During which phase of the SDLC is hardware purchased, while software is purchased, customized, or developed? Group of answer choices System implementation System design System development System analysis

Answers

Answer 1

Hardware is usually purchased during the system implementation phase of the Software Development Life Cycle (SDLC). Software is usually purchased, customized, or developed during the system development phase of the SDLC.

The Software Development Life Cycle (SDLC) is a framework for developing software that is used by developers and project managers to guide the software development process. The SDLC consists of several stages that must be completed in order to build a successful software product. The stages are as follows:

1. System Analysis

2. System Design

3. System Development

4. System Implementation

5. System Maintenance

During the system analysis phase, the requirements for the software are gathered and documented. During the system design phase, the requirements are used to design the software. During the system development phase, the software is built. During the system implementation phase, the software is installed and tested. Finally, during the system maintenance phase, the software is updated and maintained.

Learn more about SLDC: https://brainly.com/question/30089252

#SPJ11


Related Questions

a new layer 3 switch is connected to a router and is being

Answers

A Layer 3 switch is a device that combines the functions of a switch and a router. It can connect devices on the same subnet or VLAN at high speeds and also support routing protocols and quality of service specifications. When configuring a new Layer 3 switch for interVLAN routing, some of the steps required for the configuration include: enabling IP routing, assigning ports to VLANs, and installing a static route.

Connecting a Layer 3 switch to a router involves configuration of the switch's interfaces, setting up VLANs, and configuring routing protocols for improved network performance.

When a new Layer 3 switch is connected to a router, it involves configuring the switch's interfaces, setting up VLANs (Virtual Local Area Networks), and configuring routing protocols. The Layer 3 switch can perform routing tasks as well as switching tasks. The goal is to optimize the network's overall performance. For example, if there's a lot of inter-VLAN traffic, a Layer 3 switch can handle that locally without having to involve the router. This frees up the router to handle other tasks and reduces overall network traffic. Therefore, when connecting a Layer 3 switch to a router, it's important to plan the configuration carefully according to specific network requirements and architecture.

Learn more about Layer 3 switch here:

https://brainly.com/question/31563411

What gets printed after the following code is run?
var name;
console.log(name);
Select the one choice that best answers the prompt above:
Answer 1
undefined
Answer 2
nothing
Answer 3
error
Answer 4
name
Next......

Answers

Answer:

Mia Khalifa jenny since

What is the least commonly modified settings and the most commonly modified settings in the bios?

Answers

The CPU clock setting in BIOS is one of the least frequently altered settings.

What are BIOS default settings?The technique can also be used to roll back your system after making other modifications because resetting your BIOS returns it to the most recent configuration that was saved. Whatever the circumstance, keep in mind that resetting your BIOS is a straightforward process for both novice and experienced users. A Load Setup Defaults or Load Optimized Defaults option is also available in BIOS. By selecting this option, your BIOS is brought back to its factory defaults, loading default settings tailored for your hardware. Any modifications you've made, such as changing the boot sequence, will be undone if you clear the BIOS settings. But don't worry, Windows won't be impacted. When finished, be sure to click the Save and Exit button to make your changes permanent.  

Hence, The CPU clock setting in BIOS is one of the least frequently altered settings. This is so that the correct clock speeds for the processors may be set by the current processors, which automatically recognize the bus. The boot device and boot order configuration are the BIOS settings that are most frequently changed.

To learn more about BIOS, refer to:

https://brainly.com/question/13103092

#SPJ4

the + operator and the += operator can both add numbers and concatenate strings. what can they do for arrays?

Answers

The "+" and "+=" operators can be used for different purposes in various programming languages. However, in the context of arrays, their functionalities are quite limited.

The "+" operator cannot directly add two arrays. Instead, it is often used with array methods to merge or concatenate arrays. For example, in JavaScript, you can use the Array.prototype.concat() method, and in Python, you can use the "+" operator to join two lists.

