2. Dorothy has three major routes to take to work. She can take Tennessee Street the entire way, she can take several back streets to work or she can use the Expressway. The traffic patterns are very complex, however under good conditions, Tennessee Street is the fastest route. When Tennessee is congested, one of the other routes is usually preferable. Over the past two months, Dorothy has tried each route several times under different traffic conditions. The information is summarized in the following table: No Traffic Congestion (Minutes) | Mild Traffic Congestion (minutes) | Severe Traffic Congestion (Minutes) Tennessee Street 15 | 30 | 45
Back Roads 20 | 25 | 35
Expressway 30 | 30 | 20
In the past 60 days, Dorothy encountered severe traffic congestion 10 days and mils traffic congestion 20 days. Assume that the last 60 days are typical of traffic conditions.
a) Complete the decision table. b) 30 25 30 Severe Traffic Congestion (Minutes) 45 35 30 In the past 60 days, Dorothy encountered severe traffic congestion 10 days and mild traffic congestion 20 days. Assume that the last 60 days are typical of traffic conditions. What route should Dorothy take if she wants to minimize her average driving time? c) Dorothy is about to buy a radio for her car that would tell her the exact traffic conditions before she started out to work each morning. How much time, in minutes, on average would she save by buying a radio?

Answers

Answer 1

a) The decision table can be completed as follows:

| Traffic Conditions         | Tennessee Street | Back Roads | Expressway |
|----------------------------|------------------|------------|------------|
| No Traffic Congestion     | 15               | 20         | 30         |
| Mild Traffic Congestion   | 30               | 25         | 30         |
| Severe Traffic Congestion | 45               | 35         | 20         |

b) To minimize her average driving time, Dorothy should choose the route with the shortest time under each traffic condition. Based on the information provided, the route that minimizes average driving time is as follows:

- No Traffic Congestion: Tennessee Street (15 minutes)
- Mild Traffic Congestion: Back Roads (25 minutes)
- Severe Traffic Congestion: Expressway (20 minutes)

c) By buying a radio that provides exact traffic conditions, Dorothy would be able to choose the fastest route based on real-time information. Assuming the last 60 days are typical of traffic conditions, she encountered severe traffic congestion on 10 days and mild traffic congestion on 20 days. By using the radio to avoid congestion, she could potentially save an average of (10 * 25) + (20 * 5) = 250 + 100 = 350 minutes over the course of 60 days. would be able to choose the fastest route based on real-time information. Assuming the last 60 days are typical of traffic conditions, she encountered severe traffic congestion on 10 days and mild traffic congestion on 20 days. By using the radio to avoid congestion, she could potentially save an average of (10 * 25) + (20 * 5) = 250 + 100 = 350 minutes over the course of 60 days.

 To  learn  more    Dorothy click on:brainly.com/question/465890

#SPJ11


Related Questions

Question #4
Multiple Choice
You can create a file for a new program using which steps?
O File, Recent Files
O File, Open
O File, New File
O File, Open Module

Answers

Answer:

File, Open

Explanation:

A computer program is a collection of instructions written in a programming language that a computer can execute. The correct option is C.

What is a computer program?

A computer program is a collection of instructions written in a programming language that a computer can execute. The software contains computer programs as well as documentation and other intangible components.

You can create a file for a new program using the File menu, and then by selecting the New File option from the file menu.

Hence, the correct option is C.

Learn more about Computer programs:

https://brainly.com/question/14618533

#SPJ2

A ________ is content structure that has emerged from the processing of many user tags. A) mashup B) taxonomy C) folksonomy D) microblogging

Answers

Answer:

A folksonomy is the content structure that has emerged from the processing of many user tags.

Explanation:

Please give the brainliest.

describe the possible problems resulting from the limitations in the resources in a computer system.

Answers

Slow performance: Insufficient memory, processing power, or storage space can cause the computer to run slowly or even freeze.Inability to run certain programs or tasks: Some programs or tasks may require more resources than the computer can provide, leading to errors or crashes.Decreased efficiency: Limited resources may force the computer to spend more time processing tasks, reducing overall efficiency and productivity.Hardware failure: Overuse of limited resources can lead to hardware failure, such as hard drive crashes or overheating.Security risks: Lack of resources can make a computer more vulnerable to security threats such as viruses and malware.Inability to upgrade or expand: If a computer system has limited resources, it may not be possible to upgrade or expand it to meet future needs.

