write a program that is given two integers representing a speed limit and driving speed in miles per hour (mph), calls the function calculate ticket cost() and outputs the traffic ticket amount.

Answers

Answer 1

The program that is given two integers representing a speed limit and driving speed in miles per hour is given below:

The Program

def ask_limit():

  limit = float(input ("What was the speed limit? "))

   return limit

def ask_speed():

   speed = float(input ("What was your clocked speed? "))

   return speed

def findfine(speed, limit):

   if speed > 90:

       bigfine = ((speed - limit) * 5 + 250)

       print "your fine is", bigfine

   elif speed <= limit:

       print "you were traveling a legal speed"

   else:

       fine = ((speed - limit) * 5 + 50)

       print "your fine is", fine

def main():

  limit = ask_limit()

   speed = ask_speed()

   findfine(speed, limit)

main()

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1


Related Questions

Python is an example a blank while blank is an example of a software framework.

Answers

Answer:

programming language.
Middleware

Explanation:

network enables a computer to see other devices on a network and specifies whether that computer can be seen by others.

Answers

Network discovery enables a computer to see other devices on a network and specifies whether that computer can be seen by others.

What is Network discovery?

The term Network discovery is known to be a tool that gives room fro  computers as well as other devices to be seen on a network.

Note that sue to the tool of network discovery, a system is one that can be able to send out messages over any kind of network that is said to be looking for devices that are seen or discoverable.

When the network discovery mode is enabled in a system, it is one that makes it easy for a person to share network resources between the systems of one's choice.

Therefore, Network discovery enables a computer to see other devices on a network and specifies whether that computer can be seen by others.

Learn more about discovery from

https://brainly.com/question/11280561

#SPJ1

network -------- enables a computer to see other devices on a network and specifies whether that computer can be seen by others.

every ad contains a url displaying your website address. you can add two optional path fields to the display url in a text ad. what's an advantage of using these optional path fields?

Answers

The ability to receive a preview of the material one would see after clicking the text ad is one benefit of include these two additional path options in the display URL.

The "Path" fields in expanded text ads are a part of the display URL, which is frequently shown in green font beneath the headline and above the description.

Customers who view your advertisements see a "display path," which is a portion of the URL. These Display Paths can be used in place of the actual URL and are optional. These are used to make it abundantly clear to prospective customers the page they will reach after clicking your advertisement.

The page's URL where your advertisement appears. People can predict their final destination by glancing at display URLs. Usually, there are more details on the landing page that you designate with a final URL.

Learn more about URL:

https://brainly.com/question/1701167

#SPJ4

The purpose of a(n) __________ is to manage the flow of data between hardware components and allow the user to communicate with the computer.

Answers

Answer:

Operating System

Explanation:

management of oral anticoagulants prior to emergency surgery or with major bleeding: a survey of perioperative practices in north america: communication from the scientific and standardization committees on perioperative and critical care haemostasis and thrombosis of the international society on thrombosis and haemostasis

Answers

Communication from the scientific and standardization committees on perioperative and critical care haemostasis and thrombosis of the international society on thrombosis and haemostasis pinpoint anesthesiologists' present practises and knowledge gaps regarding oral anticoagulant reversal during emergency surgery.

Members of the American Society of Anesthesiology were emailed a 22-question survey with weekly reminders addressing several clinical practise facets of oral anticoagulant reversal during data collection from October to December 2018.

A total of 2315 anesthesiologists responded, with 86% of them based in the United States. 60% of the respondents said that emergency surgery was defined as taking place within four hours of the decision to operate.

Despite advice to the contrary, FFP is frequently used for DOAC and VKA reversal in emergency situations. Institutions must establish recommendations and management algorithms that are influenced by guidelines and based on feedback from the medical professionals who regularly handle these patients.

Learn more about haemostatsis:

https://brainly.com/question/12162980

#SPJ4

What prevents a ddr3 dimm from being installed in a ddr2 dimm slot on a motherboard?

Answers

The action that prevents a ddr3 dimm from being installed in a ddr2 dimm slot on a motherboard is The notches on the edge connectors that are found in different locations.

What is a motherboard in a computer?

The motherboard is known to be the framework that acts or functions to ties the computer's part together at one spot and gives room for them to talk to each other.

Note that Without it, none of the other part of the computer, such as the CPU, etc. could interact.

