as the content of a marketing website for a product moves from words to photos, videos, and animation, the media richness of the site ______

Answers

Answer 1

As the content of a marketing website for a product moves from words to photos, videos, and animation, the media richness of the site increases.

What is  media richness about?

Media  richness is the degree to which a communication medium can pass on numerous signals, such as tone of voice, body dialect, and visual symbolism.

As a promoting site for a item joins more visual media such as photographs, recordings, and liveliness, the sum and differing qualities of signals passed on through the location increments, driving to a better level of media lavishness.

This will improve the website's capacity to capture and keep up the audience's consideration, pass on data, and inspire feelings, possibly expanding the adequacy of the promoting campaign.

Learn more about Media  richness from

https://brainly.com/question/29820040

#SPJ1


Related Questions

Which software helps you upload content for live streaming
OA OnlineStream
OB. Firewire
OC. PPLive
OD. Blogger

Answers

Answer:

a online stream i ting please mark brainilest

Explanation:

Which of these is an IPv4 address? Choose the answer
A.2001:0DB8:85A3:0000 0000
B. 8A2F0370.7334
C. //resource:share
D. 202.111.12.170
E. 192.168.0​

Answers

Answer: The Answer is D, 202.111.12.170.

Explanation:

Taking the test.

An IPv4 address is  202.111.12.170. The correct option is D.

What is an IPv4 address?

The IPv4 address is a 32-bit number that uniquely identifies a machine's network interface. An IPv4 address is usually expressed in decimal digits, with four 8-bit fields separated by periods.

Each 8-bit field corresponds to a byte of an IPv4 address. IP addresses (version 4) are 32-bit integers that can be written in hexadecimal notation. The more popular format, known as dotted quad or dotted decimal, is x.x.x.x, with each x ranging from 0 to 255.

IPv4, or Internet Protocol version 4, is a set of rules that allows devices such as computers and phones to communicate over the Internet. An IP address is allocated to each device and domain that connects to the Internet.

Therefore, the correct option is D. 202.111.12.170.

To learn more about IPv4 addresses, refer to the link:

https://brainly.com/question/28565967

#SPJ5

Consider the phrases “recognize speech” and “wreck a nice beach.” If you say them out fast anyone might confuse the sentences. From this it is easy to see why NLU can experience difficulties when performing voice recognition.

Name at least two issues a good voice recognition system must overcome to accurately identify natural human speech. Describe how these issues affect VR development.

Answers

Basically, they sound the same.

Explanation:

Because, when you have 2 sentences and they both sound the same the VR system recognizes only one thing because you're both saying them the same kind of way so it's really confusing.

Answer:

Dialects- because native languages have many different dialects it would be hard to account for all of the varrences. Chinese is (one of) the densest languages in the world since there are literally hundreds of thousands of sub-varieties of the language. Trying to develop a software that can capture all of these varrences will be difficult because dialects change and mutate as people move in and out of regions.  

 

Loud environments- Since voice recognition systems are used in all sorts of environments it would be hard to account for the different background noise that will be heard and have to be filtered through. Creating a VR that can identify all noises will be virtually impossible.

Explanation:

Which type of information includes personal payroll medical and operational information.

Answers

Personal payroll, medical, and operational information are examples of "sensitive" information.

What is meant by sensitive information?

Sensitive data as information that must be protected from unauthorized access as well as unwarranted disclosing in order to maintain an individual's or organization's information security.

Sensitive information, unlike public information, is not gathered from unrestricted directories and excludes any changes are passed lawfully accessible to the general population from government records. This means that exposing sensitive data may result in financial as well as personal harm. Personal information, also known as PII (personally identifiable), is any data that may be linked to a particular individual and is used to enable identity theft. Knowing a person's Social Security number and mother's maiden name, for example, makes it easier to obtain a credit card in their name.

Thus, personal payroll, medical, and operational information are examples of "sensitive" information.