Performance degradation,Data loss,Security issues.

Describe the possible problems resulting from the limitations?

A computer system's limitations in resources can cause a variety of problems. The following are some of the potential problems that may arise:

Performance degradation:

When a system is low on resources, it may begin to slow down or become unresponsive. Programs may take longer to load, and simple tasks may take longer to complete.

Program crashes: Programs may become unstable and crash more frequently if there are insufficient system resources. This may cause data loss, and the program may be unable to recover from the crash.

Data loss:

If a program crashes, any data that was not saved may be lost. If the system runs out of memory or storage, data may be lost. This may result in critical files becoming inaccessible.

System errors: When a system lacks resources, it may generate error messages. These messages can be vague and difficult to interpret, making troubleshooting more difficult. Some errors may cause the system to stop working entirely.

Security issues:

When a system lacks resources, it may become more vulnerable to security threats. For example, an attacker could exploit a vulnerability in a program that has crashed and is not functioning correctly. Alternatively, the system may not have the resources to run security software, leaving it unprotected.

Learn more about troubleshooting.

brainly.com/question/30048504

#SPJ11

Fill in the blank
A colleague excitedly tells you she has created an interface component for SPSS, a statistics software program. She has created a ______.

Answers

Answer:

Software

Explanation:

because softwares are always created to solve a particular problem or challenges

Which of these are part of the CPU?
O peripheral
O HDMI cord
O core
O keyboard

Answers

Hiii I think the best option would be C. Core

1) Assume you are adding an item 'F' to the end of this list (enqueue('F')). You have created a new linear node called temp that contains a pointer to 'F'. Also assume that in the queue linked list implementation, we use the variable numNodes to keep track of the number of elements in the queue.

Answers

When a new item 'F' is added to the end of the queue list (enqueue('F')), a new linear node is created called temp that contains a pointer to the new element. In a queue linked list implementation, the variable numNodes is used to keep track of the number of elements in the queue.

As a result, we increment the numNodes variable by 1 since a new item has been added to the queue list. The pointer at the tail of the queue is then updated to the newly added node temp. We can do this by assigning the new node temp to the current node that is being referenced by the tail pointer.

Next, if the queue was previously empty, then we set both the head and tail pointers to temp. If the queue wasn't empty, we leave the head pointer unmodified, since the element added is being added to the end of the queue. We then return the updated queue list with the newly added item 'F'.In summary, when adding a new item 'F' to the end of a queue list implementation, we first create a new node that points to the new element.

To know more about mplementation visit:

https://brainly.com/question/32092603

#SPJ11

List out first 10 decimal equivalent numbers in binary, octal
hexadecimal number systems.

Answers

Answer:

Explanation:Base 10 (Decimal) — Represent any number using 10 digits [0–9]

Base 2 (Binary) — Represent any number using 2 digits [0–1]

Base 8 (Octal) — Represent any number using 8 digits [0–7]

Base 16(Hexadecimal) — Represent any number using 10 digits and 6 characters [0–9, A, B, C, D, E, F]

In any of the number systems mentioned above, zero is very important as a place-holding value. Take the number 1005. How do we write that number so that we know that there are no tens and hundreds in the number? We can’t write it as 15 because that’s a different number and how do we write a million (1,000,000) or a billion (1,000,000,000) without zeros? Do you realize it’s significance?

First, we will see how the decimal number system is been built, and then we will use the same rules on the other number systems as well.

So how do we build a number system?

We all know how to write numbers up to 9, don’t we? What then? Well, it’s simple really. When you have used up all of your symbols, what you do is,

you add another digit to the left and make the right digit 0.

Then again go up to until you finish up all your symbols on the right side and when you hit the last symbol increase the digit on the left by 1.

When you used up all the symbols on both the right and left digit, then make both of them 0 and add another 1 to the left and it goes on and on like that.

If you use the above 3 rules on a decimal system,

Write numbers 0–9.

Once you reach 9, make rightmost digit 0 and add 1 to the left which means 10.

Then on right digit, we go up until 9 and when we reach 19 we use 0 on the right digit and add 1 to the left, so we get 20.

Likewise, when we reach 99, we use 0s in both of these digits’ places and add 1 to the left which gives us 100.

So you see when we have ten different symbols, when we add digits to the left side of a number, each position is going to worth 10 times more than it’s previous one.

What are users unable to do in the user interface of PowerPoint 2016?

