A smart phone is a technology used in businesses.
True or False

Answers

Answer 1

Answer:

True

Explanation:

Smart phones and computers are technologies used in business all the time

Answer 2
The answer is true true

Related Questions

What is a disadvantage of a company having a widespread data capture strategy

Answers

Answer: it is illegal to generate data about a person

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

1pc 6. Next, you select the basic statistics that can help your team better understand the ratings system in your data. Assume the first part of your code is: trimmed_flavors_df ex You want to use the summarize() and sd() functions to find the standard deviation of the rating for your data. Add the code chunk that lets you find the standard deviation for the variable Rating
What is the standard deviation of the rating? 0.2951794 0.3720475 0.4458434 0.4780624

Answers

If you have a dataframe called trimmed_flavors_df and you want to find the standard deviation of the variable "Rating" using the summarize() and sd() functions, you would add the following code chunk:

trimmed_flavors_df %>%

 summarize(sd(Rating))

Please note that the summarise( ) function usually take the columns as input and return the summary statistics of each column, however in this case it is used with the sd( ) function.

This code will give you the standard deviation of the variable "Rating" in your dataframe. The answer to the question depends on the actual data in the dataframe.

Learn more about code chunk here, https://brainly.com/question/30030609

#SPJ4

Question 15 (4 points)
As a user is testing your prototype, you should not:
ask them what they're thinking.
Otell them which button to press.
Ogive them an overview of the product.
have them explain their actions.

Answers

When a user is testing the prototype the owner should not explain them about their actions. Thus, option D is correct.

What is a prototype?

A prototype can be understood as the original model  of the entire project over which the project will function.

If the new user is introduced to the prototype and asked to test it, then the owner cannot direct the user or explain the use r about what actions to be taken for testing the prototype.

Therefore, option D is correct.

Learn more about prototype, here:

https://brainly.com/question/14291377

#SPJ1

Answer: Tell them which button to press.

Explanation: Just took the test

Algorithm:

Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.

We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.

We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.

The algorithm should be O(nlogn)


My ideas so far:

1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.

Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.

Your help would be much appreciated!

Answers

To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.

Here's the algorithm:

Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.

Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.

Initialize an empty min-heap to store the machine capacities.

Iterate through the sorted jobs in descending order of priority:

Pop the smallest capacity machine from the min-heap.

If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.

Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.

Add the capacity of the inefficiently paired machine back to the min-heap.

Return the total sum of priorities for inefficiently paired jobs.

This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.

Read more about algorithm here:

https://brainly.com/question/13902805

#SPJ1

Drag the tiles to the correct boxes to complete the pairs. Match each task to the type of control structure it represents. switch case sequence repetition if else assembling a structure step by step arrowRight choosing between two subjects arrowRight selecting a color out of five colors arrowRight testing a product until free of bugs arrowRight

Answers

The correct matching of the task to the type of control structure it represents is:

A structure choosing between two subjects- Switch case sequence Selecting a color out of five colors- If else assembling Testing a product until free of bugs- Repetition

What is Control Structure?

This refers to the block of programming which makes use of analysis to decide the next move of a set of variables based on pre-set parameters.

With this in mind, we can see that the switch case has to do with the testing of variables for equality against a set of values while the if else assembling has to do with conditional commands which requires an action to be performed if all conditions are satisfied.

Read more about conditional statements here::
https://brainly.com/question/11073037

how i want to be good in coding for subject c programming? anyone has a suggestion?​

Answers

Answer:

Get more details about Standard Library Functions in C.

Use logical variable names to avoid any confusion.

Don't forget to check a complete guide for Variables in C.

Explore how Escape Sequence in C make your coding better.

Which programming term describes the value that is passed to a method when called
so that the method knows what to do?
A parameter
An argument
A function
A variable

Answers

The programming term that describes the value that is passed to a method when called so that the method knows what to do is an Argument

What is an  Argument?

An argument in Programming are variables used to specify a value when you want to call a fuhnction which provides the programs utilizing more informathion.

A bettrer understanding is as follows:

create a function, pass in data in the form of an argumentProgram utilizes more information from the value of the argument.

