Choose the correct statement of Technology Enabled Reengineering

A. Technology enabled reengineering using ERP provides a roadmap for transformation by eliminating many of the difficult decisions required when designing processes from scratch.

B. In technology enabled reengineering, a ‘to be’ process is designed by benchmarking against its corresponding ‘as is’ process.

C. Old processes can still be practiced alongside the implementation of technology enabled reengineering using ERP.

D. Technology enabled reengineering removes all types of constraints on the resulting business operations.

Answers

Answer 1

The correct statement of Technology Enabled Reengineering is: Technology-enabled reengineering using ERP provides a roadmap for transformation by eliminating many of the difficult decisions required when designing processes from scratch.

Business process reengineering (BPR) that is facilitated by technology is referred to as technology-enabled reengineering (TER). BPR is the method of redesigning business processes in order to improve efficiency, productivity, and overall efficiency.

Technology-enabled reengineering (TER) integrates information technology (IT) into the BPR process to increase the efficiency of business processes and create more opportunities for value creation by reducing the wastage of resources.

The use of ERP is a common element of TER.ERP provides a roadmap for transformation by eliminating many of the difficult decisions required when designing processes from scratch. It is a highly recommended tool for organizations that want to implement TER as it provides guidelines and structure for the process.

You can learn more about Technology at: brainly.com/question/32922076

#SPJ11


Related Questions

can you set your default file permissions to 644 and at the same time have your default directory permissions set to 744? why or why not?

Answers

644 - The owner can read and write, but the group/others can only read. Here are some instances of directory permissions: 777 - everyone may read/write/search. 755 - The owner has the ability to read/write/search, whereas others and groups can only search.

What are the file permissions by default on a system with umask 471?

The system sets the permissions on a text file to 666, which enables read and write access to the user, group, and others, and to 777 on a directory or executable file by default. Permissions of 644 indicate that the file's owner has read and write access, whereas group members and other system users only have read access. rw-r—r— (644) — Only the user has read and write access; the group and others can only read. -rwx——— (700) — Read, write, and execute rights are only granted to the user. -rwxr-xr-xr-x (755) The user has the ability to read, write, and execute; the group and others can only read and execute. The root user's default umask is 022, which results in default directory permissions of 755 and default file permissions of 644. The default permissions for directories are (rwxrwxrwx) 0777, while for files they are 0666. (rw-rw-rw).

Learn more about directories  from here;

https://brainly.com/question/7007432

#SPJ4

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

you need to develop an infrastructure that can be replicated and deployed in another aws region in a matter of minutes. which aws service might you use to build a reproducible, version-controlled infrastructure?

Answers

To promote economic growth and improve quality of life, infrastructure development entails building the fundamental support systems.

What do you meant by infrastructure development ?

Transportation, communication, sewage, water, and educational systems are a few examples of infrastructure. A region's economic growth and prosperity depend on infrastructure investments, which are frequently expensive and capital-intensive.

Result for the phrase "infrastructure development" Infrastructure projects include making new roads, creating new power plants, maintaining sewage systems, and supplying public water sources. Public infrastructure projects are the responsibility of the federal government or the state governments of a nation.

Infra- means "below," hence infrastructure is the "underlying structure" of a nation and its economy, i.e., the permanent fixtures required for its operation. Roads, bridges, dams, water and sewage systems, railways and subways, airports, and harbors are a few examples.

To learn more about infrastructure development  refer to:

https://brainly.com/question/14237202

#SPJ4

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants to be able to access his media wherever he goes. He needs a cheap storage solution. Which type of storage would be best for Joshua?

Joshua needs to store all of his music (over 2 GB), his movies (4GB), and his pictures (1GB). He wants

Answers

Answer:Cloud storage

Explanation:I think that the cloud storage would be his best choice, because there are free cloud storages for use and all you need is access to the internet to upload or download files from them.

which word pair from list 2 best complete the folowing analogy

Answers

The word pair from list 2 that best complete the analogy is option C= report: describe.

What Constitutes a Good Analogy?

A successful analogy strikes a balance between two opposing objectives: recognizability as well as representativeness. The best analogies are well known. They are known to be use as a well-known idea or notion to describe an abstract thought.

Note that an analogy is seen as a form of a verbal word that describes the cognitive act of transferring knowledge or the meaning from one subject to another.

Therefore, The word pair from list 2 that best complete the analogy is option C= report: describe.