Add additional tabs on the ribbon.
Customize the default tabs on the ribbon.
Fully customize newly added tabs on the ribbon.
Use global options to customize newly added tabs on the ribbon.

Answers

Answer:

B. Customize the default tabs on the ribbon

The other answer is in correct

Explanation:

I took the unit test review and got 100%

edge 2020

it’s customize, just took the test :)

2. How does the traditional approach to network design differ from the building block approach?

Answers

The traditional approach to network design involves designing a network from scratch, taking into consideration all the necessary components such as hardware, software, and network protocols.

This approach requires a deep understanding of network architecture and infrastructure and can be time-consuming and complex. On the other hand, the building block approach to network design involves using pre-built components to create a network. This approach involves selecting pre-configured hardware and software that fit the needs of the organization and integrating them into the existing infrastructure. This approach is generally faster and less complex than the traditional approach.

The key difference between these two approaches is the level of customization and control. With the traditional approach, the organization has complete control over the network design and can customize it to meet specific requirements. However, this approach is often more expensive and time-consuming. The building block approach, on the other hand, offers less customization but is more cost-effective and faster to implement. Ultimately, the approach that an organization chooses will depend on its specific needs and budget. While the traditional approach may be the best option for some organizations, the building block approach can be a viable alternative for others looking for a faster and more cost-effective solution.

Learn more about network here: https://brainly.com/question/13102717

#SPJ11

Using properties of Boolean algebra, simplify the following Boolean expressions so they could be built with the minimum number of gates. a. a. X= A + BC + AB + ABC + B b. Y = AB + B(AC + BC + ABC' + A) c. W = ABC' + AB'C' + B'CD + A'C + BC d. Z = (A + B')' + (ABC')' +A(B + A'C)'

Answers

Let's analyze the given Boolean expression X = A + BC and simplify it using Boolean algebra X = A + BC.

How Can the Bolean expression  X be simplified further?

The given Boolean expression X can be simplified to X = A + BC using the properties of Boolean algebra. This expression represents the logical OR operation between A and BC.

The term AB, ABC, and B can be eliminated as they are redundant and not required to achieve the desired logic. Simplifying the expression to its minimal form reduces the number of gates required for implementation, optimizing the circuit.

Starting with the given expression X = A + BC, we can observe that the terms AB, ABC, and B are redundant. This is because the inclusion of these terms does not affect the overall logic of the expression.

In Boolean algebra, the OR operation (represented by the '+' symbol) evaluates to true if any of its inputs are true. Therefore, adding redundant terms does not change the logical outcome.

Learn more about Boolean expression X

brainly.com/question/28330285

#SPJ11

Most online learners can save money by obtaining digital versions of textbooks, known as:_________

Answers

Most online learners can save money by obtaining digital versions of textbooks, known as eBooks.

What eBook means?

The term  e-book is known to be a book that is said to be made and produced with the aim to or for reading on a computer screen.

Note that an E-book is seen as a kind of an abbreviation for 'electronic book and as such, Most online learners can save money by obtaining digital versions of textbooks, known as eBooks.

Learn more about eBooks from

https://brainly.com/question/27219872

#SPJ1

which of the following is not a cloud computing security issue? a. system vulnerabilities b. bandwidth utilization c. compliance regulations d. insecure apis

Answers

"bandwidth utilization." This is not a security issue in cloud computing, but rather a performance or cost issue. System vulnerabilities, compliance regulations, and insecure APIs are all significant security concerns in cloud computing.

Bandwidth utilization refers to the amount of data being transferred between the cloud and the user, and while it can impact performance and costs, it is not a security issue. System vulnerabilities, such as unpatched software or weak authentication, can expose sensitive data to unauthorized access or attacks. Compliance regulations require organizations to meet specific security and privacy standards, which can be challenging to achieve in the cloud. Insecure APIs can allow attackers to gain access to cloud services and data. Therefore, it is crucial to address these security issues to ensure the confidentiality, integrity, and availability of cloud computing.

learn more about cloud computing here:

https://brainly.com/question/29737287

#SPJ11

how the robots made????

Answers

I don’t know I just don’t

Answer:

Using certain circuitry, a robot can be made using systems that are wired to fix or perform a function. The production of each robot is different depending on what it’s function is for. Many parts are extracted from elements which come in several forms, like silicon, or iron and aluminium.

Drones are robots that use IMU, gyro stabilization and flight controller technology.

