hajar is responsible for keeping her banking institution's servers operating 24/7/365. her recovery strategy is to have fully redundant or duplicate operations and synchronized data and to operate the site continuously. which strategy has she selected?

Answers

Answer 1

She has decided to use an alternative processing facility or mirrored site as her strategy.

What is strategy?

A strategy is all about integrating organizational activities and utilizing and allocating the scarce resources within the organizational environment so as to meet the present objectives.While planning a strategy it is essential to consider that decisions are not taken in a vaccum and that any act taken by a firm is likely to be met by a reaction from those affected, competitors, customers, employees or suppliers.

Strategy can also be defined as knowledge of the goals, the uncertainty of events and the need to take into consideration the likely or actual behavior of others.Strategy is the blueprint of decisions in an organization that shows its objectives and goals, reduces the key policies, and plans for achieving these goals, and defines the business the company is to carry on, the type of economic and human organization it wants to be, and the contribution it plans to make to its shareholders, customers and society at large.

To learn more about Software refer to:

brainly.com/question/985406

#SPJ4


Related Questions

____ files involves combining two or more files while maintaining the sequential order of the records.

Answers

Merging files involves combining two or more files while maintaining the sequential order of the records.

What is Merging files?

Merging is known to be the act of of taking two or a lot of groups of data in the method of a file or folder, and adding them together into a single file or folder,

There are different kinds of files that exists. A computer file is one that comes in different format and sizes as well as its function. To merge connote to put two or more things together.

Note that, Merging files involves combining two or more files while maintaining the sequential order of the records.

Learn more about Merging files from

https://brainly.com/question/1206838

#SPJ1

Use the internet to find a foreign product that is not available
in the United States. Then take that foreign product and put
together a strategy to market it in the United States.

Answers

Marketing a foreign product in the United States can be quite a task. However, it’s a rewarding task as it opens doors to the opportunity for a new market and the potential to make profits.

In this context, we will use “Kangaroo Island Spirits”, a gin from South Australia, to discuss a strategy to market a foreign product in the United States.

Study the American Market and its needs: The first step in putting together a strategy to market Kangaroo Island Spirits gin is to research and understand the American market. Analyze the current trends and needs of the American gin market. This will give an idea of the demand for this product and also to know the different geographical locations where it can be marketed.Understand the Legal requirements: To ensure the product meets all legal requirements for sale in the United States, check the rules and regulations for importing the product into the US. Understanding the legal requirements will help in avoiding any legal issues and also prevent penalties and fines.Position the product in the USA: Most American consumers love their Gin, and marketing to their interests and tastes will make the product more attractive. A good place to position Kangaroo Island Spirits gin is in high-end restaurants, wine and spirits stores.Using Social media platforms can be useful in advertising the product as it reaches a large audience. There should be continuous promotions to create brand awareness and to increase sales.Choose a Distribution Channel: To make Kangaroo Island Spirits gin available for purchase by American consumers, it is important to find a distributor that specializes in alcoholic beverages and is familiar with the US market. Online sales can be a good channel for distributing the product and this can be done via sites like Amazon, and eBay.

Marketing a foreign product in the United States is a challenging task, however, it’s not impossible. By studying the American market, understanding legal requirements, positioning the product and choosing the right distribution channels, Kangaroo Island Spirits gin can be successfully marketed in the US.

To learn more about Marketing, visit:

https://brainly.com/question/27155256

#SPJ11

If a compounded sterile product is prepared in a compounding aseptic isolator that is located in a segregated compounding area (SCA), what is the maximum beyond use date that can be assigned?

A) 6 hrs
B) 36 hrs
C) 1 hr
D) 24 hrs
E) 12 hrs

Answers

The Beyond Use Date (BUD) assigned to a compounded sterile product prepared in a compounding aseptic isolator located in a Segregated Compounding Area (SCA) is 36 hours from the end of the compounding procedure.

What is isolator?

An isolator is an electrical device used to protect an electrical circuit from excessive current, usually by disconnecting it from the source of power. It is typically used to protect sensitive equipment from damage due to overloads, short circuits, and ground faults. Isolators are usually designed to open and close quickly, allowing for quick recovery from a power fault. They are used in a variety of applications, such as in solar energy systems, in power distribution networks, and in many industrial and commercial settings.

