Answers

Answer 1

Answer:

??

Explanation:

? m


Related Questions

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

hii can u pls answer this?

hii can u pls answer this?

Answers

Answer:

Applying fertilizers in the proper amount, at the right time of year, and with the right method can significantly reduce how much fertilizer reaches water bodies. Keeping animals and their waste out of streams keeps nitrogen and phosphorus out of the water and protects stream banks.

hopes this helps even tho its kinda late.

In a three-tier architecture, the component that acts as the interface between the user and the application is the:

Answers

The component that acts as the interface between the user and the application in a three-tier architecture is the Presentation tier, also known as the User Interface (UI) tier.

This tier is responsible for presenting information to the user and accepting user input, which is then passed to the middle tier or application logic tier for processing. The presentation tier typically consists of a web server, a client-side application, or a desktop application that communicates with the middle tier using a protocol such as HTTP, TCP/IP, or RPC. It is responsible for providing a user-friendly interface to interact with the application and display the data in a format that is easy to understand. Examples of technologies used in the presentation tier include HTML, CSS, JavaScript, Java Swing, Windows Forms, and WPF.

Learn more about three-tier architecture here:

https://brainly.com/question/13090960

#SPJ11

Which of the following demonstrates an information system? Tyra is using the computer to create a birthday card for her friend. Ahmad is installing new software to improve the ease of accessing the database. Shania is creating a printed handbook of company policies for new employees. Ian is making updates to the company website to include the latest product information

Answers

Answer:

B. Ahmad is installing new software to improve the ease of accessing the database.

C. Shania is creating a printed handbook of company policies for new employees.

D. Ian is making updates to the company website to include the latest product information

Explanation:

Information Systems is an organized way of assembling, processing, storing, and sharing information. It is used by organizations to run their businesses. A typical information system will feature the people who run or control the process, the tasks they are meant to perform, the procedures which govern the work done, and the technology used to achieve those goals. Information systems incorporate information technology into the running of the business. The examples cited above, illustrate the application of information systems in business affairs. For example,

1. When Ahmad installs new software to improve the ease of accessing the database, the main components of an information system which includes; people (Ahmad), the task (which entails installation of the software), the procedures (that govern software installation), and the technology (apparently a computer system), all have a role to play.

Why is it never a good idea to touch the lens or the LCD on your camera?
A. because the heat from your fingers will melt the LCD screen
B. because the oils from your skin can cause permanent smudging
C. because your finger will get in the way of your shot
D. because your fingernails will scratch the lens

Answers

Answer:

D. because your fingernails will scrach the lens

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

Take one action in the next two days to build your network. You can join a club, talk to new people, or serve someone. Write about this action and submit this as your work for the lesson. icon Assignment

Answers

Making connections is crucial since it increases your versatility.You have a support system of people you can turn to when things get tough so they can help you find solutions or in any other way.

What are the advantages of joining a new club?

Support Network - Joining a club or organization can help you develop a support network in addition to helping you make new acquaintances and meet people.Your teammates and friends will be there for you not only during practice but also amid personal difficulties. Working collaboratively inside a group, between groups, between communities, or between villages is known as network building.One method of creating a network is by forming a group. Attending events and conferences and developing connections with other attendees and industry speakers is one of the finest methods to build a strong network.In fact, the framework of many networking events and conferences encourages networking and connection opportunities. Personal networking is the process of establishing connections with organizations or individuals that share our interests.Relationship growth often takes place at one of the three levels listed below:Networks for professionals.Neighborhood networks.Personal networks. Reaching out is part of an active communication process that will help you learn more about the other person's interests, needs, viewpoints, and contacts.It is a life skill that needs to be actively handled in order to preserve or, more importantly, to advance a prosperous profession. various network types.PAN (personal area network), LAN (local area network), MAN (metropolitan area network), and WAN (wide area network) are the different types of networks.

To learn more about network refer

https://brainly.com/question/28041042

#SPJ1    

Task 2
Cacer
List your top 10 songs of all time in a text document and create a program that reads the entire text file and
displays it to the screen.
I

Answers

The program is an illustration of file manipulations

What are file manipulations?