Learn more about analogy from

https://brainly.com/question/12010013
#SPJ1

which word pair from list 2 best complete the folowing analogy

Explain the outcome of each of the following code segment? (8 points) (a) addi $t0, $zero, 0xFF2B andi $t2, $t2, $t0 (b) ori $t2, $t2, 0x00E9

Answers

(a) The outcome of the code segment is performing an addition operation and a bitwise AND operation.

(b) The outcome of the code segment is performing a bitwise OR operation.

What operations are performed in the code segment?

In the code segment (a), the instruction "addi $t0, $ azero, 0xFF2B"dds the immediate value 0xFF2B to the contents of register $zero (which holds the value 0) and stores the result in register $t0. This operation essentially sets the value of $t0 to 0xFF2B.

The second instruction "andi $t2, $t2, $t0" performs a bitwise AND operation between the contents of registers $t2 and $t0, and stores the result in register $t2. This operation retains only the common bits between $t2 and $t0, effectively performing a bitwise masking operation.

In the code segment (b), the instruction "ori $t2, $t2, 0x00E9" performs a bitwise OR operation between the contents of register $t2 and the immediate value 0x00E9. The result is then stored in register $t2. This operation combines the bits of $t2 and 0x00E9, setting any corresponding bits in $t2 to 1 if either of the bits is 1.

Bitwise operations, such as AND, OR, and NOT, are commonly used in computer programming for manipulating individual bits within binary data. They are efficient ways to perform operations on binary values and can be used for tasks like masking, setting specific bits, or extracting specific bits from a value. Understanding bitwise operations is essential for low-level programming, bitwise arithmetic, and working with hardware interfaces.

Learn more about code segment

brainly.com/question/30614706

#SPJ11

Match the action to the task it helps accomplish.
Format text at the very top or bottom of a
page
Move the text at the bottom of a page to the
top of the next page.
Increase or decrease the space around the
text on a page.

Double-click the header or footer.
Insert a page break
Adjust the margins.

Answers

The Match up to the action the task helps accomplishes are:

Format text at the very top or bottom of a page - Double-click the header or footer.Move the text at the bottom of a page to the top of the next page - Insert a page breakIncrease or decrease the space around the text on a page is Adjust the margins.

Which task is linked to formatting of text?

Formatting text in regards to Microsoft Word is known to be those tasks such as bolding a text, italicizing it, and altering the font and size.

Note that the Match up to the action the task helps accomplishes are:

Format text at the very top or bottom of a page - Double-click the header or footer.Move the text at the bottom of a page to the top of the next page - Insert a page breakIncrease or decrease the space around the text on a page is Adjust the margins.

Learn more about formatting from

https://brainly.com/question/766378

#SPJ1

Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”

Python and using function

Answers

Answer:

def ix(s):

   return s[1:3]=="ix"

Explanation:

A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.

Answers

Answer:

prevent outsiders from using its information network.

Explanation:

The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.

connection speed is technically a measure of capacity: T/F

Answers

The statement "connection speed is technically a measure of capacity" is;

False.

Connection speed and capacity are not the same thing.

Connection speed, also known as bandwidth, is a measure of how quickly data can be transferred over a network connection. It is typically measured in bits per second (bps) or bytes per second (Bps). It is a measure of the rate of data transfer, and it is typically used to measure the speed of internet connections.

Capacity, on the other hand, is a measure of how much data can be stored or transmitted over a network connection. It is typically measured in bytes (B) or bits (b). It is a measure of the amount of data that can be transferred over a network connection, and it is typically used to measure the storage capacity of a hard drive or the number of users that can be supported on a network.

Therefore, connection speed is not a measure of capacity. The two are different from each other. Connection speed it is a measure of the rate at which data can be transferred over a network connection.

To find more on connection speed look into:

brainly.com/question/8152317

#SPJ4

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

I need help please and thank you

I need help please and thank you

Answers

Answer:

Explanation: For "BEST way to handle the situation," try Option 1, because it would possibly help them or make the Technical Support Representative do less work.

For "WORST way to handle the situation," Option 4 would be the best because you're basically just hanging up on the person.

Payton bought a couple new dog toys for her puppy. The bone she bought cost $5.25 and the frisbee cost $6.75. About how much did the toys cost?