(I'm not sure what you need, but I hope this helps) If you were asking something else, please comment and let me know.

______ consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them.

Answers

Answer: Managing Memory

Explanation:

Hope this helps!

Flight tracker assignment 9 on project stem answer

Answers

Answer:

ExplanaPls answer this

do atleast 3 paragraphs

thanks so much

worth 100 pointstion:

The calendar is a system used to organize and keep track of time. It consists of a series of months, each with a specific number of days, and is used to mark important dates such as holidays and events.

What are the most common calender?

The most commonly used calendar is the Gregorian calendar, which has 12 months, with a varying number of days in each month. To keep track of the year, the calendar also has a system of leap years to account for the extra time it takes for the Earth to orbit the sun.

The calendar has been used for centuries as a way to organize society and plan events. It is important for individuals to have an understanding of the calendar and how it works to effectively plan their lives and schedules.

With the advancement of technology, calendars have become digital and can be easily accessed through smartphones and other electronic devices. understanding the calendar is an important skill for individuals to have in order to effectively manage their time and plan for important events in their lives.

To learn more about system click the link below:

brainly.com/question/18168133

#SPJ2

Will give brainliest if answered right

Will give brainliest if answered right

Answers

Answer:

control shift u

Explanation:

Answer:

I believe U is the answer.

A name given to a spot in memory is called:

Answers

Answer:

Variable

Explanation:

I'll answer this question in computing terms.

The answer to this question is a variable. Variable can be seen as memory location or spots.

They can be compared to the containers (in real world). Variables are used to store values same way containers are used to store contents.

In computing, a variable must have a

NameTypeSizeetc...

what is performance in the context of computer systems and why is it so difficult to define?

Answers

In the context of computer systems, performance refers to the capability of a computer or a software to carry out a specific task or a set of tasks within a stipulated period of time. In simpler terms, it is a measure of how well a computer system operates and performs a particular job.

It is difficult to define performance because it is a broad term that depends on various factors that affect computer systems’ performance. The factors that affect performance can be hardware or software related. For instance, the processing speed of a computer system is dependent on the type of processor, RAM size, storage capacity, and the number of CPUs the system has.

On the other hand, software performance is determined by factors such as code efficiency, algorithmic complexity, and the amount of processing power it requires. Therefore, the difficulty of defining performance in computer systems is that it is a complex and dynamic process that is affected by many variables. computer systems are designed to perform multiple tasks concurrently, making it challenging to define performance. Ultimately, computer performance is a significant consideration for system developers, users, and organizations since it determines the effectiveness and efficiency of the system.

To know more about systems visit:

https://brainly.com/question/19843453

#SPJ11

Fill in the blanks to complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0. Complete the code so that a function call like “countdown(2)” will return the numbers “2,1,0”.

Answers

Answer:

Check the code down below

Explanation:

You can use this code:

for i in range(5,-1,-1):

print(i)

This will print:

5

4

3

2

1

0

5 is changeable by the way!

The complete the “countdown” function. This function should begin at the “start” variable, which is an integer that is passed to the function, and count down to 0 is in the explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Here is the code to complete the “countdown” function:

def countdown(start):

   for i in range(start, -1, -1):

       print(i, end=",")

The countdown function takes an integer start as an argument and counts down from start to 0 using a for loop.

The range function is used to generate an integer sequence from start to 0, with a step size of -1. (i.e., counting backwards).

Thus, each integer in the sequence, separated by commas, is printed using the print function.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

write a paragraph on plastic and pollution within 100 words

Answers

Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.

Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.

Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.

Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.

Most importantly, plastic pollution harms the Marine life. The plastic litter in the water is mistaken for food by the aquatic animals. They eat it and die eventually. For instance, a dolphin died due to a plastic ring stuck in its mouth. It couldn’t open its mouth due to that and died of starvation. Thus, we see how innocent animals are dying because of plastic pollution.

In short, we see how plastic pollution is ruining everyone’s life on earth. We must take major steps to prevent it. We must use alternatives like cloth bags and paper bags instead of plastic bags. If we are purchasing plastic, we must reuse it. We must avoid drinking bottled water which contributes largely to plastic pollution. The government must put a plastic ban on the use of plastic. All this can prevent plastic pollution to a large extent.

Answer:

Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.

Uprise of Plastic Pollution

Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.

Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.

Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.