This is because the SCA provides an additional layer of safety for the compounded sterile product by providing a clean and protected space for compounding.

To learn more about protected space
https://brainly.com/question/29946043
#SPJ1

Select all of the TRUE statements about files.
Group of answer choices

Resolution refers to the sharpness and clarity of an image.

A higher resolution will always make an image appear better on a screen.

Images that will be printed require a larger resolution than those that will be presented on a computer monitor.

Optimized files will load slowly and take up large storage space.

Images that will be printed should have a resolution of 150 dpi to 300 dpi.

Answers

The true statements about files include the following:

Resolution refers to the sharpness and clarity of an image.A higher resolution will always make an image appear better on a screen.Images that will be printed should have a resolution of 150 dpi to 300 dpi.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture) or on a display monitor.

In Computer technology, resolution is typically expressed as a function of the number of pixels on both the horizontal axis and vertical axis. This ultimately implies that, the resolution of an image (picture) determines its quality and sharpness.

Note: dpi is an abbreviation for dots per inch.

Read more on resolution here: brainly.com/question/28182244

#SPJ1

An object on the computer use to store data, information and settings is known as?​

Answers

Answer:

Hard disk maybe.......

An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24

Answers

Answer:

b. 10.0.0.0/22

Explanation:

Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.

The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.

The two bits from the third octet is used for subnetting to give over 240 subnet mask.

3 alternativas donde puedas utilizar la tecnologia que nos ayude a reducir el impacto ambiental al medio ambiente

Answers

Answer:

El correo, las notas y las agendas ahora están archivados en el mundo digital, ayudando a reducir la deforestación. Coches eléctricos: se está trabajando meticulosamente en reducir la contaminación que producen los vehículos, haciendo que cada vez sean más sostenibles.

Explanation:

Define random error. 1.Random error has values that are consistent with one another. 2.Random error has no probability of being too high or too low. 3.Random error is an error that tends to be either too high or too low. 4.Random error has an equal probability of being too high or too low. 5.Random error has values that are close to the true value.

Answers

Random error is an error that tends to be either too high or too low, with an equal probability of being either. It does not exhibit a consistent pattern and can vary randomly in magnitude and direction.

Among the given options, option 4 - "Random error has an equal probability of being too high or too low" - best defines random error.

Random error refers to the unpredictable fluctuations or variations in measurements or observations. It is inherent to any measurement process and arises due to various factors such as limitations in measurement instruments, human errors, environmental factors, or natural variability. Random errors do not follow a specific pattern and can occur in any direction, resulting in measurements that can be either higher or lower than the true value.

Unlike systematic errors, which exhibit a consistent bias in one direction, random errors tend to cancel each other out over repeated measurements. They have an equal chance of occurring in either direction and can be positive or negative. Through statistical analysis and repeated measurements, the impact of random errors can be minimized and their effects can be statistically characterized.

Therefore, random error is characterized by its tendency to be either too high or too low with an equal probability of occurrence, contributing to the overall uncertainty and variability in measurements.

To learn more about error  Click Here: brainly.com/question/13089857

#SPJ11

describe what is the generative adversarial net and how it works

Answers

A generative adversarial network (GAN) is a type of machine learning model in which two neural networks work together to generate new data.

The GAN consists of a generator and a discriminator network that is used to create artificial data that looks like it came from a real dataset. The generator network is the one that produces the fake data while the discriminator network evaluates it. The two networks play a "cat-and-mouse" game as they try to outsmart one another. The generator takes a random input and creates new examples of data. The discriminator examines the generated data and compares it to the real dataset. It tries to determine whether the generated data is real or fake. The generator uses the feedback it gets from the discriminator to improve the next batch of generated data, while the discriminator also learns from its mistakes and becomes better at distinguishing between real and fake data.

The generator's goal is to create artificial data that is similar to the real data so that the discriminator will be fooled into thinking it is real. On the other hand, the discriminator's goal is to correctly identify whether the data is real or fake. By playing this game, both networks improve their abilities, and the result is a generator that can create realistic artificial data.

