7.A(n) ____ filename is the name that differentiates a file from other files in the same directory.a.absolutec.short-formb.relatived.directory

Answers

Answer 1

A relative filename is the name that differentiates a file from other files in the same directory.

A relative filename is a file name that refers to a file relative to the current working directory. It is not an absolute path to the file, but rather a path that is relative to the current directory. This means that the path to the file is defined based on the location of the file relative to the directory where the command is executed.

For example, if the current working directory is "/home/user/", and there is a file named "example.txt" in the directory "/home/user/documents/", then the relative path to the file is "documents/example.txt". This filename is used to differentiate a file from other files in the same directory.

learn more about filename here:

https://brainly.com/question/30169162

#SPJ11


Related Questions

sensors inside iot wearable devices typically collect information such as _____.

Answers

Sensors inside IoT wearable devices typically collect information such as

location and heart rate.Sensors are tools that detect and respond to some type of input from the physical environment.

A sensor is a device that generates an output signal in order to sense a physical phenomena.

A sensor is, in the broadest sense, a device, module, machine, or subsystem that detects events or changes in its surroundings and transmits the data to other electronics, typically a computer processor. Sensors are always used in conjunction with other electronics.

Sensors are employed in a variety of applications that most people are unaware of, like touch-sensitive elevator buttons (a tactile sensor) and lamps that may be turned on or off by touching the base. The uses of sensors have grown beyond the conventional disciplines of temperature, pressure [1, 2], and flow measurement, for example, into MARG sensors, thanks to improvements in micromachinery and user-friendly microcontroller platforms.

learn more about IoT here:

https://brainly.com/question/29767231

#SPJ1

What is the something in the computer can be in the form of a tables, reports and graphs etc.​

Answers

Microsoft is the correct answer right

To collaborate on a project using Pinterest, students can___​

Answers

Pinterest is a side where the students can create pinsThey can create multiple boards also.There tags or profile may be used.They can also use the Direct message feature for collaboration in project creation

What is best for a busy student to do for better results in school?

increase extracurricular activities
transfer to a new school
manage time and stress
manage and budget money

Answers

Answer:

Manage time and stress

Explanation:

This is obvious

Answer:

manage time and stress

Explanation:

the person above or below me was correct.

Identify the data type of each variable as either int, float, string, list, or boolean.

Identify the data type of each variable as either int, float, string, list, or boolean.

Answers

Data type of each variable is:

i-int

j-string

k-string

m-boolean

n-list

p-float

q-integer

r- boolean

s-int

t- string

u-string

v- float

w-string

What are data types?

Data is categorized into different types by a data type, which informs the compiler or interpreter of the programmer's intended usage of the data. Numerous data types, including integer, real, character or string, and Boolean, are supported by the majority of programming languages. Today, binary data transfer is the most widely used type of data transport for all devices.

A collection of 0s and 1s arranged in a precise order makes up a binary kind of data. Every piece of information is translated to binary form and used as needed. Another set of binary data is connected to this binary form to define the type of data being carried since this binary form does not specify what it is carrying. Variables are specific storage units used in computer programming that hold the data needed to carry out tasks.

To know more about Data, check out:

https://brainly.com/question/19037352

#SPJ1

what are trends in GPS ? ​

Answers

Answer:

New Trends in GPS & Telematics in 2021 and Beyond - Rewire Security. Real-time location tracking systems for cars, vans, motorcycles, lorries, wired or plug & play options—battery-powered GPS tracking systems with magnets attached to flat metal surfaces such as containers.

Explanation:

EASY POINTS who is your favorite in family
1. mom
2. dad
3. sister
4. brother

Answers

Answer:

Thank you! And it would be my dad.

Explanation:

Mom and dad and sistrt………………………

Unit Test
Unit Test Active
11
12
TIME REN
16:
Which formatting elements can be included in a style Terry created?
font size, type and color
paragraph shading
line and paragraph spacing
All of the options listed above can be used to create a new style.

Answers

Answer:

d. all of the options listed above can be used to create a new style .

Explanation:

The formatting elements that can be included in a style Terry created is font size, type and color. The correct option is A.

What is formatting element?

The impression or presentation of the paper is renowned to as formatting. The layout is another word for formatting.

Most papers encompass at least four types of text: headings, regular paragraphs, quotation marks, as well as bibliographic references. Footnotes along with endnotes are also aggregable.