You have an azure subscription that includes the following web apps: webapp1, which runs code in a windows operating system. Webapp2, which runs code in a linux operating system. Webapp3, which runs in a docker container on windows. Webapp4, which runs in a docker container on linux. From which web apps can you use webjobs?.

Answers

We can see here that the web apps that you can use for WebJobs are: D. WebApp1, WebApp2, WebApp3 and WebApp4.

What is a web app?

A web app is actually known as a web application. It is a application software that is accessed with use of a web browser. In other words, web application used a browser interface. It is used in web services.  

We see that the frontend of a web application are usually created using languages. An Azure subscription can be used to access web apps as shown above.

Below is the complete part of the question:

From which web apps can you use WebJobs?

Select only one answer.

A. WebApp1 only

B. WebApp1 and WebApp2 only

C. WebApp1 and Web3 only

D. WebApp1, WebApp2, WebApp3 and WebApp4

Learn more about web application on https://brainly.com/question/28565122

#SPJ1

someone please tell me please y my ps4 controller won’t charge:(

Answers

Answer:

charge it

Explanation:

Answer:

maybe cus u play alot⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀

Type the correct answer in the box. Spell all words correctly.
Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?
To prevent strain and key correctly, Ben should
his fingers gently over the keys with his wrist in a flat position.

Answers

Explanation:

Type the correct answer in the box. Spell all words correctly.

Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?

To prevent strain and key correctly, Ben should use his fingers gently over the keys with his wrist in a flat position.

help me and i'll mark brainliest

help me and i'll mark brainliest

Answers

Answer: Help you with what

Explanation: This is so random lol but i guess im getting brain points or sum like that

Transferring data from a remote computer to a local computer is .....​

Answers

The answer is uploading

what is authenticity​

Answers

Answer:

the quality of being authentic

Explanation:

the type of secondary storage device that uses rigid metallic platters to store programs and very large data files.

Answers

The type of secondary storage device that uses rigid metallic platters to store programs and very large data files is a hard disk.

Hard disks use rigid metallic platters that provide a large amount of storage capacity. They store data and programs by altering the electromagnetic charges on the platter's surface. Hard disks are typically used to store programs and very large data files , and are often used as the primary storage device in a computer system.

A hard disk is a non-volatile storage device used to store digital data. It contains one or more spinning platters that are coated with magnetic material. When the disk spins, a read/write head moves across the platters, which can magnetically read and write data. Hard disks are used for long-term storage of large amounts of data, and are typically much larger than other storage devices like RAM, USB flash drives, and solid-state drives. Hard disks are also relatively inexpensive and are often used in computers, laptops, and other devices for long-term storage.

Learn more about hard disk:

https://brainly.com/question/28476555

#SPJ4

4. How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use "coding" or creating programs outside of computer science and explain how it uses coding-related concepts.

Answers

Answer:

a production plant

Explanation:

"Coding" brings with it a linear way of thinking and problem solving, where one step needs to be taken before moving on to the next step. This can be applied to a wide range of real-life scenarios and industries. For example, a production plant starts with an initial input, that input is taken and used in a set of instructions (method), those instructions take that input and create a new output. Once the new output is created it is then passed on to another set of instructions that takes that output as an input to create a new output. Just like a computer program, a power plant repeats this process in order to a fully working and realized product.

Cisco’s encrypted packet analysis is a significant accomplishment and provides advanced security protection against existing malware. but threats evolve. how might malicious actors adapt to the availability of this new defensive tool?

Answers

Advanced security is used to augment the global risk map and the data pieces from encrypted traffic analytics. Secure Network Analytics uses machine learning techniques to identify dangerous patterns.

What are the incident response and threat-hunting platforms from Cisco?

A broad range of proactive and urgent services are offered by Cisco Talos Incident Response (CTIR) to assist you in being ready for, responding to, and recovering from a breach. The largest threat intelligence and research organization in the world, Cisco Talos, is directly accessible through CTIR, providing 24-hour emergency response capabilities.

The Cisco Advanced malware protection for endpoints solution offers which feature?

The Cisco Advanced Malware Protection (AMP) for Endpoints program works to stop threats at their source and eventually keeps track of all incoming packets. It can recognize sophisticated threats, such as ransomware and file-less malware.

to know more about Cisco’s encrypted here:

brainly.com/question/29222723

#SPJ1

Files that are stored on your server are known as:
transferred files
remote files
root files
local files

Answers

Files that are stored on your server are known as: D. local files.