File manipulations are program statements that are used to write & append to file, and also read from the file

The actual program in Python

Assume the file name is top10.txt, the program in Python where comments are used to explain each line is as follows:

#This opens the file

a_file = open("top10.txt")

#This reads the file contents

file_contents = a_file.read()

#This prints the contents

print(file_contents)

Read more about file manipulations at:

https://brainly.com/question/15683939

Which type of data is is usually collected as numerical data that can be presented in a graph or chart?

Answers

Answer:

Quantitative data

Explanation:

Quantitative data is information about quantities; that is, information that can be measured and written down with numbers. Some other aspects to consider about quantitative data: Focuses on numbers. Can be displayed through graphs, charts, tables, and maps.

For this assignment, you will create a calendar program that allows the user
to enter a day, month, and year in three separate variables as shown below.
Day:
Month:
Year:
Then, your program should ask the user to select from a menu of choices
using this formatting
Menu:
1) Calculate the number of days in the given month.
2) calculate the number of days left in the given year.

I would really appreciate it if someone could help me on this.

For this assignment, you will create a calendar program that allows the userto enter a day, month, and

Answers

Following are the program to the given question:

Program Explanation:

Defining three methods "leap_year, number_of_days, and days_left " is declared. In the "leap_year" method, it accepts the year variable, which calculates the year is the leap year and returns its value that is 1. In the next method "number_of_days", it is define which accepts the "year and month" variable in the parameter and calculate and returns its value. In the last "days_left" method, it calculates the left days and returns its value, and outside the method, two dictionary variable days_31 and days_30 is declared.  It initilized a value by using 3 input variable "day, month, and year" variable which accepts user-input value. In the next step, a "c" variable is declared, that input values and calls and print its value accordingly.

Program:

def leap_year(y):#defining a method leap_year that takes one parameter

   l= 0#defining l variable that holds an integer

   if y % 4 == 0:#using if block that check year value module by 4 equal to 0

       l = 1#holding value in l variable

   if y % 100 == 0:#using if block that check year value module by 100 equal to 0

       l = 0#holding value in l variable

       if y % 400 == 0:#using if block that check year value module by 400 equal to 0

           l= 1#holding value in l variable

   return l#return l value

def number_of_days(m, y):#defining a method number_of_days that takes two parameters

   months = {1: 31, 3: 31, 4: 30, 5: 31, 6: 30, 7: 31, 8: 31, 9: 30, 10: 31, 11: 30, 12: 31}#defining months variable that hold value in ictionary

   l = leap_year(y)#defining l variable that calls leap_year method and holds its value

   if l == 1 and m == 2:#use if that check l value equal to 1 and 2

       return 29#return value 29

   if m == 2:#use if that check month value equal to 2

       return 28#return value 29

   return months[m]#return months value

def days_left(d, m, y):#defining a method days_left that takes three variable in parameter

   l = leap_year(y)#defining l variable that hold leap_year method value

   days = 0#defining days variable that hold integer value

   months = {1: 31, 3: 31, 4: 30, 5: 31, 6: 30, 7: 31, 8: 31, 9: 30, 10: 31, 11: 30, 12: 31}#defining months variable that hold value in ictionary