For example

Say you want to create a function that describes how much money you're having; We can use artgument to descriptive as possible.

Before now, the function may have looked like:

string howMuchmoney() {

    return "so much money";

Modifying  the function prototype and implementation to take a string argument, it becomes

string howMuchmoney(string amount);

Change your return statement to:

return amount + "money";

Add a string to the parentheses where you call the function:

howMuchmoney("tons of")

Learn more in using Argument here:https://brainly.com/question/6067168

o How basic blocks are identified and how the blocks are used to construct control flow graphs

Answers

Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Note that  Basic Block is said to be a composition  of statements that is known to be one that often always executes one after other, and this is often done in a sequence.

How do you create a flow graph from the basic blocks?

Flow graph  is gotten by:

Lets Block B1 be the initial node and also Block B2 will tend to follows B1, so from B2 to B1 there is seen a kind of an edge.

Note that the first task is for a person to partition a sequence of three-address code and this is done into basic blocks.

Hence, Basic blocks are identified  because they are known to be a straight line that is known also as a code sequence that tends to have no branches in regards to its in and out branches and its exception is only to the entry and at the end.

Learn more about basic blocks from

https://brainly.com/question/132319

#SPJ1

Define how to create an augmented reality experience (in the simplest terms possible).

Answers

Answer:

Go to Assemblr Studio and download the software onto your computer.

Select “Create New Project” and give your project a name.

Add the 3D objects, pictures, or videos you want to include in your experience.

Place and modify the items on the marker area to customize the experience.

Explanation:

No Explanation Needed*

In Microsoft windows which of the following typically happens by default when I file is double clicked

Answers

Answer:

when a file is double clicked it opens so you can see the file.

Explanation:

HELP PLEASE

Which member of the game design team writes the step-by-step computer
instructions, or code, required to create games?


Game designer

Programmer

IT specialist

Sound engineer

Answers

It should be the game designer cause they designed the game

Answer:

Programmer

Explanation:

∉∉∉⊆αβ∞∞the life of me

Answers

Answer:

?

Explanation:

I honestly agree to this statement
So poetic

a. In cell E5, enter a formula without using a function that multiplies the actual hours (cell D5) by the billing rate (cell J2) to determine the actual dollar amount charged for general administrative services. Include an absolute reference to cell J2 in the formula.

Answers

Excel formulas are expressions used to perform computation.

The Excel formula to enter in cell E5 is = D5 * $J$2

From the question, we have:

Cell D5 represents the actual hours Cell J2 represents the billing rate

The product of the actual hours and the billing rate is represented as follows:

D5 * J2

Cell J2 is to be referenced using absolute reference;

So, we rewrite the above formula as follows:  D5 * $J$2

Excel formulas begin with the equal sign

So, we rewrite the above formula as follows:  = D5 * $J$2

This means that, the formula to enter in cell E5 is: = D5 * $J$2

 

Read more about Excel formulas at:

https://brainly.com/question/14820723

What is system analysis and design?

Answers

Answer:

According to the Merriam-Webster dictionary, studying an activity (such as a procedure, a business, or a physiological function) typically by mathematical means in order to define its goals or purposes and to discover operations and procedures for accomplishing them most efficiently"

According to the freedictonary, "the preparation of an assembly of methods, procedures, or techniques united by regulated interaction to form an organized whole".

1.in 3 sentences explain briefly what are the examples of the advantage of using multimedia approach in a slide presentation brainly​

Answers

Multimedia Presentations is very essential in making slide presentation because:

it makes the presentation colorfulIt is often purpose driven andIt challenges one and all listeners to think creatively

Some advantages of Multimedia includes

Oresentations made are concise, rich and makes one to develop confidence in language skills.They captivate audience to visualize what is been taught.

Multimedia agent includes video podcasts, audio slideshows etc. The use of the multimedia in presentation is also very good and user-friendly. It doesn't take much energy out of the user, in the sense that you can sit and watch the presentation,

Conclusively, It uses a lot of the presenters senses while making use of multimedia such as hearing, seeing and talking.