Document formatting is recognized to how a document is laid out on the page, how it looks, and the way it is visually organized.

It addresses issues such as font selection, font size as well as presentation like bold or italics, spacing, margins, alignment, columns, indentation, and lists.

Text formatting is a characteristic in word processors that allows people to change the appearance of a text, such as its size and color.

Most apps display these formatting options in the top toolbar and walk you through the same steps.

Thus, the correct option is A.

For more details regarding formatting element, visit:

https://brainly.com/question/8908228

#SPJ5

write a c++ program that prints the intial letter of any name​

Answers

Answer:

#include<iostream>

using namespace std;

int main(){

char str[20];

int i=0;

std::cout<<"Enter a name:" ;

cin>>str;

cout<<*str;

while(str[i]!='\0'){

if(str[i]==' '){

i++;

cin>>*(str+i);

}

i++;

}

return 0;

}

What are Layers in computer class 7. no scams please​

Answers

Answer:

It means and organisation programming into separate functional components that interact in some sequential and hierarchical way, with each layer usually having an interface only to the layer above it and the layer below it.

the computer room is locked and requires a key-card for access which enhances security surrounding unauthorized access.

Answers

The computer room is locked and requires a key-card for access to enhance security against unauthorized entry.

Key-card access is implemented in the computer room to bolster security measures and prevent unauthorized individuals from gaining entry. This system requires the use of a specialized key-card to unlock the room, ensuring that only authorized personnel with the proper credentials can access the space. By employing this method, the organization can effectively control and monitor who enters the computer room, minimizing the risk of unauthorized access and potential security breaches. The key-card system adds an additional layer of protection to safeguard sensitive information and critical infrastructure housed within the computer room.

this method ensures that only authorized individuals with the proper authorization can enter the computer room, reducing the risk of unauthorized access and potential security breaches. The implementation of a key-card access system adds an extra layer of protection and control, enabling organizations to mitigate security threats effectively.

learn more about security breaches here

brainly.com/question/30161005

#SPJ11

What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?

Answers

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

https://brainly.com/question/18696862

#SPJ1

Common rules for the global network of computers to link and share information are called _____________.

Answers

The common rules for the global network of computers to link and share information are called protocols.

Protocols are rules that determine how data is exchanged between two devices on a network. These protocols are essential to ensure that all devices on a network can communicate effectively with one another. Protocols are necessary because computers speak different languages, and protocols are a way to standardize the way computers communicate.

Protocols also provide a way for computers to connect and share data across different types of networks, including local area networks, wide area networks, and the internet. There are many different types of protocols, including TCP/IP, HTTP, FTP, and SMTP, among others. Each protocol is designed to perform a specific task, such as transferring files or sending email messages. Overall, protocols are critical for ensuring that data can be shared across different devices and networks, enabling the internet to function as a global network of computers.

To know about Protocols visit:

https://brainly.com/question/31846837

#SPJ11

discuss any five barries of integrating ict tools in education​

Answers

Answer:

lack of computer, lack of quality software, lack of time, lack of technical programs and lack of teachers

T/F. the components in an array object may refer to other array objects. the number of bracket pairs used in the declaration of the reference variable indicates the depth of array nesting (in the sense that array elements can refer to other array objects).

Answers

TRUE statement that An array object's components may make references to other array nesting.

How can an array be nested in JavaScript?

Utilizing the technique A new array is created by concatenating all sub arrays recursively up to the depth you choose using the Array. Array. flat() method. Simply explained, flat() will assist you in joining all entries together into a single array if you have an array of arrays (perhaps more arrays within them).

I need to retrieve a nested array.

A nested array's elements can be accessed in what way You must first access an element of the outer array that yields an inner array in order to access an element of the multidimensional array, and then use another square bracket to access the element of the inner array.

To know more about array nesting visit:-

https://brainly.com/question/8151971

#SPJ4

write a program (in main.cpp) to do the following: a. build a binary search tree t1. b. do a postorder traversal of t1 and, while doing the postorder traversal, insert the nodes into a second binary search tree t2 . c. do a preorder traversal of t2 and, while doing the preorder traversal, insert the node into a third binary search tree t3. d. do an inorder traversal of t3. e. output the heights and the number of leaves in each of the three binary search trees.