   if l== 1:#using if that check l equal to 1

       if m > 2:#defining if that check m value greater than 2

           days += (29 + 31)#using days variable that Calculate holds its value

           i = m#defining i variable that holds months value

           while i > 2:#defining while loop that checks other days

               days += months[i]#defining a days variable that holds months value

               i -= 1#decreasing i value

           days -= (months[m] - d)#defining days that subtracts leap value

       elif m == 2:#defining elif block that checks m equal to 2

           days += (29 - d) + 31#holding value in days variable

       else:#defining else block

           days = 31 - d#Calculating days value

       return 366 - days#using return keyword that Calculates days value

   else:#defining else block

       if m > 2:#using if that checks m value greater than 2

           days += (28 + 31)#Calculating and store value in days

           i = m#holding months value in i

           while i > 2:#defining while loop that checks i value greater than 2

               days += months[i]#holding list value in days

               i -= 1#decreasing i value

           days -= (months[m] - d)#defining days that subtracts leap value

       elif m == 2:#using elif block that checks m value equal to 2

           days += (28 - d) + 31#Calculating and store value in days

       else:#defining else block

           days = 31 - d##Calculating and store value in days

       return 365 - days#return total days

print("Please enter a date")#print message

day = int(input("Day: "))#input value

month = int(input("Month: "))#input value

year = int(input("Year: "))#input value

print("Menu: ")#print message

print("1) Calculate the number of days in the given month.")#print message

print("2) Calculate the number of days left in the given year.")#print message

c = int(input())#input value

if c == 1:#using if that checks c value equal to 1

   print(number_of_days(month, year))#calling method and print its return value

elif c == 2:#using if that checks c value equal to 2

   print(days_left(day, month, year))#calling method and print its return value

Output:

Please find the attached file.

Learn more:

brainly.com/question/16728668

write the inverse function day_num which is given a day name, and returns its number. Once again, if this function is given an invalid argumen, it should return none.

Answers

You ought should be able to identify full functions by looking at them at this point. You may have also written a few simple functions if you have been practicing the exercises.

You might experience additional trouble as your routines grow in size, particularly with runtime and semantic issues. We are going to recommend an approach called incremental development to deal with ever-more complex programs. By adding and testing only a little amount of code at a time, incremental development aims to minimize lengthy debugging sessions. As an illustration, let's say we wish to determine the distance between

The pseudo-code for this is as follows:

string GetDayNameFromDayNumber(int dayNum)

{string dayName;

if (dayNum == 0)

dayName = "Sunday"

else if (dayNum == 1)

dayName = "Monday"

etc

etc

etc

return dayName;

}

Learn more about program here-

https://brainly.com/question/14618533

#SPJ4

What do you mean by real time system? Why real time system needs to response within limited time?

Justify your answer with example.
plz ans quick

Answers

Real time system means that the system is subjected to real time, i.e., response should be guaranteed within a specified timing constraint or system should meet the specified deadline. For example: flight control system, real time monitors etc.

Explain the function of cpu what are work done by cu ,alu,and mu

Answers

Answer:

The CPU processes instructions it receives in the process of decoding data.

An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. Modern CPUs contain very powerful and complex ALUs. In addition to ALUs, modern CPUs contain a control unit (CU). While the memory unit (MU), is the primary memory for holding data. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.

Hope this helps! :)

6.3.6: Create your own Encoding on codehs be confusing.

6.3.6: Create your own Encoding on codehs be confusing.
6.3.6: Create your own Encoding on codehs be confusing.

Answers

A general example of an encoding scheme that contains A-Z and space is given below.

How to illustrate the information

In this example, we can assign the following binary codes to each character:

A: 00

B: 01

C: 10

...

Z: 10101

Space: 10110

Using this encoding scheme, the phrase "HELLO WORLD" would be represented as:

00010101100101100110000010101011001010000001101

As you can see, this encoding scheme requires a varying number of bits to represent each character, with shorter codes assigned to more commonly used letters and longer codes assigned to less commonly used letters. This can help to minimize the total number of bits required to encode a message.

Learn more about encoding on

https://brainly.com/question/3926211

#SPJ1

find one or two other students in the class that you have met over the semester

Answers

However, to find one or two other students in the class that you have met over the semester, you can do the following: Ask your classmates - You can ask your classmates for their names and contact information, so that you can keep in touch with them.

If there is someone that you already know, you can approach them and ask them if they know someone who would be interested in staying in touch.Create a study group - If you find that you are having a hard time studying alone, then you might want to create a study group with other students in your class. This will help you get to know them better, and you can also exchange contact information.

You can also participate in extracurricular activities - You can participate in extracurricular activities such as sports, music, or drama. This will give you an opportunity to meet other students who share similar interests as you.