Learn more about generative adversarial network (GAN) here: https://brainly.com/question/30072351

#SPJ11

you recently installed additional ram on a linux server to help improve its performance. the primary application uses a great deal of memory and the new ram has helped. however, at application peak usage times, the free utility shows there is plenty of free memory, but the system slows and sometimes hangs. which of the following items should you use to troubleshoot this problem? each correct answer represents a complete solution. choose all that apply.

Answers

The items that you can use to troubleshoot this problem are option A, D and E:

memtest or memtest86+lshw --class memorydmidecode -t memory

What do you mean by troubleshoot?

Finding and fixing problems with complicated devices, electronics, computers, and software systems frequently involves troubleshooting, a methodical approach to problem-solving.

Therefore, In order to fix broken components or procedures on a machine or system, troubleshooting is a type of problem solution. It is a methodical, logical search for the cause of a problem in order to fix it and restore the functionality of the process or product. To find the symptoms, troubleshooting is required.

Learn more about troubleshoot from

https://brainly.com/question/29022893

#SPJ1

See full question below

you recently installed additional ram on a linux server to help improve its performance. the primary application uses a great deal of memory and the new ram has helped. however, at application peak usage times, the free utility shows there is plenty of free memory, but the system slows and sometimes hangs. which of the following items should you use to troubleshoot this problem? each correct answer represents a complete solution. choose all that apply.

memtest or memtest86+

An adapter that is failing

A saturated network segment

lshw --class memory

dmidecode -t memory

what do you different once you have decrypted the packets? what is decrypted and what is happening?

Answers

Once packets have been decrypted, the contents of the packets become visible and understandable. Packets may be encrypted so that they cannot be interpreted by someone who intercepts them while they are being transmitted over a network.

They are decrypted by the intended recipient using a key to unlock the encrypted packets and reveal the original information. This decryption process may be done automatically by software on the recipient's device or may require manual input of the decryption key.

The decrypted packets will reveal the original data that was transmitted over the network. This data may include information such as text, images, audio, video, and any other type of digital content that was transmitted within the packets. The recipient can then use this information for its intended purpose, whether it be reading a message, watching a video, or any other application of the data.

In summary, decrypting packets is the process of reversing encryption to make the data within the packets readable and usable. The decrypted packets reveal the original data that was transmitted over the network, and this information can then be used for its intended purpose.

To know more about decrypted visit:

https://brainly.com/question/31839282

#SPJ11

What were the three alternatives GE had for developing the hardware and software capabilities to become a digital firm

Answers

GE had three alternatives: building internally, partnering with existing companies, or acquiring external companies to develop the hardware and software capabilities required for digital transformation. GE had three alternatives for developing the hardware and software capabilities to become a digital firm:

Build internally: The first alternative was for GE to develop the necessary hardware and software capabilities in-house. This would involve investing in research and development, hiring specialized talent, and building the infrastructure required to support digital transformation. It would give GE complete control over the development process and allow for customization according to their specific needs.

Partner with existing companies: The second alternative was for GE to form partnerships or alliances with existing companies that already had the required hardware and software capabilities. This would involve collaborating with technology providers or acquiring companies with expertise in digital technologies. Partnering with established players would allow GE to leverage their existing capabilities and benefit from their expertise in digital transformation.

Acquire external companies: The third alternative was for GE to acquire external companies that already had the desired hardware and software capabilities. This would involve acquiring technology startups or established companies in the digital space. By acquiring companies with relevant expertise, GE could quickly gain the necessary capabilities and resources to become a digital firm.

In conclusion, Each option presented different advantages and considerations, and GE had to carefully evaluate and choose the most suitable approach based on their specific needs and strategic objectives.

Learn more about digital transformation here:

brainly.com/question/13109423

#SPJ11

How do you calculate the slope for a voltage-current graph?

Answers

Answer:

Choose two points on the line to work from (point C and point D).

Calculate the voltage difference between the two points (the RISE of the slope).

Calculate the current gap between the two points (the RUN of the slope).

Subtract the RISE from the RUN. This is the line's slope.

Explanation:

____ is the order of arrangement of files and folders

Answers

Answer:

Organization is the order of arrangement of files and folders.

Numerical is the definition of that

jermaine is a security administrator for his company. he is developing a defense against attacks based on network-mapping methods. he prevents the internet control message protocol (icmp) from operating to stop attackers from using ping packets to discover the network layout, but he must also guard against operating system fingerprinting since many attacks are tailored to specific operating systems. what must jermaine be concerned about? group of answer choices

Answers

Since Jermaine is a security administrator for his company, The thing that is Jermaine be concerned about is Nmap ("Network Mapper").