JavaScript example:
```javascript
let array1 = [1, 2, 3];
let array2 = [4, 5, 6];
let newArray = array1.concat(array2); // newArray will be [1, 2, 3, 4, 5, 6]

Python example:
python
list1 = [1, 2, 3]
list2 = [4, 5, 6]
new_list = list1 + list2  # new_list will be [1, 2, 3, 4, 5, 6]

The "+=" operator, on the other hand, can be used to extend an array by appending elements from another array. This is known as the "in-place" operation, as it modifies the original array instead of creating a new one.

JavaScript example (using Array.prototype.push() with the spread operator):
```javascript
let array1 = [1, 2, 3];
let array2 = [4, 5, 6];
array1.push(...array2); // array1 will now be [1, 2, 3, 4, 5, 6]

Python example:
python
list1 = [1, 2, 3]
list2 = [4, 5, 6]
list1 += list2  # list1 will now be [1, 2, 3, 4, 5, 6]

In summary, the "+" and "+=" operators can be utilized to concatenate or merge arrays in various programming languages, but they cannot be used to directly add arrays. These operators are often combined with specific array methods to achieve the desired result.

To know more about operators visit:

https://brainly.com/question/29949119

#SPJ11

Nowadays, there are a variety of ways to edit, revise, and modify your photography endeavors beyond the darkroom (although the darkroom is still a viable option). Evaluate the various options that exist with media, technique, and process for editing, revising, and modifying your images. Why might someone choose one technique over another? Provide an example to help illustrate your answer.
You have been asked to create an exhibition level series of photographs for your graduate-level photography class. Money is not an issue and there is no budget; however, it is imperative that your images are put together in a way that protects them from contaminants or discoloration and are displayed in a way that is appropriate for a very high-end gallery where customers will be looking to pay top dollar for the very best art and photography. How would you prepare your images for such an event? Explain what factors you would need to consider in order to accomplish this and identify how you will prepare and install these photographs, including what the process would involve.
A classmate in your photography class missed several days of class, including the day that the instructor explained the artistic statement. Your classmate asks you to help fill them in so that they can create an artistic statement for an upcoming project. How would you explain this concept and the purpose behind it? What would you tell them to include in their statement? Explain.
Imagine that you are planning to display 30 photographs at an upcoming art exhibit. In an effort to stay organized, you want to create a loose budget estimation. You decide that the first step in doing this is listing the main areas that will need to be included in your budget. Create a list of at least of the three main parts of your budget and provide one example of an item that would fall under each area.
Choose a photograph that you have personally taken or that you have found online. Evaluate and explain what type of mounting, matting, and framing would best complement and highlight this image and why. Describe each aspect that you would use (matte or shiny mat, wood frame, metal frame, etc.) and provide a copy of your image with your answer.

Answers

Answer:

I'm not a photographer, but I think someone might choose one technique over another because

1. They like it better

- feeling

- mood

2. They are pro at it???

Explanation:

I don't know, maybe search your question up online or something. Or ask someone on Quora, cuz Quora is more diverse.

Explanation:

Some of the tools to use to edit, revise, and modify your photography is the use of Image editing tool such as:

Adobe Lightroom. Adobe Photoshop, etc.

What is image editor?

This is known to be a kind of graphic or photo software, that is often used in photography when working on enhancing an image.

Conclusively, Note that image editor often edit and alters an image, picture, etc.  and a common tool is the use of Adobe Photoshop.

Learn more about photography from

https://brainly.com/question/25821700

#SPJ2

20 Points and Brainliest!!!!!!
Select the correct answer.
Amara is designing a website to encourage people in a city to vote in local elections. She wants to include a web page that shows first-time voters the steps to follow to register and vote in the elections. How can Amara best use multimedia to show the voting process on the web page?

A.
by providing a paragraph of instructions with pictures
B.
by providing an audio file along with downloadable pictures
C.
by creating a brief animation with optional text instructions
D.
by creating a static slideshow of the steps showing just pictures
E.
by adding automatically playing audio with text instructions

Answers

Answer:

I think E, sorry if I'm wrong.