Therefore, The action that prevents a ddr3 dimm from being installed in a ddr2 dimm slot on a motherboard is The notches on the edge connectors that are found in different locations.

Learn more about motherboard  from

https://brainly.com/question/12795887

#SPJ1

What term does don norman use to describe a a story that puts the operation of the system into context, in that, it weaves together all of the essential components, providing a framework, a context, and reasons for understanding?.

Answers

what do you mean ??

didn't get your question ⁉️

A conceptual model is a term that puts the operation of the system into context.

What is Conceptual Model?  

A conceptual model is a representation of a system that is built using concepts and ideas. Many disciplines, including the sciences, socioeconomics, and software development, use conceptual modeling.

It's critical to distinguish between a model of a concept and a conceptual model when utilizing a conceptual model to express abstract notions. To put it another way, while a model is fundamentally unique, it also carries an idea of what it stands for—what a model actually is as opposed to what it represents.

A conceptual model should, in general, achieve the following four key goals:

improving comprehension of the representative system.

Encourage effective communication amongst team members about system details.

Give system designers a point of reference to collect system requirements.

For future use, record the system.

Hence, A conceptual model is a term that puts the operation of the system into context.

To know more about Conceptual Model follow the link.

https://brainly.com/question/20514959

#SPJ5

the part of almost all of today’s computer systems that uses the internet and allows users to greatly expand the capability and usefulness of their information systems.

Answers

The part of almost all of today’s computer systems that uses the internet and allows users to greatly expand the capability and usefulness of their information systems is connectivity.

What is connectivity?

A device to which network cables are connected to form a network segment. Hubs do not typically filter data and instead retransmit incoming data packets or frames to all parts.

Almost all networks today use a central hub or switch to which all network computers connect.

Connectivity is a component of almost all modern computer systems that uses the internet to greatly expand the capability and usefulness of their information systems.

Thus, the correct answer is connectivity.

For more details regarding connectivity devices, visit:

https://brainly.com/question/21442494

#SPJ1

What are F stops? and shutter speeds?

Answers

Answer: A F stop is a camera setting corresponding to a particular f-number.

Shutter speeds is the speed at which the shutter of the camera closes.

Sadly, I'm just here for the points...

in is implementation, which factor can lead to the risk of loss of confidentiality? a. loss of key employees b. poor password practices c. loss of har

Answers

b. Poor password practices is the reason that might result in confidentiality being lost. Weak passwords are the result of bad password habits, which puts data confidentiality at risk. If a password can be quickly deciphered by a computer or human, it is considered weak.

Good passwords are up to 8 characters long, always contain alphanumeric characters, and also contain unusual characters so that neither a human nor a computer can guess them. plus one key Changing passwords every 90 days or less is considered good password practice. Any other method of creating a password is considered to be a bad password practice.

Learn more about password https://brainly.com/question/28114889

#SPJ4

The most common mechanism for implementing multiprogramming was the introduction of the ____ concept, whereby the cpu was notified of events needing operating systems services.

Answers

The most common mechanism for implementing multiprogramming was the introduction of the interrupt concept, whereby the CPU was notified of events needing operating systems services.

What is the Operating system?

An Operating system may be defined as a type of system software that significantly regulates computer hardware and software resources. Apart from this, the operating system also delivers common services for computer programs.

An interrupt concept involves the liberation of a signal to the processor that is emitted by either hardware or software which indicates an outcome that requires immediate awareness. Through this mechanism, the CPU was suddenly notified.

Therefore, the introduction of the interrupt concept was implemented through the mechanism of multiprogramming.

To learn more about the Operating system, refer to the link:

https://brainly.com/question/22811693

#SPJ1


1 GHz Clock Speed of a Dual Core Processor is improved to a 4GHz Dual Core Processor
Effect:

Answers

The CPU is the brain of the computer, there for increasing the speed from 1 GHz to 4 GHz will effectively increase the performance of the computer. The CPU can execute 4 billion cycles a second instead of 1 billion.

A code listed next to the main term in the icd-10-cm alphabetic index is referred to as a?

Answers

A default code is a code listed in the icd-10-cm alphabetic index next to the main term.

A default code Indicates the condition most frequently linked to the main term; or implies that it is an unidentified code for the condition. If a condition is recorded in the medical record with no additional information, such as chronic or acute the default code should be appointed.