Read more about extracurricular here;https://brainly.com/question/8158492

#SPJ11

size = input("Enter your shoe size: ") size = int(size) if size > 12: print(str(size) + " is too high.") elif size < 6: print(str(size) + " is too low.") else: print(str(size) + " is in stock.") What is the output from running the above code if the user enters ten?

Answers

Answer:

It will print that the shoe size is in stock when the user prints 10, too high when the user enters 12, and anything less than 6 would be too low. It's a python program describing how basic input data is interpreted.

How has technology changed in 5 years? 2015 to 2020.

Answers

Answer:

From 2015 to 2020 technology has changed A LOT. Back then, we still had smartphones, but they aren't as advanced now. Smartphones now have artificial intelligience and lots of new social networking apps. And now, we get alerts if an earthquake happens or if something happens that affects the country.

Explanation:

In combination, the powerful tools that systems analysts use to provide a framework for rapid, efficient software development, is called a ____ environment.

Answers

Answer:

4GL is the answer

hope this is what ur looking for...

what do other people think of e.t
in the movie E.T

Answers

Answer:

I think E.T is funny

Explanation:

The program that translate the URL into an IP address is called the _____ ?
A:Domain Name System
B:Resource Locater
C:Web Browser
D:Web Server

Answers

Answer:

The Correct answer is  option A: Domain Name System

Explanation:

Let look at each option;

Domain Name System:

We we type an address for example brainly website  it goes to DNS server and find the IP address of the computer where brainly website  is located. Then the request goes to the IP address. This is the mechanism of DNS.

Resource Locator:

Resource Locator is the URL For example brainly website

Web Browser:  

Web browser is a software which is used for internet browsing for example Firefox

Web Server:  

Web Server is a computer which give services to clients.

Answer: domain name system

Explanation: very nice exam

Computer 1 on network a, with ip address of 10. 1. 1. 8, wants to send a packet to computer 2, with ip address of 172. 16. 1. 64. If the ttl value was set to 64 at the beginning, what is the value of the ttl once it reaches its destination?.

Answers

Computer 1 on network a, with IP address of 10. 1. 1. 8, wants to send a packet to computer 2, with IP address of 172. 16. 1. 64. If the ttl value was set to 64 at the beginning. The value of the TTL once it reaches its destination is 65.

What is IP address?

IP address is defined as a special string of characters used to identify each computer communicating across a network utilizing the Internet Protocol.

1. Start by removing the plastic jacket from the cable's end, roughly 2 inches long. At this point, exercise extreme caution to avoid damaging the internal wiring. If you do, your cable's qualities can change, or worse, it might become worthless. One more time, look for nicks or cuts in the wires. Whack the entire end off if there are any. Thus, the TTL's value will be 62 + 3 = 65 after it reaches its destination.  

Thus, computer 1 on network a, with IP address of 10. 1. 1. 8, wants to send a packet to computer 2, with IP address of 172. 16. 1. 64. If the ttl value was set to 64 at the beginning. The value of the TTL once it reaches its destination is 65.

To learn more about IP address, refer to the link below:

https://brainly.com/question/16011753

#SPJ1

08. Consider the following four binary numbers.
11100111
10101010
11110000
11001100
Which of the following displays the numbers in ascending order?
(A) 10101010, 11001100, 11100111, 11110000
(B) 11110000, 11100111, 11001100, 10101010
(C) 11100111, 10101010, 11110000, 11001100
(D) 10101010, 11001100, 11110000, 11100111

Answers

Answer: A
Explanation: If you convert the binary into decimal
you can easily determine the order from least to
greatest. In this instance of "a," we have 170, 204,
231, 240.

What kind of information will likely not appear on a website such as the Occupational Outlook Handbook?

Answers

The Occupational Outlook Handbook (OOH) is a reliable source of career information that provides data on various aspects of different occupations. However, there are certain types of information that you might not find on such a website.

Firstly, the OOH focuses primarily on providing broad overviews of careers, their requirements, and job outlooks. It does not list specific job openings or provide direct connections to employers. For job listings and personalized searches, job portals and company websites would be more appropriate resources.