Answers

Answer:

#include <iostream>

using namespace std;

struct TreeNode

{

   int value;

   TreeNode *left;

   TreeNode *right;

};

class Tree

{

  private:

     TreeNode *root;

     void insert(TreeNode *&, TreeNode *&);

     void destroySubTree(TreeNode *);

     void deleteNode(int, TreeNode *&);

     void makeDeletion(TreeNode *&);

     void displayInOrder(TreeNode *) const;

     void displayPreOrder(TreeNode *) const;

     void displayPostOrder(TreeNode *) const;

     int height(TreeNode *) const;

     int nodeCount(TreeNode *) const;

     int leafCount(TreeNode *) const;

  public:

     Tree()

        { root = NULL; }

     ~Tree()

        { destroySubTree(root); }

     void insertNode(int);

     bool searchNode(int);

     void remove(int);

     void displayInOrder() const

        { displayInOrder(root); }

     void displayPreOrder() const

        { displayPreOrder(root); }

     void displayPostOrder() const

        { displayPostOrder(root); }

     int height() const

        { return height(root); }

     int nodeCount() const

        { return nodeCount(root); }

     int leafCount() const

        { return leafCount(root); }

};

void Tree::insert(TreeNode *&nodePtr, TreeNode *&newNode)

{

  if (nodePtr == NULL)

     nodePtr = newNode;

  else if (newNode->value < nodePtr->value)

     insert(nodePtr->left, newNode);

  else

     insert(nodePtr->right, newNode);

}

void Tree::insertNode(int num)

{

  TreeNode *newNode;

  newNode = new TreeNode;

  newNode->value = num;

  newNode->left = newNode->right = NULL;

  insert(root, newNode);

}

void Tree::destroySubTree(TreeNode *nodePtr)

{

  if (nodePtr)

  {

     if (nodePtr->left)

        destroySubTree(nodePtr->left);

     if (nodePtr->right)

        destroySubTree(nodePtr->right);

     delete nodePtr;

  }

}

void Tree::deleteNode(int num, TreeNode *&nodePtr)

{

  if (num < nodePtr->value)

     deleteNode(num, nodePtr->left);

  else if (num > nodePtr->value)

     deleteNode(num, nodePtr->right);

  else

     makeDeletion(nodePtr);

}

void Tree::makeDeletion(TreeNode *&nodePtr)

{

  TreeNode *tempNodePtr;

  if (nodePtr == NULL)

     cout << "Cannot delete empty node.\n";

  else if (nodePtr->right == NULL)

  {

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->left;

     delete tempNodePtr;

  }

  else if (nodePtr->left == NULL)

  {

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->right;

     delete tempNodePtr;

  }

  else

  {

     tempNodePtr = nodePtr->right;

     while (tempNodePtr->left)

        tempNodePtr = tempNodePtr->left;

     tempNodePtr->left = nodePtr->left;

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->right;

     delete tempNodePtr;

  }

}

void Tree::remove(int num)

{

  deleteNode(num, root);

}

bool Tree::searchNode(int num)

{

  TreeNode *nodePtr = root;

  while (nodePtr)

  {

     if (nodePtr->value == num)

        return true;

     else if (num < nodePtr->value)

        nodePtr = nodePtr->left;

     else

        nodePtr = nodePtr->right;

  }

  return false;

}

void Tree::displayInOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     displayInOrder(nodePtr->left);

     cout << nodePtr->value << endl;

     displayInOrder(nodePtr->right);

  }

}

void Tree::displayPreOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     cout << nodePtr->value << endl;

     displayPreOrder(nodePtr->left);

     displayPreOrder(nodePtr->right);

  }

}

void Tree::displayPostOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     displayPostOrder(nodePtr->left);

     displayPostOrder(nodePtr->right);

     cout << nodePtr->value << endl;

  }

}

int Tree::height(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else

  {

     int lHeight = height(nodePtr->left);

     int rHeight = height(nodePtr->right);

     if (lHeight > rHeight)

        return (lHeight + 1);

     else

        return (rHeight + 1);

  }

}

int Tree::nodeCount(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else

     return (nodeCount(nodePtr->left) + nodeCount(nodePtr->right) + 1);

}

int Tree::leafCount(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else if (nodePtr->left == NULL && nodePtr->right == NULL)

     return 1;

  else

     return (leafCount(nodePtr->left) + leafCount(nodePtr->right));

}

int main()