The ICD-10-CM conventions are the general rules for using the classification that is independent of the principles. These conventions are included as instructional notes in the ICD-10-CM Tabular List and Alphabetic Index .

To learn more on ICD-10-CM: brainly.com/question/28180442

#SPJ4

when conducting an a/b test to improve a web page’s design, the measure that should be used to determine which page is better is usually (but not always):

Answers

When conducting an A/B test to improve a webpage's design, the measure that should be used to determine the page is better is usually (but not always) is known to be option A) conversion rate.

What is A/B testing?

A/B testing is known to be a kind of  a user experience test or research methodology.

Note that A/B tests is made up of a randomized experiment that is said to have two variants, which are  A and B. It is made up of application of statistical hypothesis testing and others.

Therefore, When conducting an A/B test to improve a webpage's design, the measure that should be used to determine the page is better is usually (but not always) is known to be  A) conversion rate.

Learn more about A/B test from

https://brainly.com/question/25223322

#SPJ1

When conducting an A/B test to improve a webpage's design, the measure that should be used to determine which page is better is usually (but not always)

A) conversion rate

B) number of clicks during the visit

C) time on site

D) traffic

for which reasons does the nurse manager understand that frequent individual and group communication is critical to employee satisfaction? (select all that apply.)

Answers

The reasons that the nurse manager understand that frequent individual and group communication is critical to employee satisfaction is that

It motivates all staff to do their jobs well and go "above and beyond."It provides a shared vision for all staff to work towards. It gives the opportunity for the manager to clarify policies and organizational changes.

What is meant by employee satisfaction?

Employee satisfaction is known to be a term that connote a wider form of a term that is said to be used by the HR industry.

It is one that tends to tell or describe the way that is said to be satisfied or content an employees can be with elements such as their jobs, their employee experience, as well as the organizations they work for.

Therefore, The reasons that the nurse manager understand that frequent individual and group communication is critical to employee satisfaction is that

It motivates all staff to do their jobs well and go "above and beyond."It provides a shared vision for all staff to work towards. It gives the opportunity for the manager to clarify policies and organizational changes.

Learn more about employee satisfaction from

https://brainly.com/question/10735969

#SPJ1

See options below

It motivates all staff to do their jobs well and go "above and beyond."

It provides a shared vision for all staff to work towards. It gives the opportunity for the manager to clarify policies and organizational changes.

It hinders movement

How do digital cameras produce images?
O by exposing chemicals on film to light
O by exposing semiconductors to light
O by exposing magnetic tape to light
O by exposing an electronic sensor to light

Answers

by exposing an electronic sensor to light

Answer:

by exposing an electronic sensor to light

Explanation:

EDGE 2023

What is a risk of using your mobile cell phone or external wlan as a wifi connection point?

Answers

Using your mobile phone or an external WLAN as a wi-fi connection point carries the risk that these devices do not have the necessary security precautions to protect the network from penetration.

The dangers of public WiFi include the ability for any hacker to place or position himself between the user and the connection point due to lax Wi-Fi security.

Note that in this instance, the user is known to be communicating with the hacker, who is claimed to frequently relay the information, rather than the hotspot directly.

As a result, there is a danger involved in using a mobile device or an external WLAN as a wi-fi connection point because these devices lack the necessary security precautions to protect the network from hacking.

Learn more about WLAN:

https://brainly.com/question/27975067

#SPJ4

the university of kingston has hired you to install a private area network for its campus so that students and teachers from various departments can exchange data among themselves. which of the following network models would be best suited for such an institution?

Answers

The network models that would be best suited for such an institution is known as CAN.

How does a CAN network work?

The CAN  is known to be a kind of a peer-to-peer network. This is a term that connote that there is not any master that act to controls when the all the nodes have access to read as well as write data on the CAN bus.

Note that if a CAN node is said to be ready to transmit data, it looks to see if the bus is said to be busy and then it is one that often writes a CAN frame onto the network.

Note that  network model is seen as a kind of database model that is set up as a flexible method to showing objects and their relationships

Therefore, The network models that would be best suited for such an institution is known as CAN.

Learn more about  network models from

https://brainly.com/question/23369075

#SPJ1

In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.

Answers

In addition to performing calculations, spreadsheets organize data that can be sorted and filtered, making the data functional for lists and schedules.