Secondly, the OOH does not offer detailed, step-by-step guidance on how to pursue a particular career. While it provides general information about the education, training, and qualifications required for a specific occupation, it does not delve into intricate details, such as which college courses to take or how to create a successful job application.

Moreover, the OOH might not cover every single occupation or niche fields, as it focuses on providing information about popular and widely recognized careers. If you are seeking information about a unique or uncommon occupation, you might need to explore other resources, such as industry-specific publications or professional associations' websites.

Lastly, the OOH is mainly concerned with providing objective, factual information about various occupations. It does not offer subjective opinions or personal anecdotes from individuals who work in these fields. For personal erspectives and experiences, online forums and networking sites may offer additional insights.

Learn more about Outlook here:

https://brainly.com/question/13040097

#SPJ11

what is the answer to the image​

what is the answer to the image

Answers

your answer is

b

you’re welcome


Give three code examples of how to increment the integer j by 1.

Answers

Answer:

(This is for Javascript)

j++;

j + = 1;

j = j + 1;

"
Assume you are creating a database. Four entities are
identified: buyer, seller, agent, and house. Suppose each buyer can
make an appointment with a seller to see a house at a certain
time

Answers

In the database, four entities are identified: buyer, seller, agent, and house. The system allows buyers to schedule appointments with sellers to view houses at specific times.

To create a database for managing interactions between buyers, sellers, agents, and houses, we can design a system that facilitates the scheduling of appointments for house viewings. The entities in the database include the buyer, seller, agent, and house, each with their respective attributes and relationships.

The buyer entity would have information such as name, contact details, and preferences for the type of house they are interested in. The seller entity would contain details about the property being sold, including its address, price, and any additional information. The agent entity would represent the intermediary facilitating the transactions, with attributes like their name, contact information, and agency affiliation.

The house entity would store information specific to each property, such as its address, size, number of bedrooms, and any other relevant details. Additionally, the house entity would include a field to indicate its availability for viewings.

To enable buyers to schedule appointments with sellers, the database could have a relationship between the buyer and seller entities, allowing the buyer to request a viewing for a particular house. This relationship could include attributes like the requested time and date for the viewing.

With this structure in place, the database could provide functionality for buyers to browse available houses, select a property of interest, and request an appointment at a convenient time. The system would then manage the scheduling process, ensuring that there are no conflicts in appointment times for a given house and notifying the relevant parties about the confirmed viewing arrangements.

Overall, the database would support the coordination of appointments between buyers and sellers, streamlining the process of house viewings and facilitating efficient communication between the involved entities.

Learn more about database here:

https://brainly.com/question/31214850

#SPJ11

where is the title of an assignment located in a paper using mla format?

Answers

In MLA format, the title of an assignment is usually located on a separate title page, which includes the title of the paper, the student's name, the course name, and the date of submission.

Alternatively, if a separate title page is not used, the title of the assignment can be centered on the first page of the paper, about one-third of the way down from the top margin. It should be written in title case (capitalize the first letter of each major word) and should not be underlined, italicized, or placed in quotation marks.

In a paper using MLA format, the title of an assignment is typically located below the header information, which includes your name, your instructor's name, the course, and the date. The title should be centered, written in title case, and not underlined, italicized, or bolded.

To know more about MLA format visit:-

https://brainly.com/question/30403072

#SPJ11

what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage

Answers

Answer:

could have used a browser  but ok

Explanation:

The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.

What is the name of the item that supplies the exact or near exact voltage at the required wattage to all of the circuitry inside your computer?

Answers

Answer:

It's the power supply

Explanation:

The power supply is what essentially enables the computer to operate. It is able to do that by converting the incoming alternating current (AC) to direct current (DC) at the correct wattage rating that is required by the computer to function. The power supply is a metal box that is generally placed in the corner of the case.

How to resolve' command phasescriptexecution failed with a nonzero exit code

Answers

To resolve the 'command phase script execution failed with a nonzero exit code' error, you can check your project settings, make sure your code is properly configured, or update any dependencies that may be causing the error.