{

  Tree tree;

  int num;

  cout << "Enter numbers to be inserted in the tree, then enter -1 to stop.\n";

  cin >> num;

  while (num != -1)

  {

     tree.insertNode(num);

     cin >> num;

  }

  cout << "Here are the values in the tree, listed in order:\n";

  tree.displayInOrder();

  cout << "Here are the values in the tree, listed in preorder:\n";

  tree.displayPreOrder();

  cout << "Here are the values in the tree, listed in postorder:\n";

  tree.displayPostOrder();

  cout << "Here are the heights of the tree:\n";

  cout << tree.height() << endl;

  cout << "Here are the number of nodes in the tree:\n";

  cout << tree.nodeCount() << endl;

  cout << "Here are the number of leaves in the tree:\n";

  cout << tree.leafCount() << endl;

  return 0;

}

Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital color image

Answers

Explanation:

Sampling and RBG (red blue green) pixels and also the binary sequences working together such that it display any digitally colored image by allowing the computer system know where the Red Blue Green pixel is going to be placed and also what the opacity would be for that pixel. The combination of these components is what gives you a digital color image.

A digital color-image is facilitated by sampling RBG pixels using binary sequences which enable the PC to understand the RBG pixel as well as its opacity.Each combination of both these features provides digital photography to users.It implies an analog picture can be transformed into a digital one.These analog pictures use binary sequences utilizing model 1 or 0, and when sampling our analog images, RGB-pixels display on our screen.We must use binary sequences to display the color photo and also to convert the analog. They work together because it creates RGB pixels in this digital image.

Learn more:

brainly.com/question/17389862

Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital

What is the computer system cycle called?

Answers

Answer:

he fetch–decode–execute cycle, or simply the fetch-execute cycle

mark me brainliestt :))

A good first step to understanding any kind of text is to :
A. take careful notes
B. create meaning
C. focus on the details
D. find the main idea

Answers

Answer:

find the main idea

Explanation:

A computer database uses a binary sequence of 5 bits to represent unique user ids. To increase the number of unique ids that the database is able to represent, the database administrator increases the number of bits in a user id to 8 bits. How many times more unique user ids can be represented with the new system?

Answers

2^56 times more unique user ID's can be represented in the system.

For User ID entries, 5 bits will result in a maximum data allocation of 2^10.

The maximum amount of data that can be allocated for User ID entries using 12 bits is 2^66.

The additional unique user IDs that will be represented are therefore 2^(66-10) = 2^56 times.

A single entity within a given system is identified by a string of numbers or letters called a unique identifier (UID). UIDs enable addressing of that entity, enabling access to and interaction with it.

A 128-bit number called a universally unique identifier (UUID) is used to identify data in computer systems. A UUID can be made and used to identify something specifically.

Learn more about systems:

https://brainly.com/question/25594630

#SPJ4

Consider the following code.

public void printNumbers(int x, int y) {
if (x < 5) {
System.out.println("x: " + x);
}
if (y > 5) {
System.out.println("y: " + y);
}
int a = (int)(Math.random() * 10);
int b = (int)(Math.random() * 10);
if (x != y) printNumbers(a, b);
}

Which of the following conditions will cause recursion to stop with certainty?
A. x < 5
B. x < 5 or y > 5
C. x != y
D. x == y


Consider the following code.

public static int recur3(int n) {
if (n == 0) return 0;
if (n == 1) return 1;
if (n == 2) return 2;
return recur3(n - 1) + recur3(n - 2) + recur3(n - 3);
}

What value would be returned if this method were called and passed a value of 5?
A. 3
B. 9
C. 11
D. 16

Which of the following methods correctly calculates the value of a number x raised to the power of n using recursion?
A.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n);
}
B.
public static int pow(int x, int n) {
if (x == 0) return 1;
return x * pow(x, n - 1);
}
C.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n);
}
D.
public static int pow(int x, int n) {
if (n == 0) return 1;
return x * pow(x, n - 1);
}

Which of the following methods correctly calculates and returns the sum of all the digits in an integer using recursion?
A.
public int addDigits(int a) {
if (a == 0) return 0;
return a % 10 + addDigits(a / 10);
}
B.
public int addDigits(int a) {
if (a == 0) return 0;
return a / 10 + addDigits(a % 10);
}
C.
public int addDigits(int a) {
return a % 10 + addDigits(a / 10);
}
D.
public int addDigits(int a) {
return a / 10 + addDigits(a % 10);}

The intent of the following method is to find and return the index of the first ‘x’ character in a string. If this character is not found, -1 is returned.

public int findX(String s) {
return findX(s, 0);
}

Which of the following methods would make the best recursive helper method for this task?
A.
private int findX(String s) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s);
}
B.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else return s.charAt(index);
}
C.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index);
}
D.
private int findX(String s, int index) {
if (index >= s.length()) return -1;
else if (s.charAt(index) == 'x') return index;
else return findX(s, index + 1);
}

Answers

i think the answer is C

Is this for a grade?

pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.