A spreadsheet is a piece of software that allows you to quickly undertake calculations on statistical data, such as summing long columns of figures or calculating percentages and averages.

And whenever any of the actual figures you enter into your spreadsheet change - for example, if you attain desired figures to replace preliminary ones - the spreadsheet will edit all the computations you've completed based on the new figures.

You can also create data visualizations such as charts to show the statistical data you've gathered on a website using a spreadsheet.

To learn more about spreadsheets: brainly.com/question/26919847

#SPJ4

The ________ form factor is distinct from at in the lack of an at keyboard port, replaced with a rear panel that has all necessary ports built in.

Answers

The ATX form factor is distinct from at in the lack of an at keyboard port, replaced with a rear panel that has all necessary ports built in.

What is the ATX form factor?

The ATX stands for Advanced technology extended. It may be characterized as a process of replacement for the older AT and baby AT form factors. This is because ATX deals with the motherboard and power supply configuration specifically.

This format of ATX is primarily developed by Intel in 1995 in order to enhance the previous de facto standards and conditions like the AT design.

Therefore, the ATX form factor is distinct from at in the lack of an at keyboard port, replaced with a rear panel that has all necessary ports built in.

To learn more about the ATX form factor, refer to the link:

https://brainly.com/question/2114613

#SPJ1

Which attack method involves encoding portions of the attack with unicode, utf-8, or url encoding?

Answers

Obfuscation Application is the attack method involves encoding portions of the attack with unicode, utf-8, or url encoding

The most common method of obfuscating is an attack is on encode portions of it with Unicode, UTF-8, or URL encoding. Unicode is a way of displaying special characters, numbers and letters so that they can be displayed correctly regardless of the application.

Obfuscation application is the type of attack where attackers normally work hard to hide their attacks and remain undetected. Host-based IDSs and networks are always on the lookout for indicators of well-known attacks, prompting attackers to seek alternative methods of remaining undetected.

Learn more Obfuscation application: brainly.com/question/12947118

#SPJ4

create a project folder lab02 with a program in python named: studentrecords your program must ask the user for only one time the following information: studentid [6 numbers] name [string of characters] last name [string of characters] age [integer number] address [string of characters] phone number [10 integer numbers] ---> later on during the semester we will enter this field as a string in the format xxx-xxx-xxxx

Answers

The python folder that asks the user for only one time his student information is given below:

The Python Code

print("-----Program for Student Information-----")

D = dict()

n = int(input('How many student record you want to store?? '))

# Add student information

# to the dictionary

for i in range(0,n):

   x, y = input("Enter the complete name (First and last name) of student: ").split()

   z = input("Enter contact number: ")

  m = input('Enter Marks: ')

   D[x, y] = (z, m)

   

# define a function for shorting

# names based on first name

def sort():

   ls = list()

   # fetch key and value using

   # items() method

   for sname,details in D.items():

     

       # store key parts as an tuple

       tup = (sname[0],sname[1])

       

       # add tuple to the list

       ls.append(tup)  

       

   # sort the final list of tuples

   ls = sorted(ls)  

   for i in ls:

     

       # print first name and second name

      print(i[0],i[1])

   return

 

# define a function for

# finding the minimum marks

# in stored data

def minmarks():

   ls = list()

   # fetch key and value using

   # items() methods

   for sname,details in D.items():

       # add details second element

       # (marks) to the list

       ls.append(details[1])  

   

   # sort the list elements  

   ls = sorted(ls)  

   print("Minimum marks: ", min(ls))

   

   return

 

# define a function for searching

# student contact number

def searchdetail(fname):

   ls = list()

   

   for sname,details in D.items():

     

       tup=(sname,details)

       ls.append(tup)

       

   for i in ls:

       if i[0][0] == fname:

           print(i[1][0])

   return

 

# define a function for

# asking the options

def option():

 

   choice = int(input('Enter the operation detail: \n \

   1: Sorting using first name \n \

   2: Finding Minimum marks \n \

   3: Search contact number using first name: \n \

   4: Exit\n \

   Option: '))

   

   if choice == 1:

       # function call

       sort()

       print('Want to perform some other operation??? Y or N: ')

       inp = input()

       if inp == 'Y':

           option()

           

      # exit function call  

       exit()

       

   elif choice == 2:

       minmarks()

       print('Want to perform some other operation??? Y or N: ')

       

       inp = input()

       if inp == 'Y':

           option()

       exit()

       

   elif choice == 3:

       first = input('Enter first name of student: ')

       searchdetail(first)

       

       print('Want to perform some other operation??? Y or N: ')

       inp = input()

       if inp == 'Y':

           option()

           

       exit()

   else:

       print('Thanks for executing me!!!!')

       exit()

       

option()

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

describe a recursive algorithm for finding the maximum element in an array a of n elements. what is your running time and space usage?