To know more about the sensitive information, here

https://brainly.com/question/26959476

#SPJ4

in june 2009, the u.s. federal communications commission (fcc) mandated that all over-the-air television broadcasts originating in the u.s. must be broadcast digitally instead of the traditional analog signal. these digital transmissions cannot be decoded by traditional analog tvs but require either a digital decoder be attached to an analog tv or a natively digital tv.

Answers

The Demonstration on the graph of how the market for analog TVs changed immediately following the announcement of the switch to digital is that Line D will shift to the left one as well as line S will shift to the right.

What is the meaning of hypothetical business?

The trial's objective under the hypothetical strategy is to calculate the treatment's impact in the fictitious absence of the concomitant occurrence.

In order to determine customer interest in and market demands for products that are currently in development, hypothetical scenario marketing uses product surveys and made-up scenarios. As a small business owner, adopting hypothetical marketing can assist you in directing resources into product categories where customers have expressed interest and demand.

Therefore, A speculation market is a hypothetical market. It refers to a hypothetical market, and in this sense, it signifies that if all the resources were made available that a person would come into.

Learn more about market from

https://brainly.com/question/25369230
#SPJ1

See full question below

The accompanying graph depicts a hypothetical market for analog TVs.

In June 2009, the U.S. Federal Communications Commission (FCC) mandated that all over-the-air television broadcasts originating in the U.S. must be broadcast digitally instead of the traditional analog signal. These digital transmissions cannot be decoded by traditional analog TVs but require either a digital decoder be attached to an analog TV or a natively digital TV.

Both sellers and consumers were made aware of the upcoming switch from analog transmission to digital several years before the mandate took effect.

Demonstrate on the graph how the market for analog TVs changed immediately following the announcement of the switch to digital. For the supply side, focus on the end seller (such as an electronic store) of a TV and not the manufacturer.

in june 2009, the u.s. federal communications commission (fcc) mandated that all over-the-air television

what is the main difference between dmaic and dfss? dfss does not have a control phase dmaic attacks existing problems while dfss provides new product and process design dfss works only for engineers and dmaic can be used by everybody in an organization dmaic is a methodology while dfss is a tool

Answers

DMAIC attacks existing problems while DFSS provides the leverage to design new products and processes.

What is DFSS?Design for Six Sigma is an Engineering design process, business process management method related to traditional Six Sigma. It is used in many industries, like finance, marketing, basic engineering, process industries, waste management, and electronics.Design for Six Sigma (DFSS) is a methodology of improvement that helps businesses create new products or services at a high level of quality.Design for Six Sigma is a methodology that focuses on improving the quality of products and services by reducing variation at the source.

To learn more about six sigma refer to:

https://brainly.com/question/10470492

#SPJ4

Please give answers between 500 words.
What have been the major issues and benefits in
Electronic Data Interchanges (EDI) and Web-Based/Internet
Tools?

Answers

The major issues and benefits of electronic data interchange (EDI) and web-based/Internet tools, such as compatibility and standardization, privacy, cost, dependence on internet connectivity, etc.,

One of the challenges of EDI is that it is ensuring compatibility between different systems and  also establishing standardized formats for data exchange. It requires agreement and coordination among trading partners in order to ensure the seamless communication, while there are many benefits that include EDI and web-based tools that enable faster and more efficient exchange of information, eliminating manual processes, paperwork, and potential errors. Real-time data exchange improves operational efficiency and enables faster decision-making. Apart from this, there are many other benefits to these.

Learn more about EDI here

https://brainly.com/question/29755779

#SPJ4

Which of the following methods causes the next slide to be displayed during a slide show? Select all the options that
apply.

A. Click the left mouse button.
B. Press SPACEBAR.
C. Press ESC.
D. Click the right mouse button.

Answers

B (spacebar) and D (right mouse button)

For the next slide to display during a slide show, always click the left mouse button and press spacebar. That is options A and C.

What is a computer slide show?

A computer slide show is a presentation of an information using the application software called power point presentation.

These information are represented as a slide show which is showing a single screen of information.

Input devices such as the keyboard and the mouse are used to navigate through these slides.

Therefore, for the next slide to display during a slide show, always click the left mouse button and press spacebar on the keyboard.

