value-added percentage of the flow time for this bike frame = 6/13 * 100

= 46%

b) Flow time represents the amount of time a bicycle frame spends in the manufacturing process from setup to end.  It is called the total processing time. Unless there is one path through the process, the flow time equals the length of the longest process path.  The storage time is not included in the flow time since it is not a manufacturing process.

After reading the background, please work on the following problem: a. The source process reads information from a file (Therefore, you need to prepare a small text file for testing purpose). b. The source process calls fork() to create the filter process. c. The filter process reads information from the source process (passed via an anonymous pipe), converts the uppercase characters to lowercase ones and vice versa, and then prints out the converted characters to the screen.

Answers

Answer:

Explanation:

The following code is written in Java. It has the main method (source process) and a function called fork() which contains the filter process as described in the question. fork() takes in the file information as a parameter and prints out the information to the screen. The test can be seen with the output in the attached image below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       String data = "";

       try {

           File myObj = new File("C:\\Users\\Gabriel2\\AppData\\Roaming\\JetBrains\\IdeaIC2020.2\\scratches\\input.txt"); //USE YOUR FILE LOCATION

           Scanner myReader = new Scanner(myObj);

           while (myReader.hasNextLine()) {

               data += myReader.nextLine();

               data += "\n";

           }

           myReader.close();

       } catch (FileNotFoundException e) {

           System.out.println("An error occurred.");

           e.printStackTrace();

       }

       System.out.println("Original: \n" + data);

       fork(data);

   }

   public static void fork(String data) {

       String output = "";

       for (int i = 0; i < data.length(); i++) {

           if (Character.isUpperCase(data.charAt(i)) == true) {

               output += Character.toLowerCase(data.charAt(i));

           } else if (Character.isLowerCase(data.charAt(i)) == true) {

               output += Character.toUpperCase(data.charAt(i));

           } else {

               output += data.charAt(i);

           }

       }

       System.out.println("Modified: \n" + output );

   }

}

The menu bar display information about your connection process, notifies you when you connect to another website, and identifies the percentage information transferred from the Website server to your browser true or false

Answers

Answer:

false

Explanation:

My teacher quized me on this

Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be done. Suppose the size of the array is 20, REAR=5. What is the value of the REAR after adding three elements to the queue?

Answers

Answer:

8

Explanation:

Queues can be implemented using linear arrays; such that when items are added or removed from the queue, the queue repositions its front and rear elements.

The value of the REAR after adding 3 elements is 5

Given that:

[tex]REAR = 5[/tex] --- the rear value

[tex]n = 20[/tex] --- size of array

[tex]Elements = 3[/tex] --- number of elements to be added

When 3 elements are added, the position of the REAR element will move 3 elements backward.

However, the value of the REAR element will remain unchanged because the new elements that are added will only change the positioning of the REAR element and not the value of the REAR element.

Read more about queues at:

https://brainly.com/question/13150995

why SSTF disk scheduling is not practically feasible?​

Answers

Answer:

There is a lack of predictability because of the high variance of response time. Additionally, SSTF may cause starvation of some requests. Starvation is possible for some requests as it favors easy to reach requests and ignores the far-away processes.

SSTF disk scheduling is not practically feasible because it makes an external call and is forced to wait for I/O to complete, thereby giving up its first-place position.

What is SSTF disk scheduling?

Shortest Seek Time First (SSTF) is a disc scheduling algorithm that is abbreviated as SSTF. Before moving the head away to service other requests, it selects the request that is closest to the current head location.

Because of the high variance in response time, there is a lack of predictability. Furthermore, SSTF may cause some requests to be denied. Some requests may experience starvation because the system prioritizes nearby requests and overlooks distant operations.

Therefore, because it makes an external call and is obliged to wait for I/O to complete, SSTF disc scheduling is not viable because it loses its first-place status.

To learn more about SSTF disk scheduling, refer to the link:

https://brainly.com/question/23552555

#SPJ2

hi, solution, help me please.​

Answers

Answer:

5hujjibjjjjjnNkzkskskwjejekekdkdkeeioee9

Answer:

is it infinity ? let me know

Which of the following views is the best view to use when setting transition effects for all slides in a presentation?

Answers

Answer:

Slide sorter view

Answer:

Slide sorter view !!!!!

Chất xơ có nhiều trong thực phẩm nào?