Answer:

I think it might be C

Explanation:

What hardware components are generally required for a desktop computing system?

Answers

The hardware components generally required for a desktop are the motherboard, cpu, gpu, ram, power supply, cpu cooling, m.2 storage in the motherboard. I hope this helps!

true or false A software license is a legal agreement but it does not control the use and distribution of software.

Answers

A software license is a legal agreement but it does not control the use and distribution of software is True.

They are some of the exclusive rights that the copyright owner has, or the rights that come with copyright ownership. A permission is granted by a license.

What is licensed software?On the other hand, licensed software is exclusive software that is only made available to authorized users through a licensing agreement. As the source code is not intended to be shared with the public for anyone to view or alter, it is the exact opposite of open source.Shareware software is offered for free or at a cheap cost, but in order to use it fully legally, it usually needs to be purchased and registered.Free software that has minimal license and copyright restrictions is known as proprietary software. The distribution disc's most popular apps and files are copied to your computer's hard drive during a custom installation.

To learn more about licensed software refer to:

https://brainly.com/question/29106760

#SPJ1

what are three nondestructive editing options that can be used

Answers

Nondestructive editing options refer to methods of editing that do not change the original image or file.

Three nondestructive editing options include:

Layer masks: Adjustment layersSmart objectsLayer masksLayer masks are a way of revealing and hiding specific parts of an image or file without permanently altering the original content.

Layer masks are useful for making precise selections, adding or removing color, and adjusting tonality.

Adjustment layers: Adjustment layers enable you to apply color, tonal, and saturation adjustments to your images without permanently altering the original content. When an adjustment layer is created, a mask is generated, which allows the user to apply adjustments selectively.

Smart objects: Smart objects are layers that can be scaled, transformed, and resized without degrading the quality of the original content.

Smart objects are useful for nondestructive editing because they allow the user to make changes to the content without permanently altering it.

Know more about Nondestructive editing options here:

https://brainly.com/question/21318609

#SPJ11

The conditional function is defined as Ch(e, f, g) = If e then f else g. Evaluate the conditional function for the following: e = 01101011, f = 10010010, g = 01010100 Ch(e, f, g) =

Answers

The conditional function allows us to choose between two values (f and g) based on the condition (e). If the condition is true, the function returns the first value (f), and if the condition is false, it returns the second value (g).

To evaluate the conditional function Ch(e, f, g), we need to substitute the values of e, f, and g into the function and apply the logical operation.

Given:

e = 01101011

f = 10010010

g = 01010100

The conditional function Ch(e, f, g) = If e then f else g.

To evaluate Ch(e, f, g), we need to check the value of e. If e is true (non-zero), then the function will return the value of f. Otherwise, if e is false (zero), the function will return the value of g.

Let's break down the evaluation step by step:

Check the value of e: e = 01101011.

Since e is non-zero, it is considered true.

Return the value of f: f = 10010010.

Therefore, Ch(e, f, g) = 10010010.

In this case, since the value of e is true (non-zero), the conditional function returns the value of f (10010010).

To learn more about conditional, visit:

https://brainly.com/question/9362514

#SPJ11

Name three security best practices for mobile workers as defined in the Secure Remote Computing STIG.

Answers

The Secure Remote Computing STIG outlines several best practices to ensure security for mobile workers. Three of these key practices include:

1. Device encryption: Mobile workers should utilize encryption on their devices to protect sensitive data from unauthorized access. This helps safeguard information even if the device is lost or stolen.

2. VPN use: A Virtual Private Network (VPN) should be employed by mobile workers to securely connect to the organization's network. VPNs encrypt data transmitted over the internet, providing an additional layer of security against potential data breaches.

3. Multi-factor authentication (MFA): MFA involves using at least two different methods of authentication, such as a password and a physical token or a biometric identifier, to verify a user's identity. Implementing MFA for mobile workers helps reduce the risk of unauthorized access to organizational resources.