Learn more about keyboards here:

https://brainly.com/question/26152499

alba wants to use a watermark image as the background of her worksheet. she goes to the page setup group on the page layout tab. what option should sh

Answers

Alba should choose the "Watermark" option under "Page Background" in the Page Setup group of the Page Layout tab of Microsoft Excel. She can then select to input a photo as a watermark and set it as the worksheet's background image.

A transparent image or pattern known as a watermark is placed over a document or image to prevent illegal use of it. It acts as a visible sign of the legitimacy and ownership of a specific piece of work. The original purpose of a watermark was to identify the paper's manufacturer or to denote the paper's grade. To prevent copyright infringement and to prove who created or owned a piece of digital media, such as photographs, videos, and documents, watermarks are frequently employed nowadays. A document or image can have a watermark added to it using specialised software or online resources. In order to preserve the original content's aesthetic attractiveness, they are typically applied subtly.

Learn more about "Watermark" here:

https://brainly.com/question/26321908

#SPJ4

What three blocks of addresses are defined by RFC 1918 for private network uno? (Choose three)
1. 10.0.0.0/8
2. 239.0.0.0/8
3. 169.254.0.0/16
4.100.64.0.0/14 05.
5. 172.16.0.0/12
6.192.168.0.0/16

Answers

The three blocks of addresses defined by RFC 1918 for private network uno are:
1. 10.0.0.0/8
2. 172.16.0.0/12
3. 192.168.0.0/16


What is RFC 1918?

RFC 1918 refers to a set of guidelines established by the Internet Engineering Task Force (IETF) that define a range of private IP address blocks to be used within a private network. These private IP address ranges are not globally routable, meaning that they are not meant to be used on the public internet. Instead, they are reserved for internal use within a private network to facilitate communication between devices without requiring public IP addresses. The three private IP address ranges defined by RFC 1918 are 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

Learn more about RFC 1918: https://brainly.com/question/12950573

#SPJ11

web design, pls help me i need this in 40 minutes ​

web design, pls help me i need this in 40 minutes

Answers

<input type="color">: This input type allows the user to select a colour using a colour picker. , This input type, "date," enables users to choose a date from a calendar.

Which seven different text structures are there?

A few examples of text structures are sequence/process, description, time order/chronology, proposition/support, compare/contrast, problem/solution, cause/effect, inductive/deductive, and research.

How should a date be formatted?

Here is a general rule to remember when writing dates with commas: in the month-day-year format (used in the United States), use commas after the day and year. Do not use any commas when using the day-month-year format, which is used in the UK and other nations. In 2007, on May 13, Daniel was born.

To know more about input type visit:-

https://brainly.com/question/14543408

#SPJ1

Explain one function that is used in a formula.​

Answers

Answer:

SUM function

Explanation:

in microsoft excel, the sum function takes all of the specified cells and adds their values together. for example, =SUM(A2:A10) adds the values in cells A2:10.

The controller has complete access and insight into what is happening in a network. True or False?

Answers

According to the question, the following answer of network is true.

What is network?
Network is a system of interconnected components, such as computers, servers, switches, routers, and other devices, that are connected to each other to transmit data. It enables the exchange of information and resources between different locations, such as two offices, two cities, two countries, or even across the world. Networking is essential for communication, collaboration, and efficient operations. Networks also allow for the sharing of resources, such as printers, files, and other applications, among users. Networks are also used for security purposes, with firewalls, antivirus software, and encryption technologies employed to protect data. Networking is an increasingly crucial part of any organization, and the performance and reliability of its network can have a significant impact on its success.

To learn more about network
https://brainly.com/question/20535662

#SPJ4

to create a summary sheet requires navigation of ____________.

Answers

Answer:The Sheet

Explanation:

To create a summary sheet, navigation of the relevant data, information, and key points is required. This involves reviewing and extracting essential details from various sources or documents to consolidate and present a concise summary.