Answers

Answer: rau củ quả đều có lượng chất xơ nhiều hơn so với các loại thực phẩn khác

Explanation:

What unit of measurement is used for DIMM read and write times?​

Answers

Answer:

Nanosecond

Explanation:

Nanosecond is used for measuring DIMM read and write times.

which technique is the best to help you manage time better ​

Answers

Answer:

Make a schedule and select certain times to do certain things so that you could have time for more things.

Explanation:

I did the same thing now I can make time for myself.

Other Questions
Due to budget shortages and a critical need of funding to fight a war, Congress enacted a $25 tax on each person flying into an airport in the five most popular vacation destinations in the country, as determined by Congress. The tax was implemented, and officials in the five destinations were outraged, fearing that the number of vacationers to the taxed destinations would decrease due to the tax.If the tax is challenged in federal court by an official with standing, is the most likely result that the tax will be held constitutional?A No, because it makes it significantly more difficult for persons to travel between the states.B No, because the tax unfairly discriminates against certain vacation destinations by taxing them and not taxing other, similar vacation destinations.C Yes, because the tax is necessary to achieve a compelling government interest.D Yes, because Congress has plenary power to impose taxes to raise revenue. Whats the Independent variable for Which Bait works best for a homemade fly trap? Which type of learner is great at seeing relationships between items, pattern recognition, and thinking "outside the box?A)Practical learnerB)Visual leamerC)Auditory learnerD)Physical learner Square Root of 9801With Steps Please The perimeter of Tamara's suitcase is 8x - 3 and the perimeter of Anna's suitcase is3x + 2. Write an algebraic expression that representsthe difference between the perimeter of Tamara's suitcaseand the perimeter of Anna's suitcase? October 15, 2010To:Accommodation ManagerGrand Prince Hotel1629 Byers LaneRedding, CA 96001Dear sir,RE: Reservation of roomI would like to make a reservation of a deluxe room with a double bed in your hotel, Grand Prince, for the dates November 28-30, 2010.This reservation is to be under my name; I shall be arriving with my family, comprising my husband, Mr.James and my child under 10 years old. I would also like to reserve an extra bed for my child. We shall be arriving on November 28 at 2p.m. We hope that the room will be available for us then.Settlement of payment shall be made in full upon our arrival.Please respond with a confirmation on my reservation. Please feel free to contact me soonest possible for any clarifications.Thank you.Yours sincerely,Amanda Jacobs1. What kind of room does the woman want to book?2. How many people does the woman make a reservation for?3. What date will the woman check-in at the hotel?4. What does she request for her kid?5. How long will the guest stay at the hotel? pls help. even if its just one question What is the decay constant for Oxygen-19 if it has a half-life of 26.5s?A)0.0262/sB)18.4C)0.0377/sC)38.2/s Identify the factors that affect the intensity of radiation detected from a radioactive source. Select one or more: The color of the source Type of emission from the source Distance of the detector from the source Type of materials between the source and the detector how to find volume of this prism? (d) Write a short story which ends with, "He caught the gleam of happiness in his eyes and won the competition." please answer urgently which is an example of incomplete dominance?a] A red flower and a yellow flower mating to produce a yellow flower.b] A red flower and a yellow flower mating to produce a red flower.c] A red flower and a yellow flower mating to produce an orange flower.d] A orange flowers mating to produce an orange flower. que es la razon de una figura semejante 1.She did not cheat on the test, _____________ it was not the right thing to do. Describe the last time you had a special meal.You should say:- When and where you had it- What you had- Why it was special to you 8 lb. 9 oz.X 15 _______ Use the following information to prepare a multistep income statement and a balance sheet for Sherman Equipment Co. for 2016. (Hint: Some of the items will not appear on either statement, and ending retained earnings must be calculated.) (Balance Sheet only: Items to be deducted must be indicated with a minus sign.)Salaries Expense $ 69,000 Operating Expenses $ 62,000 Common Stock 100,000 Cash Flow from Investing Activities 78,400 Notes Receivable 24,000 Prepaid Rent 12,500 (short term) Allowance for Doubtful Accounts 7,800 Land 40,000 Uncollectible Accounts Expense 8,100 Cash 48,100 Supplies 1,200 Inventory 98,300 Interest Revenue 5,400 Accounts Payable 46,000 Sales Revenue 320,000 Salaries Payable 12,000 Dividends 3,500 Cost of Goods Sold 148,000 Interest Receivable (short term) 1,500 Accounts Receivable 56,000 Beginning Retained Earnings 81,000 amortization for house costs 35,000.00 at 6.5% interest for 10 years and payments of 400.00 were paid for 36 months what is the remaining balance how do you say hi in French