Answers

All together the toys cost 12 dollars

Answer:

$12

Explanation:

                          1 00

                          5.25

                       + 6.75

                          -------

                          12.00

Show the steps that a user can follow to do the following:Create a folder called MyData in his/her home directory Create a file called expenses.txt inside the MyData folder. What are the default file & directory permissions if the umask is 0024? (Explain your answer and show the calculations

Answers

To create a folder called MyData in your home directory and then create a file called expenses.txt inside the MyData folder, follow these steps:

Step 1: Open a Terminal window.

Step 2: To create a folder called MyData in your home directory, type the following command in the Terminal and press Enter:

```
mkdir ~/MyData
```

Step 3: To create a file called expenses.txt inside the MyData folder, type the following command in the Terminal and press Enter:

```
touch ~/MyData/expenses.txt
```
For example, to calculate the final permission value for a file with default permission 666 and umask 0024, use the following formula:

```
666 - 024 = 642
```

Similarly, to calculate the final permission value for a directory with default permission 777 and umask 0024, use the following formula:

```
777 - 024 = 753
```
So the final permission value for the directory will be 753.

To know more about directory visit :

https://brainly.com/question/3225517

#SPJ11

How was the creation of the world wide web browser a stepping stone for future scientific breakthroughs?

Answers

Answer:

Following are the point that described the web browser for the stepping stone as a  future scientific breakthroughs.

Explanation:

Tim Berners Lee was the founder of world wide web .The Tim Berners Lee  is software engineer at CERN they had seen the troubling of exchanging the data .In that time there are various data in various computer .The Tim  Berners Lee  felt he had found the way for resolving this problem and develop a thing so that we can exchange the data in any where .In that time already lots of computer are already linked each other with the high speed of the internet so tim develop a new technology called hypertext .In the March 1989, in a paper titled  known as "Information Management" Tim is developed but this proposal is rejected .In the 1990 Tim is developed the three technology HTML ,URI and  HTTP   with the help of this the world wide web is developed and we can share the information anywhere in the world .The sharing of information in a easy way gives the future bright the person in anywhere in the world will access the data or the information also We cam communicate anywhere in the world by using email .

The specification (including data types, instruction types, registers) of the interface between programs and the underlying hardware is called the

Answers

Answer:

instruction set architecture

5.if a customer intends to transmit more data than they receive, which forms of dsl would be appropriate?

Answers

If a customer intends to transmit more data than they receive, the appropriate form of DSL would be Asymmetric Digital Subscriber Line (ADSL).

ADSL provides higher upload speeds compared to download speeds, making it suitable for users who need to send more data than they receive. To use ADSL, the customer would need an ADSL modem and a subscription from a DSL service provider.

#SPJ11

Learn more about DSL: https://brainly.com/question/12859851

If a customer intends to transmit more data than they receive, Asymmetric Digital Subscriber Line (ADSL) and Symmetric Digital Subscriber Line (SDSL) are the two DSL types that would be appropriate.

The following are some distinctions between the two:ADSL (Asymmetric Digital Subscriber Line): ADSL allows for a faster download speed than upload speed, making it suitable for customers who prefer to download more content than upload. ADSL is an acronym for Asymmetric Digital Subscriber Line. The speed is determined by the type of ADSL service you have subscribed to; for instance, ADSL2+ has a speed limit of 24 Mbit/s downstream and 1 Mbit/s upstream.SDSL (Symmetric Digital Subscriber Line): SDSL is a type of DSL that provides equal upload and download speeds, making it appropriate for customers who require a balanced amount of download and upload speed. SDSL is an acronym for Symmetric Digital Subscriber Line. The speed is the same for uploading and downloading, with a range of 128 Kbps to 3 Mbps.

Learn more about data: https://brainly.com/question/179886

#SPJ11

what is the difference between a root and a node of a phylogenetic tree?

Answers

In a phylogenetic tree, the root represents the common ancestor from which all branches and nodes originate, while a node represents a point of divergence or a common ancestor of a subset of branches within the tree.

A phylogenetic tree is a diagram that represents the evolutionary relationships and ancestry among different organisms or groups of organisms. It is composed of branches and nodes that depict the evolutionary history and the branching patterns of lineages. The root of a phylogenetic tree is the starting point and represents the common ancestor from which all branches and nodes emerge. It is typically positioned at the base of the tree and represents the oldest known ancestor shared by all organisms or groups included in the tree. The root does not have any incoming branches, as it is the initial point of divergence.