What is a file?

A file can be defined as a computer resource or type of document that avails an end user the ability to save or record data as a single unit on a computer storage device.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

In Computer technology, local files simply refer to a terminology which is used to describe and connote all files that are stored on your server.

Read more on files here: brainly.com/question/6963153

#SPJ1

Other Questions
what do you think your strengths and weaknesses working online which steps are recommended for establishing a process or method for making decisions? (choose every correct answer.) Given: ABCD s a parallelogram GEC HFA and AE FC.Prove GEC HFA. This data is an example of A. a linear functionB. a nonlinear functionC. neither a linear nor nonlinear function - it is not afunction at all Notah is a Native American who avoids going to a pub with friends because he's wary that people often think that because he's Native American he's also an alcoholic, and will judge him consistent with that belief. Notah's behavior is best explained by the concept of ________________. baxley brothers has a dso of 34 days, and its annual sales are $5,475,000. what is its accounts receivable balance? assume that it uses a 365-day year. round your answer to the nearest dollar. The person responsible for maintaining the company laser printer if out of the office. You are told to service the laser printer? Which part of the printer should you avoid touching and why?Fuser. One of its two rollers is a heated roller. Here are 2 points in the plane.Using only a straightedge,can you find points in the plane that are the same distance from points A and B. Explain your reasoning What two factors impact the KE of a system?Mass and velocityWeight and velocityMass and weightVelocity and heightPlease choose the correct answer. What are the pros and cons of having cameras in court? Quick 50 points brainliestA biologist is studying the growth of a particular species of algae. She writes the following equation to show the radius of the algae, f(d), in mm, after d days:f(d) = 11(1.01)dPart A: When the biologist concluded her study, the radius of the algae was approximately 11.79 mm. What is a reasonable domain to plot the growth function? (4 points) Pls just order the temps I suck at temperature 8.4 degrees C below zero 10.9 degrees C below zero 8.8 degrees C She said "is it raing now?" The nurse is functioning as a liaison within a local clinic. What action is the nurse performing in this role?1. Serving as initial point of contact between client and agency.2. Coordinating and directing the use of health care services.3. Organizing and integrating services.4. Creating alliances of individuals or groups to achieve a specific purpose. By 1935, how did many american radicalsincluding communists and socialistsrespond to the new deal? Why should an acid be handled with caution In circle H with the measure of a minor arc GJ = 30, find m 5. How does the author's inclusion of the poem within the poem(Lines 32-35) develop the theme of the text?Mothers by Nikki giovanni What is the solution to 2.1(2.3 + 2.1x)= 11.65 + x?A . 4.5B . 1.5C . 3D . 2 You are working as an Accountant for a new merchandiser established by Elon Scent on January 1, 2022. Mr. Scent is a very rich entrepeneur only interested in profits and making sure his new venture runs smoothly. His new merchandise company is called Tongass and they buy many items from vendors and then re-sell them for a profit online. The inventory is held for sale in big warehouses. Mr. Scent likes to implement technology everywhere and even has robots picking up items from the warehouse and putting them in boxes. Suffice to say he has invested millions in this new venture. Everytime a new inventory item comes in, it gets scanned by the system and put into the inventory system for accounting records. Everytime there is a sale, each item gets scanned by the system before it is placed on a box and shipped. As you may be aware, the company uses a Perpetural Inventory System maintained by robots scanning every item as soon as it enters or leaves the warehouse. At the end of each month, inventory is manually counted as well, and the manual count is compared to the systems. After 5 months in operation (it is now the beginning of June), the accountants meet with Mr. Scent to discuss inventory. It seems in all the past 5 months, the manual inventory count does not match the count provided by the system. In response to this news, Mr. Scent says, "That's an easy problem to fix. We'll just stop manually counting inventory at the end of each month. If there are differences between the system and what was counted, it must mean that the employees were counting wrong. After all, computers are never wrong. This is great news! We can use the time the employees were counting for more productive work." INSTRUCTIONS: Create a thread in which you write what you would say to Mr. Scent regarding this situation. Please be tactful and professional. Mr. Scent may not be the most professional and empathetic person, but you are. Make sure you answer the following questions: Why if there is a perpetual system where inventory is kept electronically, is manual counting still required? . What could be the reason for the differences between manual counting and the system's count? . What should be the procedure (accounting treatment) whenever there are differences between what was manually counted and what the Perpetual Records indicate?