Answers

A recursive approach to finding the maximum element in the array is given below:

Approach:  Get the array for which the maximum is to be foundRecursively find the maximum according to the following: Recursively traverse the array from the end

Base case: If the remaining array is of length 1, return the only present element i.e.

arr[0]

if(n == 1)

  return arr[0];

The Program Implementation

// Recursive C++ program to find maximum

#include <iostream>

using namespace std;

// function to return maximum element using recursion

int findMaxRec(int A[], int n)

{

  // if n = 0 means whole array has been traversed

   if (n == 1)

       return A[0];

   return max(A[n-1], findMaxRec(A, n-1));

}

// driver code to test above function

int main()

{

   int A[] = {1, 4, 45, 6, -50, 10, 2};

   int n = sizeof(A)/sizeof(A[0]);

   cout <<  findMaxRec(A, n);

   return 0;

}

Read more about recursive algorithms here:

https://brainly.com/question/489759

#SPJ1

how would one declare a variable err that can appropriately receive returned value of a cuda api call?

Answers

A person can declare a variable err that can appropriately receive returned value of a CUDA API call by the use of cudaError t_err;

What is Proper CUDA Error Checking?

Proper CUDA error checking is known to be very vital for creating the CUDA program development to be very smooth as well as to be successful.

Note that Missing or incorrectly found CUDA errors could lead to problems in the making as well as waste a lot of time of one trying to debug.

Therefore, A person can declare a variable err that can appropriately receive returned value of a CUDA API call by the use of cudaError t_err;

Learn more about programming from

https://brainly.com/question/16936315

See full question below

How would one declare a variable err that can appropriately receive returned value of a CUDA API call?

int err;

cudaError err;

cudaError t_err;

cudaSuccess t_err;

To what extent does w. e. b. dubois's argument still apply to the contemporary prison system?

Answers

W. E. B. DuBois's "The Souls of Black Folk" is an important work that continues to resonate today. In it, DuBois argues that the black experience in America is fundamentally different from that of whites, and that this difference is the result of racism. He further argues that the black community must develop its own institutions and culture in order to thrive.

DuBois's arguments are as relevant today as they were when he wrote them. The contemporary prison system is a clear example of how racism continues to impact the lives of black Americans. Black people are disproportionately incarcerated, and the conditions in many prisons are abysmal. The lack of access to education and opportunities for rehabilitation means that many black Americans are effectively condemned to a life of poverty and despair.

DuBois's work is a call to action for black Americans to create their own institutions and to fight for their rights. The contemporary prison system is a clear example of how much work still needs to be done.

Learn more on black Americans here:

https://brainly.com/question/25102754

#SPJ4

click on file to save the changes in a file save print save as close​

Answers

Answer:

your answer is same save

What major trade network allowed china to trade items and technology (like guns) with eurasia?

Answers

The major trade network that makes China allowed to trade items and technology with Eurasia is Silk Roads. A network of Eurasian commercial routes known as the Silk Road operated from the second century BCE to the middle of the 15th century.

The Silk Road length of more over 6,400 kilometers (4,000 miles) was crucial in promoting East-West connections in terms of politics, religion, and culture. The term "Silk Road," which was first used in the late 19th century, has become less popular among contemporary historians in favor of the term "Silk Routes," which better captures the intricate network of land and sea routes linking East and Southeast Asia, the Indian subcontinent, Central Asia, the Middle East, East Africa, and Europe.

Learn more about The Silk Road https://brainly.com/question/6668560

#SPJ4

A photographer is taking photos indoors under incandescent bulbs which give off an orange tone. He is trying to remove the orange tone from the photo. Which white balance setting should he use to achieve this?