Creating a summary sheet entails the process of gathering, analyzing, and synthesizing information from different sources. It may involve navigating through reports, research papers, presentations, or other relevant documents to extract the most important and relevant points. The navigation process requires a keen eye for detail, the ability to prioritize information, and an understanding of the desired outcome or purpose of the summary. Once the necessary information is gathered, it can be organized and summarized in a clear and concise manner on a single sheet or document. The summary sheet should provide a comprehensive overview of the main points, key findings, or key takeaways from the source material.

Learn more about summary sheet here:

https://brainly.com/question/32765637

#SPJ11

Perform PESTEL analysis on the American Computer Software
Company named Adobe

Answers

A PESTEL analysis of Adobe, an American computer software company, examines the various external factors that can influence its business. These factors include political, economic, sociocultural, technological, environmental, and legal aspects. Analyzing these factors helps understand the opportunities and challenges that Adobe may face in the market.

1. Political: Political factors encompass government regulations and policies that affect Adobe's operations, such as intellectual property laws, data privacy regulations, and international trade agreements.

2. Economic: Economic factors include macroeconomic conditions, exchange rates, and economic stability, which can impact Adobe's sales, pricing, and profitability.

3. Sociocultural: Sociocultural factors consider social and cultural trends, consumer preferences, and demographics that influence Adobe's product demand and marketing strategies.

4. Technological: Technological factors examine advancements in software technology, digital innovation, and cybersecurity, which can impact Adobe's product development and competitive advantage.

5. Environmental: Environmental factors involve sustainability practices, environmental regulations, and consumer awareness of environmental issues, which may shape Adobe's corporate responsibility initiatives.

6. Legal: Legal factors pertain to laws and regulations governing intellectual property, competition, consumer protection, and data privacy, which can impact Adobe's business operations and legal compliance.

To know more about legal aspects here: brainly.com/question/9371793

#SPJ11

Can someone buy me eddie van der tabs???

Answers

Answer:

No

Explanation:

U cannot exploit people like that

Which of the following functions would you use to retrieve data from a previous row in a result set?
a. PERCENT_RANK
b. LEAD
c. CUME_DIST
d. LAG
SQL

Answers

The function that you would use to retrieve data from a previous row in a result set is the LAG function. This function allows you to access the value of a column from the previous row in the result set. It can be useful for calculating differences or changes between rows. The syntax for using the d. LAG function in SQL is.

LAG(column_name, offset, default_value) OVER (ORDER BY column_name) The column_name parameter specifies the column you want to retrieve the previous value from, the offset parameter specifies how many rows back you want to look, and the default_ value parameter specifies what value to return if there is no previous row (e.g. for the first row in the result set). This is a but I hope it helps clarify the use of the LAG function in SQL.
To retrieve data from a previous row in a result set, you would use the "LAG" function in SQL.
The LAG function in SQL is used to retrieve data from a previous row in a result set.

To know more about retrieve data visit:-

https://brainly.com/question/27703563

#SPJ11

The average external fragmentation is:
Select one:
a. It is twice the block size
b. It is 1/2 the total space minus the allocated space
c. It is 1/2 the block size
d. None of the other answers

Answers

The average external fragmentation is 1/2 the total space minus the allocated space that is in option b, as external fragmentation is a phenomenon that occurs in memory allocation when the free memory space is broken up into small segments over time due to the allocation and deallocation of different-sized memory blocks.

The average external fragmentation can be defined as the average amount of wasted memory per allocated block due to the fragmentation. This value can be calculated by subtracting the total amount of memory allocated from the total amount of memory available and then dividing the result by the number of allocated blocks.

Learn more about fragmentation here.

https://brainly.com/question/15734390

#SPJ4

Which phrase is the best definition of a play?

a story that focuses closely on key details of setting
a story with lots of dialogue and very little description of setting
a story that only makes sense when read aloud by actors
a story told one verse at a time, using lines and sometimes stanza

Answers

A phrase that represents the best definition of a play is a story that focuses closely on key details of a setting. Thus, the correct option for this question is A.

What is a phrase?

In literature, a phrase may be defined as the collection or group of words that significantly work together in a sentence but do not contain a subject or a verb.