What is the purpose of Network Mapper?

An open source tool for network exploration and security audits is called Nmap (short for "Network Mapper"). Although it functions perfectly against a single host, it was created to quickly scan huge networks.

Gordon Lyon developed the network scanner known as Nmap. Nmap sends packets and examines the answers to find hosts and services on a computer network. For probing computer networks, Nmap offers a variety of functionalities, including as host discovery, service detection, and operating system detection.

Note that Nmap ("Network Mapper") ("Network Mapper") is a security scanner for hacking and network research. It enables you to compile a "map" of the network by revealing hosts, ports, and services on a computer network.

Learn more about security administrator from

https://brainly.com/question/29222024
#SPJ1

The span was so long, the height so great, and the enterprise likely to be so costly, that few thought of it as something begun in earnest. . . . But Science said, "It is possible," and Courage said, "It shall be!" . . . . And so this Bridge is a wonder of science.


—Opening Ceremonies of the

New York and Brooklyn Bridge,

Seth Low


Which phrase from the excerpt is a fact that supports the opinion that the bridge is “a wonder of science”?


“the span was so long, the height so great”

“Science said, ‘It is possible’”

“something begun in earnest”

Answers

Answer:

"the span was so long, the height so great"

Explanation:

Just did on Edge 2020 and got it right.

Answer:”the span was so long, the height so great”

Explanation:

[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE

[SPECIAL]>>>WRITE THIS TEXT IN BINARY CODE

Answers

Answer:

in binary

01000110 01010010 01000101 01000101 00100000 01010000 01001111 01001001 01001110 01010100 01010011

THX:

01010100 01001000 01000001 01001110 01001011 00100000 01011001 01001111 01010101

Answer:

01000110 01010010 01000101 01000101 00100000 01010000 01001111 01001001 01001110 01010100 01010011

i need help with computer science
im on Write Password Evaluator

Answers

Answer: Password Evaluator is designed to examine passwords and tentative passwords to look for dictionary words and patterns that a password cracking tool might exploit. It looks for reversed, rotated, keyboard shifted, truncated, dropped letters, substituted characters and other variations on dictionary words both singly and in many combinations.

Explanation:

when a consumer wants to compare the price of one product with another, money is functioning as select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a a store of value. b a unit of account. c a medium of exchange. d all of the above.

Answers

Money serves largely as an account unit when a customer wishes to compare the costs of different goods. If money enables you to put off purchases until you actually want the items, it serves as a store of value.

What is a unit of account?

One of the money functions in economics is the unit of account. One common way to assess the market worth of products, services, and other transactions is with units of account.

A unit of account, which is also referred to as a "measure" or "standard" of comparative worth and deferred payment, is a requirement before any business transactions involving debt may be created.

Money serves as a common unit of measurement and exchange.

Thus, it serves as a foundation for price quotation and haggling. It is required for the creation of effective accounting systems.

Economics' unit of account enables a semi-meaningful interpretation of expenses, profits, and prices so that a company can evaluate its own performance. It enables investors to understand.

Hence, Money serves largely as an account unit when a customer wishes to compare the costs of different goods.

learn more about  a unit of account click here:

https://brainly.com/question/12730352

#SPJ4

In distributed systems, applications processing is distributed across multiple computing devices.
true or false

Answers

In distributed systems, application processing is distributed across multiple computing devices. This statement is true. In distributed computing, the processing of applications is shared among different devices or systems, allowing them to work together and efficiently utilize their resources. This improves the performance, reliability, and fault tolerance of the applications.

In a distributed system, an application is broken down into smaller parts, called tasks, and these tasks are executed on multiple computing devices that are connected through a network. Each computing device in the system is responsible for performing a portion of the overall processing required by the application. The results of these individual tasks are then combined to generate the final output of the application.

Distributed systems offer several advantages over centralized systems. First, they can provide greater scalability, as additional computing devices can be added to the system as demand increases. Second, they can offer improved reliability, as the failure of one device in the system does not necessarily cause the entire system to fail. Third, they can offer better fault tolerance, as redundant computing devices can be used to ensure that the system can continue to operate even if one or more devices fail.