By following these security practices, mobile workers can ensure the protection of their devices and the sensitive data they handle while working remotely.

To know more about Secure Remote Computing visit:

=brainly.com/question/29273717

#SPJ11

How do u kiss someone and not feel werid about it afterwards

Answers

Answer: just don't kiss someone

Explanation: easy, but if you do then just leave. duh

Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program.
a. true
b. false

Answers

True. Pseudocode is a method of describing the steps of a program without using the specific syntax of a particular programming language. It is a way for programmers to plan out their code before they actually start writing it.

Pseudocode can be used to communicate ideas between team members, to clarify the logic of a program, and to test out different approaches to solving a problem. Ultimately, the pseudocode will be translated into actual code that a computer can execute, but using pseudocode can help make that translation process more efficient and less error-prone.


The statement "Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program" is true (a). Pseudocode is a high-level description of an algorithm or a program that uses human-friendly language to outline the basic structure and steps involved. It helps the programmer to understand the logic and design before translating it into actual code in a programming language.

To know more about programmers visit:-

https://brainly.com/question/30307771

#SPJ11

which tool is used to terminate cables into a 66-block

Answers

Answer: Circuit pairs are connected to the block with a punch-down tool by terminating the tip wire on the leftmost slot of one row and ring wire on the leftmost slot of the row beneath the mating tip wire.

You have to match the letter nexts to the numbers

You have to match the letter nexts to the numbers

Answers

Answer:

Word is for business letter 4+a

2+c Monthly budget expenses

3+b is for presentation

1+d department store inventory

what is computer hardware​

Answers

Answer:

stuff like a mouse or a keyboard and that kind of stuff

If involved in a boating accident causing serious bodily injury or death while boating under the influence, the operator has committed a _____. felony misdemeanor non-criminal offense liability

Answers

Answer:

felony

Explanation:

It is an offence on the part of a boat operator who is under the control of alcohol while boating, as such could result in property damage, serious bodily injury or death. Where such leads to bodily injury or deaths, the operator could be convicted for felony while misdemeanor applies to property damage.

There have been a reoccurring boating incidence in the country especially in the state of Florida, which has the highest number of boating fatalities hence created stiff penalties for boating under the influence of alcohol.

While it is adviseable for motorists not to drink and drive, it is also not lawful be under the influence when boating as such could cause injury, deaths or property damage and such operator would receive appropriate penalty depending on the outcome of the incident.

PLS ANSWER QUICK ILL MARK BRAINLEIST
Who should be making these ethical questions about what self-driving cars would do in a hazardous road condition that could lead to deaths? Computer Scientists? Car Company Executives? Government? Someone else? Explain your reasoning.

Answers

Answer:

I think it's a bit of a team effort. Computer scientists are certainly important because they're the ones developing the technology, so they need to consider the ethical implications of their work. But car company executives also have a big role to play because they're the ones ultimately responsible for putting the technology into cars and ensuring that it's safe. And government regulators also need to be involved to make sure that the cars are operating within legal and ethical bounds. So, it's not just one group of people, but rather a collaboration of all the stakeholders involved. And it's important to consider the ethical issues at every stage of development, testing and deployment.

Use the pivot table to answer the question.
2. How many positions are there in the Media & Design department? (1 point)
Oone
Otwo
Othree
four

Answers

Three, positions are there in the media & design department. Thus, option (c) is correct.

What is media?

The term "media" refers to the medium of communication. The media is the fourth pillar of democracy. The media was used to communicate with numerous people. There were the different categories of the media, such as print media (newspapers, magazines), electronic media (radio and television), and digital media (social media).

According to the media house are the division of the department are the main department are the media & design department. This department are the based on the three positions such as functional, physical, and operational. It was the three position on the based.

As a result, the three, positions are there in the media & design department. Therefore, option (c) is correct.