Answers

The given statement of copyrighted work is false.

What do you mean by copyright?

A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.

When you use someone's copyrighted work in something you are selling, you must get their permission first.

To learn more about copyright

https://brainly.com/question/357686

#SPJ13

which type of connector is commonly used for keyboards and mice?

Answers

Answer:

USB Type-A

Explanation:

Most commonly used connector.

what can eallb spell in computer terms

Answers

Label ………………………..,,,,,,,,,,

The network administrator is important in keeping the network healthy. Which of the following describes the role of a network administrator? Check all of the boxes that apply.

The network administrator is important in keeping the network healthy. Which of the following describes

Answers

C and D. Network Administrators are more like managers of a network, so they’re more likely to be doing logical maintenance as opposed to physical. Physical network and hardware maintenance is typically done by a network technician or an I.T. technician.

Answer:

Its A and D

Explanation:I did it on edge 2020

how many limited edition cookies were released in 2019?

Answers

There were five limited edition cookies released in 2019: Mint Chocolate Chip, Coconut Cocoa, Chocolate Caramel Sea Salt, Oatmeal Raisin and Oatmeal Cranberry.

Each flavor was available for a limited time, usually for a month or two at a time. Each flavor was also accompanied by a fun, whimsical design. The cookies were sold in a special edition pack containing two of each flavor.
you can try to search for news articles or press releases from cookie companies that may have released limited edition cookies in 2019. Look for information about the quantity of the cookies produced and distributed during the year. You can also try to search for information on popular food or cooking blogs that may have covered the topic.

Second, you can search for consumer reviews or posts on social media about the limited edition cookies released in 2019. This may give you some indication of the popularity and availability of the cookies during that year.Third, you can contact cookie companies directly and inquire about their limited edition cookie releases in 2019. They may be able to provide you with specific information about the quantity of cookies produced and distributed.

For such  more questions on cookies :

brainly.com/question/14252552

#SPJ11

Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" answer?

Answers

Answer:

yes it can

Explanation:

Computers cannot evaluate an expression to be between true or false.

Expressions in computers are represented in boolean values; i.e. they can only take one of two values (either true or false, yes or no, 1 or 0, etc.)

Take for instance, the following expressions will be evaluated to true, because the expressions are true.

\(\mathbf{1 + 2 = 3}\).\(\mathbf{5>4}\).\(\mathbf{4 + 4 <10}\)

The following expressions will be evaluated to false, because the expressions are false.

\(\mathbf{1 + 2 > 3}\).\(\mathbf{5=4}\).\(\mathbf{4 + 4 >10}\)

The above highlights show that, a computer cannot evaluate expressions to another value other than true or false

Read more about computer expressions at:

https://brainly.com/question/17500565

Which data link layer flow control method offers the most efficient frame transmission when sending large volumes of data?.

Answers

Answer:

Data-link layer takes the packets from the Network Layer and encapsulates them into frames. If the frame size becomes too large, then the packet may be divided into small sized frames. Smaller sized frames makes flow control and error control more efficient.

Feedback-based Flow Control method offers the most efficient frame transmission when sending large volumes of data.

What is Feedback-based Flow Control method ?

Feedback-based Flow Control (FFC): In this control technique, the sender only delivers data, information, or a frame to the receiver, who then transmits data back to the sender and permits the sender to transmit additional data or information regarding the receiver's processing or performance.

Therefore, Feedback-based Flow Control method offers the most efficient frame transmission when sending large volumes of data.

You can learn more about data link layer from the given link

https://brainly.in/question/42450298

#SPJ2

Which of these sentences best describes verbal irony?

Answers

You need to insert the sentences you’re talking about to make this possible to answer
You need to insert the sentences you're talking about to make this possible to answer

Which of the following statements are true regarding models? Select 3 options.