Learn more about computing devices here:

https://brainly.com/question/30529533

#SPJ11

why is it necessary to have usernames and passwords if one is working on a network?​

Answers

Answer:

So nobody finds and uses your personal information

How can you tell an open innovation project from one that is not?

Answers

An open innovation project is one in which a company seeks external ideas, knowledge, and expertise from outside the organization to advance its goals, rather than relying solely on internal resources. Conversely, a project that is not open innovation relies primarily on internal resources and expertise.

Here are some characteristics of an open innovation project:

Collaboration: Open innovation projects involve collaboration between internal teams and external partners such as customers, suppliers, academic institutions, startups, and other companies.

Sharing of knowledge: An open innovation project requires sharing of knowledge, information, and expertise between the internal and external parties.

Involvement of external parties: In an open innovation project, external parties are actively involved in the innovation process, from ideation to commercialization.

Innovation ecosystem: An open innovation project is part of a larger innovation ecosystem that fosters the exchange of ideas, knowledge, and expertise.

Access to resources: An open innovation project provides access to external resources such as funding, facilities, equipment, and talent.

In contrast, a project that is not open innovation is typically driven by internal resources and expertise. Internal teams are responsible for all aspects of the innovation process, and external parties are not involved in any significant way.

In summary, an open innovation project involves collaboration, sharing of knowledge, involvement of external parties, an innovation ecosystem, and access to external resources.

(Will give Brainliest.) Very important. Summarize the entire episode of "Escape from Cluster Prime" from the Nickelodeon TV show: "My Life as a Teenage Robot.". Must be at least 4 sentences or more.

Answers

A summary of the episode should explain that the queen of a certain robot community invited a robot named Jenny to her part of the world. While Jenny was happy to be there, this queen had an ulterior motive.

What is a summary of the episode?

The episode tells of a queen named Vexus who invited Jenny, a robot to her part of the world known as Cluster Prime. Jenny was very happy to be there but unknown to her, the wicked queen wanted to use her to strengthen a bad weapon.

When Jenny learned of this, she fought the Queen off and successfully retired to her homeland. So, Jenny won the battle against evil.

Learn more about robots here:

https://brainly.com/question/13515748

#SPJ1

You have two Windows Server 2016 computers with the Hyper-V role installed. Both computers have two hard drives, one for the system volume and the other for data. One server, HyperVTest, is going to be used mainly for testing and what-if scenarios, and its data drive is 250 GB. You estimate that you might have 8 or 10 VMs configured on HyperVTest with two or three running at the same time. Each test VM has disk requirements ranging from about 30 GB to 50 GB. The other server, HyperVApp, runs in the data center with production VMs installed. Its data drive is 500 GB. You expect two VMs to run on HyperVApp, each needing about 150 GB to 200 GB of disk space. Both are expected to run fairly disk-intensive applications. Given this environment, describe how you would configure the virtual disks for the VMs on both servers.

Answers

The virtual disk configuration for the VMs on both servers in this environment is shown below.

In the Hyper V Test,

Since there will be two or three virtual machines running at once, each of which needs between 30 and 50 GB of the total 250 GB of disk space available,

What is virtual disks?

Setting up 5 virtual disks, each 50 GB in size.

2 VMs each have a 50 GB virtual drive assigned to them.

The above setup was chosen because running three VMs with various virtual disks assigned to them will not pose an issue when two or three VMs are running concurrently and sharing the same virtual disk. This is because the applications are disk-intensive.

To learn more about virtual disks refer to:

https://brainly.com/question/28851994

#SPJ1

Given this environment, the virtual disk configuration for the VMs on both servers is shown below. Because two or three VMs will be running at the same time, and each VM has disk requirements ranging from 30 to 50 GB of total disk space of 250 GB.

What is Hyper V Test?While there are several methods for testing new virtual machine updates, Hyper-V allows desktop administrators to add multiple virtual machines to a single desktop and run tests. The Hyper-V virtualization technology is included in many versions of Windows 10. Hyper-V allows virtualized computer systems to run on top of a physical host. These virtualized systems can be used and managed in the same way that physical computer systems can, despite the fact that they exist in a virtualized and isolated environment. To monitor the utilization of a processor, memory, interface, physical disk, and other hardware, use Performance Monitor (perfmon) on a Hyper-V host and the appropriate counters. On Windows systems, the perfmon utility is widely used for performance troubleshooting.