Learn more about on media, here:

https://brainly.com/question/14047162

#SPJ1

Which is NOT true?
9 + 4 = 17 - 4
8 + 7 = 14 + 3
11 = 19 - 8
5 + 8 = 20 - 7

Answers

Answer:

B 8 + 7 = 14 + 3

Explanation:

i need an answer asap pls!! thank you!

i need an answer asap pls!! thank you!

Answers

To create and initialize the 2D list as shown, you can use the following code:

my_list = [["Account", "Grades", "Quizzes"],

          ["Miani", "Atlanta", "Dallas", "Los Angeles", "New York", "Chicago", "Portland", "Sacramento"]]

How to explain the Code

To print the list, you can define a function named printList() that takes the list as a parameter and prints it using nested loops, as shown below:

def printList(my_list):

   for i in range(len(my_list)):

       for j in range(len(my_list[i])):

           print(my_list[i][j], end=" ")

       print()

printList(my_list)  # call the function to print the original list

To flip the order of the cities in the list, you can define another function named fliporder() that takes the list as a parameter and reverses the order of each sublist containing cities using the reverse() method, as shown below:

def fliporder(my_list):

   for i in range(1, len(my_list)):

       my_list[i].reverse()

   printList(my_list)  # call the printList() function to print the flipped list

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Which science topics would be suited for this organizational aid? Check all that apply.
looking at similarities and differences of certain types of vegetation
persuading someone of the importance of a certain scientific position
writing an analysis on how rocks are formed
listing the events in the life of a famous scientist
comparing two different types of landscapes

Answers

Answer:

A- looking at similarities and differences of certain types of vegetation

and

E- comparing two different types of landscapes

Explanation:

Got it right on edge

The science topics  suited for this organizational aid are:

Looking at similarities and differences of certain types of vegetation.Comparing two different types of landscapes.

What is vegetation?

Vegetation is known to be a term that connote the  life of a plant in a specific region.

Conclusively, Note that it is also seen as the ground area that has been provided by plants, and as thus, its description fits the science topics   that is suited for this organizational aid

Learn more about landscapes from

https://brainly.com/question/7027022

Which of the following are personality tests? Check all of the boxes that apply.

A- the big five personality test

B- the Myers-Briggs Type Indicator

C- the Rorschach inkblot test​

Answers

the answers are:

- the big five personality test

- the myers-briggs type indicator

- the rorscharch inkblot test

(basically all of them)

The following are personality tests:

the big five personality test

the Myers-Briggs Type Indicator

the Rorschach inkblot test​

Thus option (a), (b), and (c) are correct.

What  is the personality test?

The personality test is a means of assessing or evaluating human personality. The most of the tools for evaluating the personality are of subjective self-report questionnaire measures or reports from life records such as grade scales.

The big five theory of personality suggests that personality is composed of five broad dimensions: extroversion, agreeableness, conscientiousness, neuroticism, and openness.

The following are personality tests:  the big five personality test; the Myers-Briggs Type Indicator and  the Rorschach inkblot test​. Therefore, option (a), (b), and (c) are correct.

Learn more about personality test here:

https://brainly.com/question/29501903

#SPJ5

what property of virtualization allows entire virtual machines to be saved as file that can moved or copied like any other file?

Answers

Encapsulation is the property of virtualization that allows entire virtual machines to be saved as a file that can be moved or copied like any other file.

A virtual machine is a tightly isolated software container that runs operating systems and applications the same as a physical computer. Although there is no requirement for hardware for a virtual machine to operate, it still has a CPU, RAM, hard disk, and network interface card just like a physical computer. These features make virtual machines incredibly easy to manage and portable, referring to as the encapsulation property of virtual machines.

The encapsulation allows one to move and copy a virtual machine from one device to another just like any other software file or program, as well as permits to save it on any storage medium.

You can learn more about virtual machine at

https://brainly.com/question/19743226

#SPJ4

A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual

Answers

Answer:

I believe it is logical.