Nodes in a phylogenetic tree are points where branches intersect or diverge. Each node represents a common ancestor, either for a subset of branches or for a single branch. Nodes indicate points of evolutionary divergence, representing speciation events or common ancestors shared by certain lineages. The branches that originate from a node depict the evolutionary relationships between different organisms or groups. In summary, the root of a phylogenetic tree represents the common ancestor shared by all organisms in the tree, while nodes represent points of divergence or common ancestors for specific subsets of branches within the tree, illustrating the evolutionary relationships between organisms or groups.

Learn more about organisms here: https://brainly.com/question/2316084

#SPJ11

Write a recursive method named editDistance that accepts string parameters s1 and s2 and returns the "edit distance" between the two strings as an integer. Edit distance (also called Levenshtein distance) is defined as the minimum number of "changes" required to get from s1 to s2 or vice versa. A "change" can be defined as a) inserting a character, b) deleting a character, or c) changing a character to a different character. Call Value Returned editDistance("driving", "diving") 1 editDistance("debate", "irate") 3 editDistance("football", "cookies") 6

Answers

Answer:

Explanation:

The following code takes in the two parameters s1 and s2 and returns the Levenshtein distance of the two strings passed.

def editDistance(s1, s2):

   m = len(s1) + 1

   n = len(s2) + 1

   arr = {}

   for x in range(m):

       arr[x, 0] = x

   for y in range(n):

       arr[0, y] = y

   for x in range(1, m):

       for y in range(1, n):

           proc = 0 if s1[x - 1] == s2[y - 1] else 1

           arr[x, y] = min(arr[x, y - 1] + 1, arr[x - 1, y] + 1, arr[x - 1, y - 1] + proc)

   return arr[x, y]

Write a recursive method named editDistance that accepts string parameters s1 and s2 and returns the

functions of operating systems​

Answers

Answer:

The functions of operating system are:

Explanation:

It protects the user to create,copy,delete,move& rename files & folders.

It protects the stored information from unauthorized users & denies them access to data.

It manages the storage and retrieval of data from disks.

It manages the input to and output form of computer system.

What is binary ????????

Answers

Binary (or base-2) a numeric system that only uses two digits — 0 and 1. Computers operate in binary, meaning they store data and perform calculations using only zeros and ones. A single binary digit can only represent True (1) or False (0) in boolean logic.1. Binary is a base-2 number system invented by Gottfried Leibniz that is made up of only two numbers: 0 and 1. This number system is the basis for all binary code, which is used to write data such as the computer processor instructions used every day.

Answer:

it is a numeric system that only uses two digits 1 and 0, computers can operate using binary meaning they store data and perform calculations only using 0 and 1

Using Python
For example using Simpson 3/8 Rule:
def func(x):
return (float(1) / ( 1 + x * x ))
# Function to perform calculations
def calculate(lower_limit, upper_limit, interval_limit ):
interval_s

Answers

Answer:

The Simpson's 3/8 rule is a method for numerical integration, similar to the simpler Simpson's 1/3 rule. It is a more accurate method and is used when higher precision is required. It involves dividing the area under a curve into multiple segments, calculating the area of each segment, and summing these areas to approximate the total integral.

The formula for Simpson's 3/8 rule is as follows:

`∫a to b f(x) dx ≈ (3h/8) * [f(a) + 3f(a+h) + 3f(a+2h) + f(b)]`

where 'h' is the width of the interval, 'a' is the lower limit, and 'b' is the upper limit.

Here's how you might implement this in Python, based on your provided function `func`:

```

def func(x):

   return (float(1) / ( 1 + x * x ))

def calculate(lower_limit, upper_limit, interval_limit):

   h = (upper_limit - lower_limit) / interval_limit

   # calculation

   integral = func(lower_limit) + func(upper_limit)

   for i in range(1, interval_limit):

       if i % 3 == 0:

           integral += 2 * func(lower_limit + i * h)

       else:

           integral += 3 * func(lower_limit + i * h)

   integral *= 3 * h / 8

   return integral

```

In this code:

- `func` is the function you want to integrate.

- `calculate` performs the actual integration using Simpson's 3/8 rule.

- The integral is initialized with `func(lower_limit) + func(upper_limit)`.

- The loop then adds `2 * func(lower_limit + i * h)` if `i` is divisible by 3, and `3 * func(lower_limit + i * h)` otherwise.

- Finally, the integral is multiplied by `3 * h / 8` to get the final result.

programs that control a server computer's resources are referred to as ________.

Answers

A form of system software called an operating system (OS) provides fundamental services to other software programs while managing the utilization of computer hardware and software resources.