Learn more from

https://brainly.com/question/19286999

You replace an internal drive that is only used to backup data on a computer. Before you
install the case cover, you power on the computer and observe the disk drive lights are not
blinking. You suspect it may not be receiving power, but cannot find the power supply tester.
How can you quickly verify whether power is being supplied to the disk drive?

Answers

The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

How do you check your power supply?

There are different ways to know  if power is entering your system. A person can be able to check the power supply on their computer by removing the side panel that pertains to its case.

Note that when a person bought any kind of rebuilt computer, you are able to likely check the power supply with the use of the computer's manual or by asking or contacting the manufacturer.

Therefore, based on the above, The way to quickly verify whether power is being supplied to the disk drive is through the use of a multimeter.

Learn more about multimeter from

https://brainly.com/question/5135212
#SPJ1

5. What are Excel cell references by default?
Relative references
Absolute references
Mixed references
Cell references must be assigned

Answers

Answer: relative references

Explanation:

By default, all cell references are RELATIVE REFERENCES. When copied across multiple cells, they change based on the relative position of rows and columns. For example, if you copy the formula =A1+B1 from row 1 to row 2, the formula will become =A2+B2.

which of the following technologies is (are) being used to replace the older edi for specifying data standards

Answers

JavaScript object notation and Extensible markup language this technologies are being used to replace the older EDI for specifying data standards.

What does "extensible markup language" mean?

The standard markup language known as Extensible Markup Language (XML) establishes the format guidelines for data encoding. One key benefit is that it offers a clear way to describe structured data for use in applications, particularly as a format for message storage and transmission.

What is the purpose of JavaScript Object Notation?

The text format JSON, which stands for JavaScript Object Notation, is used to convey data. JSON data is portable and relatively easy for humans to read and write in real time. Although JSON was initially created as a JavaScript subset, it is actually language-independent.

Learn more about the JavaScript here: https://brainly.com/question/16698901

#SPJ4

NOTE: The given question is incomplete on the portal. Here is the complete question.

QUESTION: Which of the following technologies is(are) being used to replace the older EDI for specifying data standards?

a. JavaScript object notation

b. Hypertext transfer protocol

c. Extensible markup language

d. Both (a) and (b)

e. Both (a) and (c)

A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:

Answers

Answer:

There is nothing to answer from this statement.

Explanation:

Can you rephrase the statement into question?


If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color

Answers

I have no idea for that

Answer:

watermark

Explanation:

Need help with Exercise 5

Need help with Exercise 5

Answers

The program above is one that entails a person to  make program in a programming code to go through the content from an input record.

What is the code about?

Making a computer program program includes composing code, testing code and settling any parts of the code that are wrong, or investigating. Analyze the method of composing a program and find how code editor program can make that prepare less demanding

Therefore, In Windows, to run a program, one have to double-click the executable record or double-click the shortcut symbol indicating to the executable record. If they have got a hard time double-clicking an symbol, they need to be able tap the symbol once to highlight it and after that press the Enter key on the console.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

CST-105: Exercise 5

The following exercise assesses your ability to do the following:

Use and manipulate String objects in a programming solution.

1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in the digital classroom under the assignment.

2. Write a program that reads text from a file called input.in. For each word in the file, output the original word and its encrypted equivalent in all-caps. The output should be in a tabular format, as shown below. The output should be written to a file called results.out.

Here are the rules for our encryption algorithm:

a.

If a word has n letters, where n is an even number, move the first n/2 letters to the end of the word. For example, 'before' becomes 'orebef

b. If a word has n letters, where n is an odd number, move the first (n+1)/2 letters to the end of the word. For example: 'kitchen' becomes 'henkitc'

Here is a sample run of the program for the following input file. Your program should work with any file, not just the sample shown here.

EX3.Java mput.ix

mputz.txt w

1 Life is either a daring adventure or nothing at all

Program output

<terminated> EX3 [Java Application] CAProg

Life

FELI

is

SI

either

HEREIT

a

A

daring

INGDAR

adventure

TUREADVEN

or

RO

nothing

INGNOTH

at all

TA

LAL

3. Make a video of your project. In your video, discuss your code and run your program. Your video should not exceed 4 minutes.