Answer:  c) logical

Explanation:

:)

Question 1 of 10
Which step happens first after a switch receives a message that includes a
MAC address?
OA. The switch receives a reply from the message's receiving device.
B. The switch sends the message to a random device on the
network.
OC. The switch looks up the receiving device's MAC address in a
switching table.
OD. The switch forwards the message to the port of the receiving
device.
SUBMIT

Answers

The step that happens first after a switch receives a message that includes a MAC address is that "The switch looks up the receiving device's MAC address in a switching table." (Option C)

What is a MAC Address?

A media access control (MAC) address is a one-of-a-kind identifier assigned to a network interface controller for use as a network address in intra-network communications. This is a widespread use in most IEEE 802 networking technologies, such as Ethernet, Wi-Fi, and Bluetooth.

What is a switch?

A network switch is a piece of networking gear that links devices on a computer network by receiving and forwarding data to the target device using packet switching.

Learn more about MAC Addresses:
https://brainly.com/question/24812654
#SPJ1

State one criteria that makes a piece of malware a virus.

Answers

Answer: Self replication

Explanation: Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it's distributed. A virus is a specific type of malware that self-replicates by inserting its code into other programs.

tags at the same level of nesting are referred to as __________

Answers

Tags at the same level of nesting are referred to as "sibling tags."

Sibling tags, in HTML, for example, elements that are at the same level of nesting are siblings. For instance, in the following code snippet, the <h2> and <p> elements are siblings because they are both direct children of the <div> element:

<div>

 <h2>Title</h2>

 <p>Paragraph</p>

</div>

In HTML, elements are organized in a hierarchical structure called the Document Object Model (DOM). Each element in the DOM can have zero or more child elements, which are nested inside it. Siblings are elements that share the same parent and are at the same level of nesting.

Learn more about nesting: https://brainly.in/question/15725823

#SPJ11

which strategies can protect against a rainbow table password attack

Answers

A rainbow table is a precomputed table of plaintext passwords and their corresponding hash values. An attacker can use a rainbow table to obtain the plaintext password that corresponds to a hash value.

The following strategies can protect against a rainbow table password attack:Salt: A salt is a random value that is added to the plaintext password before it is hashed. The salt is different for each password. A salt makes rainbow tables less effective because a new table would be required for each salt value.Long and complex passwords: A long and complex password is less vulnerable to a rainbow table attack than a short and simple password because it is harder to crack through brute-force methods. Passwords should be at least 12 characters long, and they should include uppercase letters, lowercase letters, numbers, and symbols.

A password policy should be in place to enforce these requirements.Password hashing: A good password hashing algorithm uses a slow and computationally intensive function to transform the plaintext password into a hash value. A slow function can slow down an attacker who is trying to build a rainbow table. The function should be designed to be resistant to parallelization, so that an attacker cannot speed up the attack by running it on multiple processors. One such algorithm is bcrypt.

To know more about rainbow visit:

brainly.com/question/31608629

#SPJ11

what unit is used to measure horizontal refresh rate (hrr)?

Answers

Answer:.

Explanation:

Horizontal refresh rate (HRR) is measured in units of Hertz (Hz).More than 100 words:The horizontal refresh rate, often abbreviated as HRR, is a measure of the number of times the horizontal image on a display is refreshed per second. This unit of measure, like the vertical refresh rate, is given in Hertz (Hz).

This refers to the number of times per second that the display changes the image on the screen. This is similar to the vertical refresh rate, which refers to how many times per second the display changes the image on the screen vertically.The horizontal refresh rate determines how fast the electron beam can scan horizontally across the screen's face to display an image. When the horizontal refresh rate is too low, the image may appear to flicker on the screen. Flickering can lead to eye strain, headaches, and other problems for users who spend a lot of time staring at computer screens.

This is particularly true for people who work with computers for extended periods, such as graphic designers, programmers, and others.Therefore, the horizontal refresh rate is a significant factor in a display's overall quality and usability. A higher HRR means a smoother image and fewer flickers, which is why it's critical to choose a display with a high refresh rate when using it for prolonged periods.