OS definition and an example

You have probably engaged in a "PC versus Mac" argument at some point in your life. The decision about the operating system ultimately comes down to personal preference, despite the fact that everyone seems to have quite strong opinions on the subject. The majority of people can list one or more things they like, but they may struggle to pinpoint exactly what it is about those things that they appreciate best. They may express appreciation for a particular command prompt, some pre-installed software, the hardware's look and feel, the systems or apps they may download, or even the hardware itself.

Know more about   hardware and software Visit:

https://brainly.com/question/15232088

#SPJ4

1.Which one of the following buttons returns a window to its original size?

A.
Maximize button

B.
Close button

C.
Minimize button

D.
Restore button
2.What is the name used to identify the pointer that is controlled by the mouse?

A.
Alert

B.
Boot

C.
Cursor

D.
Drag
3.What is the process called when information from your computer is transferred to another computer?

A.
Upload

B.
Copy

C.
Transfer

D.
Download
4.Which one of the following indicates a file's format?

A.
Icon

B.
Extension

C.
Platform

D.
Driver

5.What term refers to a single directory that can hold a collection of files? A. Platform B. Folder C. Extension D. Icon
6.6.
What term refers to a single directory that can hold a collection of files?

A.
Platform

B.
Folder

C.
Extension

D.
Icon
7.What is the common term used to describe a single computer document?

A.
Driver

B.
File

C.
Screenshot

D.
Icon
8.
What is the main piece of computer software on which every other piece of software relies?

A.
Desktop

B.
Operating system

C.
Database

D.
Driver
BUT DOES ANYONE HAVE AL 20 ANSWERSSSSS I'LL MARK YOU THE BRAINLIEST PLEASEEEE HELPPPP

Answers

Answer:

1. D

2.C

3. D

4. A

5. B

6.B

7.B or D

8.C

Explanation:

Not 100% sure about 3,4, 8

PLEASE HELP I WILL GIVE BRAINLIEST AND 100 POINTS IF U ANSWER COMPLETELY WITHIN 30 MIN
A classmate in your photography class missed several days of class, including the day that the instructor explained the artistic statement. Your classmate asks you to help fill them in so that they can create an artistic statement for an upcoming project. How would you explain this concept and the purpose behind it? What would you tell them to include in their statement? Explain.

Answers

The wat that you explain this concept and the purpose behind it as well as others is that

To create an artistic statement, you should start by thinking about what inspires you as an artist, and what themes or ideas you hope to address in your work. This could be anything from a particular emotion or feeling, to a social or political issue, to a specific artistic style or technique.

What is the  artistic statement?

An artistic statement is a brief description of your artistic goals, inspiration, and vision as an artist. It should outline the themes and ideas that you hope to explore through your work, and explain what you hope to achieve or communicate through your art.

In the above, Once you have a sense of your inspiration and goals, you can start to craft your artistic statement. Some things you might want to include in your statement are:

Therefore, A description of your artistic process, including the mediums and techniques you use to create your work

A discussion of the themes or ideas you hope to explore through your artA statement about your goals as an artist, including what you hope to achieve or communicate through your workA discussion of the influences that have shaped your artistic style, including other artists or movements that have inspired you

Learn more about photography from

https://brainly.com/question/13600227

#SPJ1

Answer:

I don't get the other answer :(

Explanation:

What is the something in the computer can be in the form of a tables, reports and graphs etc.​

Answers

Microsoft is the correct answer right

What type of computer should you consider purchasing if you want a system that is ideal for dedicated gamers, serious designers, desktop publishers, a

Answers

High-end desktop computers typically come with the latest hardware components, such as high-speed processors, dedicated graphics cards, fast storage drives, and plenty of RAM.

They are also highly customizable, allowing users to add or remove components as needed to suit their specific requirements. If you're a gamer, you'll want a desktop computer with a powerful graphics card that can handle the latest games with ease. Look for a computer with an NVIDIA or AMD GPU with at least 4GB of dedicated memory.

You'll also want a fast processor with multiple cores to ensure smooth gameplay. Serious designers and desktop publishers will benefit from a high-end desktop computer with a large display and plenty of RAM. Look for a computer with at least 16GB of RAM, and a high-resolution monitor with accurate colors.

To know more about computers  visit:-

https://brainly.com/question/5230419

#SPJ11

2.
Solve each equation.
a)
3n - 8 = 2n + 2
b)
4n + 75 = 5n + 50

Answers

Answer:

A) n=10

B) n=25

Explanation:

Mind marking me brainliest?