According to the dictionary of literature, a play is a work of drama, usually consisting mostly of dialogue between characters and intended for theatrical performance rather than just reading.

Therefore, a phrase that represents the best definition of a play is a story that focuses closely on key details of a setting. Thus, the correct option for this question is A.

To learn more about Phrases, refer to the link;

https://brainly.com/question/27892321

#SPJ1

la révolution industrielle rédaction

Answers

The Industrial Revolution began in the 18th century in Great Britain. It was only the first stepping-stone to the modern economic growth that is still growing to this day. With this new bustling economic power force Britain was able to become one of the strongest nations. While the nation was changing so was the way that literature was written. The Industrial Revolution led to a variety of new social concerns such as politics and economic issues. With the shift away from nature toward this new mechanical world there came a need to remind the people of the natural world. This is where Romanticism came into play; it was a way to bring back the urban society that was slowly disappearing into cities.

The Agricultural Revolution: Between 1750 and 1900 Europe’s population was dramatically increasing, so it became necessary to change the way that food was being produced, in order to make way for this change. The Enclosure Movement and the Norfolk Crop Rotation were instilled before the Industrial Revolution; they were both involved in the separation of land, and the latter dealt more with developing different sections to plant different crops in order to reduce the draining of the land. The fact that more land was being used and there weren’t enough workers it became necessary to create power-driven machines to replace manual labor.

Socioeconomic changes: Prior to the Industrial Revolution, the European economy was based on agriculture. From the aristocrats to the farmers, they were linked by land and crops. The wealthy landowners would rent land to the farmers who would in turn grow and sell crops. This exchange was an enormous part of how the economy ran. With the changes that came with the Industrial revolution, people began leaving their farms and working in the cities. The new technologies forced people into the factories and a capitalistic sense of living began. The revolution moved economic power away from the aristocratic population and into the bourgeoisie (the middle class).

The working conditions in the factories during the Industrial Revolution were unsafe, unsanitary and inhumane. The workers, men, women, and children alike, spent endless hours in the factories working. The average hours of the work day were between 12 and 14, but this was never set in stone. In “Chapters in the Life of a Dundee Factory Boy”, Frank Forrest said about the hours “In reality there were no regular hours, masters and managers did with us as they liked. The clocks in the factories were often put forward in the morning and back at night. Though this was known amongst the hands, we were afraid to speak, and a workman then was afraid to carry a watch” (Forrest, 1950). The factory owners were in charge of feeding their workers, and this was not a priority to them. Workers were often forced to eat while working, and dust and dirt contaminated their food. The workers ate oat cakes for breakfast and dinner. They were rarely given anything else, despite the long hours. Although the food was often unfit for consumption, the workers ate it due to severe hunger.

During this time of economic change and population increase, the controversial issue of child labor came to industrial Britain. The mass of children, however, were not always treated as working slaves, but they were actually separated into two groups. The factories consisted of the “free labor children” and the “parish apprentice children.” The former being those children whose lives were more or less in the hands of their parents; they lived at home, but they worked in the factories during the days because they had to. It was work or die of starvation in this case, and their families counted on them to earn money. Fortunately these children weren’t subjected to extremely harsh working conditions because their parents had some say in the matter. Children who fell into the “parish apprentice” group were not as lucky; this group mainly consisted of orphans or children without families who could sufficiently care for them. Therefore, they fell into the hands of government officials, so at that point their lives as young children turned into those of slaves or victims with no one or nothing to stand up for them. So what was it exactly that ended this horror? Investments in machinery soon led to an increase in wages for adults, making it possible for child labor to end, along with some of the poverty that existed. The way that the Industrial Revolution occurred may have caused some controversial issues, but the boost in Britain’s economy certainly led toward the country becoming such a powerful nation.

Select the correct answer

Which statement will result in a compile-time error?

A. System.out.println(2/0*0);

B. System.out.println(2/0);

C. System.out.println(2+5);

D. System.out.println(0/0);​

Answers

Answer:

None of them

Explanation:

There will only be a run-time arithmetic exception.