To know more about Horizontal visit:

https://brainly.com/question/29019854

#SPJ11

Other Questions
Which of the following achievements in public health during the 20th century is most responsible for healthier babies and decreased infant mortality? Inspections of a safer food supply Growth of family planning services Link between smoking and cancer Establishment of Medicaid and Medicare What is the measure of Arc A U? 44 50 64 92 Which of the following best describes applying a force over a period of time?powerenergyImpulse How could George Washington Carvers discoveries help people on both a local and a global level? 5. A researcher used head-mounted eye tracking to record what crawling and walking infants see as they move around a playroom. An assistant followed behind infants holding a harness to prevent the tiny camera on the headgear from injuring infants' eye if infants fell onto their face. Although reviewers of their research article agreed that ensuring infants' safety is paramount, they were concerned that the trailing researcher might interfere with infants' natural play of the study. behavior and thereby threaten the a. ecological validity. b. reliability. reliability and validity. d. inter-rater validity. the minimum payment the landowner will accept to put his land into use is called: someone please help me Part B.Select all the patterns that correctly describe the graph.linear associationstrong positive correlationstrong negative correlationoutliers for dataoutlers for data PLEASE HELP ASAPFill in the blank with the correct indirect object pronounYo _____ compart las respuestas. (l)Ya _____ cont Elisa lo que pas? (t)Ellos _____ traen cena cada domingo. (nosotros)Ral no _____ quiso decir la verdad. (yo)Yo _____ debo dinero. (usted)La maestra _____ regal galletas. (ellos)El perro _____ mostr su juguete. (yo)Yo _____ (l) ped a Miguel que _____ (yo) trajera una hoja de papel y una regla, pero _____ (yo) me trajo un cuaderno. Qu quiere que _____ compro? (usted)_____ sirvo ms caf? (ella) ATP is used by the -organs-your entire body -muscles please answer asap im taking a test 2 Which period of European history do the phrases"White Man's Burden" and "Scramble for Africa" referto? A man drove 12 mi directly east from his home, made a left turn at an intersection, and then traveled 7 mi north to his place of work. If a road was made directly from his home to his place of work, what would its distance be to the nearest tenth of a mile? calculate the ph of the cathode compartment solution if the cell emf at 298 k is measured to be 0.670 v when [zn2 ]= 0.22 m and ph2= 0.96 atm New England Tenchnologies, a biotechnology firm in the greater Buston area, has devised a bteakthough therapy that provides a cure for a certain disease - this treatment has been approved by the FDA . The company decide to go public and on September 10, 2022, the lead underwater files a regristration statement with the SEC. Please indicate which of the following actions are violations: a. One of the underwriting firms circulates a monthly newletter to all its clients. It contains an article that informs readers of the company's latest technology and latest drug appoval whicl will cause its revenues to rise. b. On September 20, 2022 the marketing department publishes an advertisement in Fortune magazine announcing the new technology and FDA approval.c. In the annual meeting of biologists, the R&D team placed an advertisement, in the conference proceedings, inviting all attendees to attenf a wine and cocktails reception hosted by the company after the meeting. if a firm's new-employee orientation session included a video telling the story of the company's founding and how it overcame various struggles to get to where it is today, which element of strategic management would this represent? Brians desk is 3 feet 7 inches long. Given that 1 inch is approximately 2.54 centimeters, about how many centimeters long is the deskA. 9.398 cmB.16.93 cmC. 109.22 cmD. 25.4 The world bank has developed a classification system that uses ________ as a base. Identifying Participial Phrases: Put P as for Participle. G for Gerunds. I for Infinitives1. Jupiter, knowing her charms, nevertheless married her to Vulcan, the ugliest of the gods. ___2. Mars, known to the Greek as Ares, was the god of war. ___3. Terrified by Ares power, many Greek did not like to worship him. ___ Compare 5.63 and 33. Which value is greater? Explain. a car traveling 14 m/s begins to decelerate at a constant rate of 3 m/s2. how far will the car have traveled before stopping?