The purpose of Alexis Ohanian's TEDTalk is to:
O A. illustrate the power of the Internet.
O B. educate the public about social problems.
C. help Internet users make lots of money.
D. end Japan's whale hunting campaign.
SUB

Answers

Answer:

A

Explanation:

The purpose of Alexis Ohanian's TEDTalk is to illustrate the power of the Internet. Thus, option A is correct.

Who is Alexis Ohanian?

Alexis Ohanian is the founder of social networking website. In his TED talk from 2009, Alexis Ohanian talks about the power of the Internet with the help of memes and their promotion. He discusses what it takes to make memes work for you.

Ohanian tells the story about users named a Greenpeace whale avatar “Mister Splashy Pants.”  Greenpeace found a marketing campaign in the process. This campaign had an effect which in the end Japanese government drew back from the hunting of humpback wha.

Interaction is known as a kind of action that occurs as two or more objects have an effect on one another. This is reciprocal action or influence.

Therefore, The purpose of Alexis Ohanian's TEDTalk is to illustrate the power of the Internet. Thus, option A is correct.

Learn more about Internet on:

https://brainly.com/question/13308791

#SPJ5

Explain why it is wise to memorize your social security number.

Answers

It is memorize your social security number as one can be able to recur it for any given purpose if one did not carry it along with them.

Why memorize your social security number?

The reason why it is important to memorize your social security number is that by doing so, one do not need to carry or use their card again.

Conclusively, Note that It is not the card but the number that is very important and as such it is vital that one knows their Social Security number that is the nine digits number off heart and in cases of emergencies when one forgot to carry their cards.

Learn more about social security number from

https://brainly.com/question/5213237

#SPJ4

Other Questions
Which of the following is the best example of a supply-side market failure?No one provides street lights in a town because, once the lights are in operation, people don't have to pay to use them.A firm keeps its production costs down by dumping its waste in the nearby river, adversely affecting water quality for residents in the area.Government imposes taxes on the production of a socially desirable good.Street performers don't get full payment for the value of their output because people watch and enjoy the shows without paying the artist. will give 20 points to whoever answers Which of the following tables shows a uniform probability model? Which of the following is not an example of scarcity? Calculator Bookwork code: K81 X not allowed The function g is shown below. g(x) = x + 9x Write an expression for g(x + 4) in the form a2 + ax + b, where a and b are numbers. 33. It is recommended to test the vertical jump or standing long jump everyA. 2 weeks.B. 4-6 weeks.C. 8-10 weeks.D. 12 weeks. Problem 3: Air enters a compressor operating at steady state at a pressure of 1bar, a temperature of 290K and a velocity of 6m/s through an inlet with an area of 0.1m2. It exits at 7bar and 450K with a velocity of 2m/s. Heat transfer from the compressor to the surroundings occurs at a rate of 180kJ/min. Assuming air behaves as an ideal gas, a) Calculate the power input to the compressor, in kW and sketch the process on a T- diagram. [15] b) Calculate the power input to the compressorn kW utilizing the polynomial approximation for the specific heat at constant pressure of Homework 4, problem 3, part c) [10] Compare and comment mary is experiencing low levels of self-esteem which has led to her over-evaluation of her body image. this over-evaluation has consequently led to the development of negative eating behaviors such as calorie restriction and compensatory behaviors. what model best explains why mary developed an eating disorder? group of answer choices transdiagnostic model How does the speakers experience at the airport affect their point of view?The Story is Gate A-4 by Naomi Shihab Nye please help 10 points which of the following are typical in a new buy situation? (choose every correct answer.) multiple select question. several members of the buying center will be involved. the buying center will proceed through all six steps in the buying process. the organization will switch back to an old vendor. the organization will make changes to a standing order. 1.How does a squat improve your muscular strength? 2.What sports might you do squat exercises for? need help FAST not sure When a character exhibits one primary trait throughout a story. What type of character is he or she? If AC = 41, find the value of x? (Giving 35 points) Some pressure to increase performance can be healthy for an organization because it encourages managers to find new and better ways to _______. Uniaxial compressive stress calculation What will you see if the Moon is fully within the penumbra of the Earth's shadow? Will it be a full moon or a orange full moon (lunar). I WILL GIVE BRAINLIEST. Olivia opens a bank account and deposits $514.During the month Olivia withdraws $120.00 and deposits $40. What is her new balance? What was Walt Disney's original character?