Submit the following in the digital classroom:

A text file containing

O

Your program

O

A link to your video

Need help with Exercise 5

way are you choose a Databases​

Answers

The choice of databases in computer science and software engineering depends on various factors such as the specific requirements of your application, scalability needs, data model, performance considerations, and personal or organizational preferences.

There are several popular databases commonly used in the field of computer science, including:

1.  Relational Databases:

MySQLPostgreSQLOracleMicrosoft SQL ServerSQLite

2.  NoSQL Databases:

MongoDB (document-oriented)Cassandra (wide-column)Redis (in-memory key-value store)Elasticsearch (search and analytics)Neo4j (graph database)

The choice of database depends on the specific needs of your project or application. It's important to consider factors such as data structure, scalability, performance requirements, ease of use, community support, and integration capabilities.

If you have any specific requirements or criteria, I can help guide you in selecting a suitable database for your project.

for similar questions on databases.

https://brainly.com/question/24027204

#SPJ8

Write a SELECT statement without a FROM clause that uses the NOW function (research how to use NOW function in SQL) to create a row with these columns: today_unformatted The NOW function unformatted today_formatted The NOW function in this format: DD-Mon-YYYY This displays a number for the day, an abbreviation for the month, and a four-digit year. As mentioned, do not use FROM clause, as you are not selecting data from any table. Hint: Use AS command. (10 points) Important style guideline: For better readability of code, you should put each attribute in SELECT clause on a separate line and tab them (2 times) in this query.

Answers

Answer:

ALTER TABLE "table name"

ADD COLUMN today_unformated DATE DEFAULT AS (SELECT TOCHAR( NOW( ) :: date, " dd-Mon-yyyy")

Explanation:

The SQL query statements above add a new column called "today_unformated" to a table and set its default value to the current date of the local machine, with its format set to a number as day and year and a three-letter abbreviation as the month.

You are designing a simple calculator program for young children to use. Right now, if they do something that the program didn’t expect, a message appears that reads, “User input deemed invalid.” What changes could you make so that the message would be more suitable for this audience?

Answers

In Python, you can use a try-except statement and raise an exception with a custom message.

For example:

try:

x = int(input())

except:

raise Exception("User input deemed invalid")

In JavaScript, you can try using a try-catch statement. You can use the 'throw' keyword to handle the error.

error errorerror error error

Answers

What do you mean by error my g?

Answer:

it means something is wrong

(viii) Word does not allow you to customize margins.
true/false:-​

Answers

In Word, each page automatically has a one-inch margin. You can customize or choose predefined margin settings, set margins for facing pages, allow extra margin space to allow for document binding, and change how margins are measured.

I would say false

Operating systems try to ensure that consecutive blocks of a file are stored on consecutive disk blocks. Why is doing so very important with magnetic disks? If SSDs were used instead, is doing so still important, or is it irrelevant? Explain why​

Answers

Performance is fast in this scenario where reading the consecutive disk blocks require no major movement of the disk head.

Why is doing so very important with magnetic disks?

Using hard disks or magnetic disks, the OS tries to ensure that when a file is stored it should be stored in the consecutive blocks of the disk in consecutive disk blocks. This is important as the magnetic disk moves with the intention to access the disk. If the magnetic disk moves a lot, then it takes much more time to access the information. The contiguous allocation on consecutive disk blocks makes sure that the blocks of the file are kept contiguously. Thus performance is fast in this scenario where reading the consecutive disk blocks require no major movement of the disk head.

Is it irrelevant?

But for SSDs, it is a different case. As the SSDs have no moving parts and they use flash memory to store the data and provide with improves performance, read/write speed and reliability thus the consecutive disk allocation does not make any difference in case of an SSD.