Which type of firewall verifies the three-way tcp handshake? tcp handshake checks are designed to ensure that session packets are from legitimate sources

Answers

The type of firewall that verifies the three-way TCP handshake is a "Stateful Firewall" or "Stateful Inspection Firewall". Stateful firewalls operate at the network layer (Layer 3) or transport layer (Layer 4) of the OSI model. They maintain information about the state of network connections and actively monitor the TCP handshake process.

During the TCP handshake, the stateful firewall examines the SYN (synchronize) packets sent by the initiating device, the SYN-ACK (synchronize-acknowledgment) packets sent by the receiving device, and the ACK (acknowledgment) packets sent back by the initiating device to complete the handshake. The firewall verifies that these packets follow the proper sequence and that they originate from legitimate sources.

By analyzing the TCP handshake, stateful firewalls can ensure that session packets are part of an established and authorized connection. They help prevent unauthorized access, protect against network threats, and maintain the security and integrity of network communications.

Learn more about Firewall here:

https://brainly.com/question/32288657

#SPJ11

Typically, hybrid drives use SSD to store the operating system and applications and hard disks to store videos, music, and documents.

A. True

B. False

Answers

Answer:

False

Explanation:

SSD's aren't as reliable as traditional hard disks, therefore, if the operating system is installed on the SSD and is stops working, the whole computer is broken.

High speed printer that produce higher quality printouts but are more expensive is

A. Printer
B. Pages per minute
C. Inkjet printer
D. Laser printer​

Answers

Answer:

i think its D, laser printer

Explanation:

True or False: Data in a smart card can be erased

Answers

Answer:

I think its true but i can't explain it

Answer:

False

Explanation:

optical memory cards can store up to 4MB of data.but once the data is written it cant be changed or erased

T/F Optical discs store data using tiny pits and lands burned by a laser.

Answers

True, optical discs store data using tiny pits and lands burned by a laser.

Optical discs, such as CDs (Compact Discs), DVDs (Digital Versatile Discs), and Blu-ray discs, use a technology called optical storage to store data. This involves the creation of tiny pits and lands on the surface of the disc using a laser.

When an optical disc is manufactured, a laser burns microscopic pits onto the reflective layer of the disc. These pits represent binary data, typically in the form of 0s and 1s. The areas between the pits are known as lands. During playback, a laser beam is directed onto the disc's surface, and a sensor reads the reflected light. The presence or absence of pits and lands is detected, representing the stored data.

The laser used in optical disc drives is able to read the differences in reflection between the pits and lands, allowing for the retrieval of the stored information. By analyzing the patterns of pits and lands, the drive can reconstruct the original data stored on the disc.

Optical discs rely on the formation of tiny pits and lands burned by a laser to store and retrieve data, making them an essential medium for data storage and distribution.

Learn more about Optical discs here:

https://brainly.com/question/30772025

#SPJ11

How many bytes are in there in 1 GB?

Answers

There are 1,073,741,824 bytes in 1 GB.

In 1 GB, there are 1024 KB. Bytes, which generally include eight bits, are the basic building blocks of digital information.  A single letter of text was once encoded in a computer using a byte's worth of bits.

Describe a computer.

A device that can process and store information is a computer. The majority of computers employ a binary number system, which performs operations including data storage, algorithm calculation, and information presentation by using the two factors, 0 and 1. A computer may be any size or shape; examples include supercomputers that weigh upwards of 300 tons and little cellphones.

What can a computer do?

The most super computers are capable of carrying out incredibly difficult tasks like simulating nuclear weapon tests and forecasting the progression of climate change. Even more difficult jobs might be completed with the advent of quantum computers, devices that can handle several operations through classical parallelism (derived from superposition).

To know more about computer visit:

https://brainly.com/question/15707178

#SPJ4

What was the biggest challenge you faced in getting to where you are today and how did you overcome it? Peer counseling

Answers

The biggest challenge I still am faced with today is loosing weight, it can be different for everyone but that is mine. I overcomed it by eating a lot better and not so much junk food.

17. Which computer is the most powerful?​

Answers

Answer:

here is ur answer

Explanation:

Fugaku

the japaness supercomputer , fugaku is the world most powerfull computer!