In a model, the general characteristics are separated from the details.

Models help predict how a specific solution will respond.

Models help you understand a complex situation by including all of the details.

Models represent the system or problem at a detailed implementation level.

Models help communicate a design.

Answers

Answer:

Answer:

Models help predict how a specific solution will respond

In a model, the general characteristics are separated from the details

Models help communicate a design

Explanation:

The statements that are true regarding models are:

B. Models help predict how a specific solution will respond.

A. In a model, the general characteristics are separated from the details.

E. Models help communicate a design.

What is a model?

A model is an artificial representation of an object or a process. Models are used to show the process or things that are very big and can not be understood by the actual thing.

By looking for patterns in a set of input data, predictive modeling uses mathematics to foretell future events or results.

Therefore, the correct options are A. In a model, the general characteristics are separated from the details, B. Models help predict how a specific solution will respond, and E. Models help communicate a design.

To learn more about the model, refer to the link:

https://brainly.com/question/14281845

#SPJ2

Other Questions
photosynthesis in plants and cellular respiration in animl\als are... processess too gases in the atmosphere a sample of 80 observatoins results in a sample mean of 144. the population standard deviation is known to be 28. calculate the value of the test statistic. does the above sample evidence enable us to reject the null hypothesis at 1% significance level? A diagram of the pariodic table of the elements is shown below. Periodic Table of the Elements EHHHHHH Where would nonmetals be found? Section 1 Section 2 OSection 3 OSection 4 Find all points having a y-coordinate of 5 (x, 5) whose distance from the point (10,-11) is 20. What is the range of the function y = |x+2 | 2 if the domain is a x R? pls help I'd appreciate it What are two types of medicine? How do the types differ from each other? What is an example of each? 231 ( 40 + 15 ) = 231 x 40 + ------------ x -----------which property is this Discouraged workers are Question content area bottom Part 1 A. workers who have stopped looking for work because they believe there are no jobs for them. B. workers who find their current jobs unfulfilling and are considering a job change. C. workers who have a part time job but want a full time job. D. workers who have consistently been looking for work for more than 4 weeks. Some tribes worship their gods before they .... (pray/prey).(Choose the correct word.) A purely domestic firm that sources its products, sells its products, and raises its funds domestically. . Which of the following is not correct?a. can face stiff competition from a multinational corporation that can source its products in one country, sell them in several countries, and raise its funds in a third country.b. cannot be more competitive than a MNC on its home turf even if it has superior knowledge of the local market.c. can still face exchange rate risk, just like a MNC.d. can still face country risk, just like a MNC. LOOK AT THE PICTURE PLEASE I DONR HAVE ANY TIME LEFTPLEASEEEThe profit P, in dollars, of selling x widgets and y gadgets is given by thefunction P(x, y) = 7x+8y. Which corner point of the shaded region willmaximize the profit? Moshe kai cavalin started college at age 8. by age 11, he had two degrees. he has written a book. it is called we can do. in his book, cavalin shows how other kids can do what he has done. he says that they have to stay focused. cavalin believes that through hard work, kids can achieve whatever they want. cavalin continues to work hard. however, cavalin does not work all the time. he plays sports, too. do it! cavalin's book _________ other kids. press enter to interact with the item, and press tab button or down arrow until reaching the submit button once the item is selected a worries b encourages c angers d thanks The test statistic for goodness of fit has a chi-square distribution with k- 1 degrees of freedom provided that the expected frequencies for all categories are a. 2k. b. 5 or more. c. 10 or more d. k or more. You work in HR for a company that has recently merged with another. Upon merger you find that in the sales department there is some overlap. There are two high ranking sales people that have made their respective companies lots of money. The issue is that they work in the same sales territories and sell to several of the same companies. You do not want to lose your top sales people, but are unsure of being able to keep both. How would you handle this scenario? According to the ethical decision-making framework, the absence of punishment provides a(n) _____ for unethical behavior. (x+1)+ (x-8) = 0in standard form and its roots 100 POINTS!!! How did labor in both the south and north play a role in the great migration Similarities and Differences Between Lions, Crocodiles, and Buffaloes Ye is a marketing coordinator for a financial advisory company. What communication task is he MOST likely responsible for?A: writing a course plan for a financial literacy classB: creating a content plan for the company's blogC: contacting local reporters about the company's new CEOD: counseling clients about their investment planning