To know more about magnetic disks, Check out:

https://brainly.com/question/29770065

#SPJ1

Zara wants to create some lines of code that are ignored by the computer. What should these lines begin with?
IG
#
-
0

Answers

Answer

Answer is # or hashtag :)

Explanation:

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

Other Questions
What is it that makes a battery rechargeable? How is it different from a regular battery? If someone wanted to use the door-in-the-face technique to borrow a friend's car for the day next Saturday, this person might begin by saying, Select one *Could you loan me your car for a week?" b. "Could you loan me your car for a few minutes?" c. "I'll wash your car and fill it with gas if you let me borrow it." d. "May I borrow your car for the day next Saturday?" Based on the suffix -ify, what does the word justify mean? A) to send away from B) to heed a warning to confuse someone D) to show to be right Read the excerpt from "Mother Tongue."Just last week, I was walking down the street with my mother, and I again found myself conscious of the English I was using, the English I do use with her. We were talking about the price of new and used furniture and I heard myself saying this: Not waste money that way. My husband was with us as well, and he didnt notice any switch in my English. And then I realized why. Its because over the twenty years weve been together Ive often used that same kind of English with him, and sometimes he even uses it with me. It has become our language of intimacy, a different sort of English that relates to family talk, the language I grew up with.Which best summarizes the central idea of the excerpt?Nonstandard forms of English are most appropriate with family.Standard forms of English can create connections between people.Nonstandard forms of English can create connections between people.Standard forms of English are not appropriate to use with family. Write the correct Spanish subject pronoun for the subject used in each sentence.Tam going to skateboard.Pilar is studying Spanish.Nacho and Enrique like to listen to music.,My parents go to work.My sister and I like to read magazines.All of you (informal) like to swim.You (informal) like to dance,You (formal) like to watch TV.Elena likes to play the guitar.All of you (formal) like to use the computer. which of the following statements is accurate in determining subject risk involved in a genetic study: How did the Proclamation Line of 1763 prevent conflict with the Native Americans?A It set up a large trading post where all were welcomed to sell their goods.B It created an alliance between the British and the Native Americans.C It moved all of the Native Americans to Florida.D It prevented colonists from settling western lands. Pls answer free brainliest What is the equation in slope-intercept form, of the line parallel to y=5x+2 that passes through the point with coordinates (-2,1) Roman aqueducts have been adapted and modified over time to lead to which modern day invention A. Suspension bridges B. PlumbingC. Roads D. Churches In this experiment, optical density is measured using a _______. In this experiment, optical density is measured using a _______. microscope thermocycler spectrophotometer caliper I think ik the answer but Im not so can someone help me a machine is designed to fill toothpaste tubes with 5.8 ounces of toothpaste. the manufacturer does not want any underfilling or overfilling. the correct hypotheses to be tested are how many bits strings of length 5 (a) have four or more consecutive zeros? (b) have three or more consecutive zeros? (c) have neither two consecutive 1s or three consecutive 0s? (use tree diagram) . a solar photovoltaic cell is designed to operate at maximum efficiency under a load of 0.4 a and 0.52 v under 750 w/m2 of irradiation at 45 degc. if the cells reverse saturation current density is 5.8x10-9 5a/m2 and the cell surface area is 0.01 m2 , what is the cells open circuit voltage (in volts) and short circuit current (in amps)? Jack, an employee of Desert Sky, Inc., has gross salary for May of $7,000. The entire amount is under the OASDI limit of $118,500 and thus subject to FICA. He is also subject to federal income tax at a rate of 21%. Which of the following is a part of the journal entry for accrual of the employer payroll taxes? (Assume a FICA-OASDI Tax of 6.2% and FICA-Medicare Tax of 1.45%.) Jack's income to date exceeds the FUTA and SUTA tax income limits O A. credit to Salaries Payable for $7,000 O B. debit to Employee Income Taxes payable of $1,470 O C. credit to FICAMedicare Taxes Payable of $102 OD. debit to Cash for $5,135 epithelial cell abnormality atypical squamous cells of undetermined significance.T/F Jared needs to develop a resume. He has a diverse set of skills and time gaps within his experience and work history. He is looking to develop this type of resume because he recently changed careers. Which type of resume is Jared looking for Wildhorse Corporation, which uses ASPE, enters into a 6-year lease of equipment on September 1, 2020, that requires 6 annual payments of \( \$ 15.000 \) each, beginning September 1,2020. In addition, Protein transcription mainly takes place in the ____, then sent to the ____ for post-transcriptional modification, processing, and packaging