Daylight
Tungsten
Shady
Cloudy

Answers

Answer:

Tungsten

Explanation:

This tends to be the best option for photographing indoors, especially under warm tungsten lighting. The Tungsten setting is often symbolized by a little bulb. It's used to cool down the Color Temperature in your image.

What must your motherboard have to use bitlocker encryption in windows 7/8/10 which will ensure that your hard drive cannot be used in another computer?

Answers

Your motherboard has a TPM chip to use BitLocker encryption in windows 7/8/10, which will ensure that your hard drive cannot be used on another computer.

A TPM chip, a special motherboard chip for features like BitLocker and Windows Hello, provides hardware encryption. Most motherboards available for purchase do not, however, come with a dedicated chip, but many do have firmware that can mimic TPM functionality in Windows.

TPM chip stores encryption keys, certificates and passwords among others, used to authenticate your personal computer or laptop. TPM chip improves computer privacy and security by protecting authentication credentials, protecting data, and proving software running basic functionalities.

Learn more about a TPM chip: brainly.com/question/10738411

#SPJ4

____________________ is a storage technology that deals with how data is spread across multiple disks for both increased availability and improved performance.

Answers

RAID is a storage technology that deals with how data is spread across multiple disks for both increased availability and improved performance.

What is RAID?

RAID is known to be a kind of a data storage virtualization machine or tech that helps to join  a lot of physical disk drive parts into one or more logical units for the aim of data redundancy, performance boast, or both.

Note that RAID  means redundant array of independent disks and it is seen as a way of saving  the same data in a lot of places on a lot of hard disks or solid-state drives.

Therefore, RAID is a storage technology that deals with how data is spread across multiple disks for both increased availability and improved performance.

Learn more about RAID from

https://brainly.com/question/26070725

#SPJ1

Other Questions
Tom made $171 for 9 hours of work. At the same rate, how many hours would he have to work to make 323 ? What event did the American Industrial Revolution follow . A parabola opening up or down has vertex (0, 1) and passes through (12, -17). Write itsequation in vertex form.Simplify any fractions. Describe the arrangement of the water molecule to molecule with one another Which of the following economic systems is the most common?Group of answer choicescommandmarketmixedtraditional darnell is planning to rent a booth at a trade show specifically for veterinarians. darnells company offers benefits like discounts on supplies, access to group health insurance, and other resources for self-employed veterinarians. judging by the number of veterinarians who are self-employed, what number of attendees at the trade show would most likely be interested in darnells booth? A patient with acute kidney injury (aki) has longer qrs intervals on the electrocardiogram (ecg) than were noted on the previous shift. which action should the nurse take first? huntington's disease is caused by a dominant allele (h) at an autosomal gene. the disease causes neurodegeneration, and people that have it often die at a young age. you are studying a population and find that the frequency of genotype hh is 0.09. what change might you expect to see in this population over time? the hypotenuse of an isosceles right triangle is $4\sqrt{2}$ units. how many square units are in the area of the triangle? Which sentence has the MOST objective tone?1- I cant agree with the poet that April is a cruel month.2- The Northeast has at least five months of cold weather, which is four months too many.3- We have a long, dreary wait until the beginning of spring.4- The northern United States is statistically colder for longer than the South. Perimeter < 18.7 feet4,1 ft4.9 ft/6.4 ftx ftInequality:Solution: What fraction of 1 is 17p? a dose was increased from 250 to 500 milligrams. what is the percent increase??I got 1, so can anyone confirm if it's right or not please you and a friend are studying for a chemistry exam. what if your friend tells you, "since exothermic processes are favored and the sign of the enthalpy change tells us whether or not a process is endothermic or exothermic, the sign of dhsoln tells us whether or not a solution will form"? how would you explain to your friend that this conclusion is not correct? what part, if any, of what your friend says is correct? How can social justice help to fight social challenges considered the founder of the modern study of psychopathology, he was the first physician to specialize in mental illness. he believed that the mind was as susceptible to sickness as the body was. joshua is running a sprint. of the four key items to help make a sprint successful, which key item and tool are used to show progress? the first step in budgeting is to evaluate your current financial position by looking at just your income and expenses. Multiply.simplify your answer and write it as a mixed number 57/8 What value of the unknown exponent makes [tex]13 { }^{?} = \frac{1}{13 {}^{ - 2} } [/tex]true?