Therefore,

Configuration:

Creating 5 Virtual disks of 50 GB each.

1 virtual disk of 50 GB is assigned to 2 VM.

The above configuration is because since two or three VM will be running at the same time and using the same virtual disk will cause a problem since the applications are disk intensive, running three VMs with different virtual disks assigned to them, will not cause a problem.

For Hyper V App,

Two VM will run at the same time, and the disk requirement is 150 - 200 GB of 500 GB total disk space.

Configuration:

Creating 2 virtual disks of 200 GB each with dynamic Extension and assigning each one to a single VM will do the trick.

Since only two VMs are run here, the disk space can be separated.

To learn more about Hyper V Test, refer to:

https://brainly.com/question/14005847

#SPJ1

2. What is one advantage of using a wireless network over a wired network?
You don't need to route wires to every physical location that needs a connection
Wireless networks are faster
O Wireless networks are more secure
O All of these are advantages of wireless networks

Answers

Answer:


A: You don't need to route wires to every physical location that needs a connection.

Answer they are more secure

Explanation:

You begin the installation process and discover that you need to load additional drivers to support your storage controller so that Windows can write to that disc. What should you do?
Allow Windows to find the necessary drivers.
Insert or connect to the installation media and boot from that media.
Remove all drivers and restart.
Load the necessary drivers from a USB drive.

Answers

To support the storage controller, you need to allow Windows to find the necessary drivers. Option A

How to load additional drivers

If you need to load additional drivers to support your storage controller during the installation process, you should load the necessary drivers from a USB drive.

This is done by following the instructions provided by the manufacturer of the storage controller, which typically involves downloading the driver files from their website, copying them onto a USB drive, and then selecting the option to load drivers during the installation process.

Allowing Windows to find the necessary drivers may not always be possible, and removing all drivers and restarting is not a recommended solution.

Booting from installation media is also a valid option, but may not always be necessary.

Read more about additional drivers at: https://brainly.com/question/30034916

#SPJ1

data is transmitted in plain text. this is a: group of answer choices brute force attack session hijacking dictionary attack cryptographic failure

Answers

The data that is transmitted in plain text is option D: cryptographic failure.

An established plain text only assault is what?

The known-plaintext attack (KPA) is a cryptanalysis assault type where the attacker has access to both the encrypted and plaintext versions of the data (also known as a crib) (ciphertext). These can be used to reveal additional hidden information, including code books and secret keys.

Therefore, Plaintext in the context of cryptography typically refers to unencrypted data that is being prepared for input into cryptographic techniques, typically encryption algorithms. Typically, unencrypted data transmission or storage falls under this category.

Learn more about data transmission from

https://brainly.com/question/10564419
#SPJ1

Python: Given two variables, already defined, best value and second best value, write a statement that swaps their associated values.

Answers

Answer:

mark me as brainliest please. see code below.

Explanation:

bestValue = 5

secondBestValue = 1

bestValue,secondBestValue = secondBestValue,bestValue

Edhesive 2.2 code practice

questions 1 and 2

Python

Answers

Answer:

1)

a = float(input("Enter an integer: "))

print(a + 1)

print (a + 2)

print (a + 3)

2)

a = float(input("Enter a decimal: "))

b = float(input("Enter another decimal: "))

c = float(input("Enter a third decimal: "))

print("sum: " + str(a + b + c))

Answer:

2.2 question 1

x = int(input("Enter an integer: "))

print(x + 1)

print(x + 2)

print(x + 3)

2.2 question 2

a = float(input("Enter number here: "))

b = float(input("Enter number here: "))

c = float(input("Enter number here: "))

print(a + b + c)

Explanation:

There you go let me know if it didnt work

after clicking on a link on a website a box pops up

Answers

Answer:

22sdsn:

2flaladds2222ded

Answer:

it show this 22sdsn:

2flaladds2222ded for me as well thank you may you mark me brainlyest pls

Explanation:

Other Questions
Who was the last President of the Republic of Texas? 6=1/12v solve each equation. Check your solution Which one of the following conditions does not tend to heat up price competition? a. Prices and terms of sales are observable. b. The industry is stagnant or declining. c. Some firms have excess capacity. d. There are many sellers in the market. Consider a value added tax with invoice method. This year, value added in each step of production, wheat-flour-bread, are 150-200-180 respectively. Government introduced VAT exemption for flour producers. What is the change of VAT revenue after introduction of this exemption? Hailey's research firm was hired by a discount superstore to provide a detailed evaluation regarding consumer preferences. Hailey's analysis involves the study of ________.a. economicsb. macroeconomicsc. private enterprise systemd. microeconomics Your friend is trying out your new password generator program. She wants to know how it works. How would you explain it to her? Keep in mind that she does not know Python code. Make sure to use good communication techniques. k12 If thrice a number is subtracted from 100,the difference is 67.Find the number. 7/9+x=-5/9Can anyone help??? Why were Brutus and other Anti-Federalists concerned about the Constitution? A The United States was too small to have a strong federal government. B The government was set up to favor larger states over smaller states C The government could raise armies during peace and limit people's rights D The government would be too agreeable and get things done without proper debate GRE scoros expire after 5 years. A student who had previously taken the GRE a long time ago is retaking the GFE in order to opply for graduate school. The student wishes to compare their old GRE score to their new GRE sccre buA the scoring rules have changed. Old GRE score: 1310(=1200,=200), New GRE score: 350((=300,=15) What are the percentile ranks for the calculated z-scores of the Old and New GRE scores? OId GRE percentil rank: 70.88% Oid GRE percentle rank as. 31% New GRE percentile rank 97.72% New GRE percentide fank: 99% QUESTION 17 GAE soores expire after 5 Years. A student who had peeviousy taken the GRE a long time ago is rotaking the GAE in order to apply for graduate schoot. Tho student washes to compare their old GRE score to their new GAE score but the scoring rules have changed. Oid GRE score. 1310(=1200,0=200), New GRE score: 350(j=300,0=15) On which test did the student pertom better? The student pertormed better on the old GRE because their percentile rank is lower than the new GRE The student performed better on the new GRE because their percentlie rank is lower than the old GRE. The student performed the same The student performed better on the new GRd because they scored in a highor percontie rank than on the old GRE. QUESTION 18 Can z-scoren be ined to compare scoes that were scored on diferent scalesksferent insts of measurement? Yes. because Z-scores help standarsze the normal curve, which allows us to compare deevent inits of measurement Z-scores place al of trese dreerent measurements on the same tcale. Yes, because z-scores whow us to look at the taw data whout needing to standardue it. No, becaine 2 scores camst sandardize the normal curve and thus not whow ve to compare dfferent unas of meassurenent. No, thcause z. 4cores only aforr us to compare a score aganst the miean at that dataset. To honor your instructor in ECON 310, you have decided at graduation to endow a professorship in engineering economics. If accounts at the UM Foundation earn 4% interest, you must make a lump-sum gift of $__________ to generate an annual income of $250,000 for your favorite professor forever. Use the following words to compose complete sentences. make sure that everything agrees and dont forget to conjugate the verbs11. Nous / manger / dans / restaurant / italien / petit 12. Une chambre / grand / avec / une vue / beau / cest / montagnard 13. Elle / acheter / une jupe / long / noir I need help with these two fraction questions :( If f(x) =- x2 + x what is the value of f(4) ? Franklin Delano Roosevelt defeated President Hoover in .FDR believed that the government in the economy.During the campaign, FDR promised to to help Americans recover from the Depression. should a restaurant that wants to sell 3000 groupons with a face vale of $75 a $35 each use this tool if groupon charges half of the sales price (keeps half of the $35)? a. yes b. no SHow could you show QR SR?O A. OB. O C. OD. Use SAS to show triangle PRQ is congruent to triangle SRPUse SAS to show triangle PRQ is congruent to triangle PRSUse AAS to show triangle PRQ is congruent to triangle PRSUse ASA to show triangle PRQ is congruent to triangle PRS cuales son las caracteristicas del discurso NEED HELP ! A number line is shownwhat fractions are shown on the number line interdicting smuggling networks to cut flow of precursors falls under which diplomatic, informational, military and economic (dime) activity?