If your company increases its market penetration, what is happening?
A.
The target market is growing.
B.
More people in the target market are buying the company's product.
C.
The market saturation of the target market has decreased.
D.
Competitors who offer similar products are entering the market.
D.
Your company collects credit card information from customers.

Answers

Answer:   (A, B, E)

A. ) The target market is growing.

B. ) More people in the target market are buying the company's product.

E. ) Your company collects credit card information from customers.

Explanation:  Simply what was on the assignment. Correct on Edge.

I hope this helped!

Good luck <3

Answer:

a,b,e like  the top one said

Explanation:

this is late but thats okay

Other Questions
Someone please help it due today look at the 3 picture and I will mark you Brainliest A carrier mother (XHXh) of hemophilia marries a normal father(XHY). *Use allele letter H What are the mothers and fathers genotype? psychological disorders consist of emotions, behavior, and cognitive processes that are all of the following except group of answer choices a) maladaptive. b) dysfunctional. c) that they interfere with daily functioning. d) immoral. Jack left the movie theater and traveled toward his cabin on the lake. Matt left one hour later traveling at 50 km/h in an effort to catch up to Jack. After traveling for four hours Matt finally caught up. Find Jack's average speed. 'what do you need to consider in the assessment process for a client who is being treated for a dual diagnosis?'' Tell me about Harriet Tubman. What was her nickname? Why did she get this nickname?Where was she from? What did she do? How was she treated by those in the South? How wasshe treated by those in the North? Rita has scored 81, 58, and 95 on her previous three tests. What score does she need on her next test so that her average (mean) is 82? PLS HELP TESTEvery minute, a manufacturer increases the temperature of achemical compound by the same number of degrees. The compoundwas 10C at 9 : 00 a. M. When the factory opened, and it is 22C at9: 15 a. M. At what time will the compound be 90C? LO 9.0 - PART 2I1. Who determines the gender of your baby .... the mother or the father, or both? _____ Explain: During a ten-minute science experiment, the temperature of a substance decreases at a constant rate. Which graph represents this situation? A.B.C Rachel shared 50 peanuts equally among his 4 sisters. How many peanuts did Rachel have left after he gave his sisters their share? what do you dislike the most out of the following below?a. chemistryb. biologyc. psychicsgenuinely curious, let me know! Please list some leadership management tactics you have readabout that relate to Wegman's "winning strategy." The U.S. and many other countries have recently tightened airport security. A sociologist is interested in estimating the proportion of the travelers who feel that airports are safe. The sociologist found that 375 of the 500 travelers randomly selected and interviewed indicated that the airports were safe. With an alpha level of 0.05, conduct a test to determine whether the true proportion of interest is higher than 0.7. A salesperson at a jewelry store earns 8% commission each week. Last week,Heidi sold $640 worth of jewelry. How much did the jewelry store make from her sales? a company with working capital of $870,000 and a current ratio of 2.5 pays a $137,000 short-term liability. the amount of working capital immediately after payment is VCL 2-1: Alkene Halogenation - 1 For this assignment, the target compound that you should synthesize is 1-chloro-l-methyl-cyclohexane. This will be an electrophilie alkene addition reaction where the t.bond is broken and two new covalent bonds are formed. Examine the product carefully to determine the new functionality. Keep in mind the mechanism and form the more stable, most substituted carbocation intermediate Double jeopardy prohibited right to be heard by a grand jury no self-incrimination all of these are part of what amendment? question 7 options: first second fifth seventh Why might it be a good idea for people who always pay cash topurchase a few things on credit? A budding electronics hobbyist wants to make a simple 1.4 nF capcitor for tuning her cyrstal radio, using two sheets of aluminum foil as plates, with a few sheets of paper between them as a dielectric. The paper has a dielectric constant of 4.9 and the thickness of one sheet of it is 0.20 mm PART A if the sheets paper measure 27 cm x 36 cm and she cuts the aluminum foil to the same dimensions, how many sheets of paper should she use between her plates to get the proper capacitance?