The 'command phase script execution failed with a nonzero exit code' error is a common issue that can occur when running code on a computer or server. It often indicates that there is a problem with the project settings or that the code is not properly configured to run.

To resolve the error, you can check your project settings and ensure that everything is configured correctly. You can also review your code and make sure that it is free of errors or issues. If the error persists, you may need to update any dependencies or packages that are causing the problem. By taking these steps, you can resolve the 'command phase script execution failed with a nonzero exit code' error and get your project back on track.

You can learn more about coding errors at

https://brainly.com/question/28583871

#SPJ4

Other Questions
PLEASE HELP ASAP AND CORRECT WILL GET BRAINLIESTRead the scenario below and answer the question that follows.Shane is someone to watch out for when he gets angry. He has been known to throw things, and he even hit someone once. He always regrets what he said and did while he was angry, but that only lasts until the next time that he is angry. Researchers would say that Shane's anger is ___________.A.adaptiveB.maladaptiveC.in controlD.normalPlease select the best answer from the choices providedABCD Which of the following statements is TRUE regarding reliability in hypothesis testing: a. we choose beta because it is easier to control than alpha b. we choose beta because it is more reliable than alpha c. we choose alpha because it is more reliable than beta d. we choose alpha because it is easier to control than beta calculate all applicable documentary stamp taxes and intangible taxes for a property located in citrus county: purchase price $67,550 earnest money $ 4,000 recorded first mortgage (assumed) $27,800 second mortgage (new) $14,700 cash at closing $21,050 How did women use their positions in the workforce to demand rights? Check all that apply.They joined unions.They changed the rules where they worked.They got separate restrooms from men.They formed womens suffrage organizations.They won property rights. ILL GIVE BRAINLY!!Blogs differ from most other online text sources because theyfocus on news and information.allow readers to interact with each other.are usually updated every day.can be updated with new information. 50 Points! Multiple choice geometry question. Photo attached. Thank you! PLEASE HELPPPP 10 points for its!!!!!!!!!! when prescribing a medication to an older patient, whether a controlled substance or other class of medication, it is important to: 2.4 liters of tea were equally distributed to 40 mugs. How many milliliters of tea were in each mug? Who supported the strictest plan for the South to rejoin the United States during Reconstruction?1. Radical Republicans2. President Lincoln3. Southern Democrats4. President Johnson In addition to when the ignition is first turned on, when will the rear seat belt reminder light illuminate in the vehicle information display in 2022 kicks?. in which quadrant is the point (4,-2 located Write an algebraicexpression for 9less than the quo-tient of 6 and a num-ber x. What are some of the main reasons that immigrants left Europe and Russia for the United States in the late nineteenth and early twentieth centuries? which of the following is false? which of the following is false? the analysis of agriculture, textiles, and clothing in the eu, the united states, and japan supports the proposition that older sectors of the economy are most protected, particularly in cases where the nation has lost a substantial part of its comparative advantage. trade barriers in high-income countries do not cause unintended consequences in low-income countries because most of their trade is with other industrialized countries. even when tariffs are relatively low, the cost per job saved tends to be high. commercial policy is grossly inefficient at achieving the objective of job preservation. Re write the statement 19+7 divided by 2-5 by including one pair of brackets to make the total equal to 8 Which of the following can help to avoid problems with reused encryption keys? Select all that apply.Group of answer choicesd) Combine the key with a noncec) Change the internal keyb) Clear your computer's RAMa) Use the same passphrase Sample response: according to swift, poverty in ireland is such a serious problem that anyone who could provide a good solution would be considered a hero. what did you include in your response? check all that apply. the main ideas in the passage a restatement of the main ideas in my own words an objective tone Far too frequently we engage in which of the following without becoming involved in the conversation (WORTH 25 POINTS and il give brainliest to the first person to answer) Miguel is building a doghouse he cuts one sheet of wood to make the front wall he also cuts out a door that is 2 ft by 2 ft the dimensions in feet are shown in the diagram. miguel needs to paint the wood. what is the area he needs to paint? 1. what is the area of the rectangular price of wood before the square is cut out? include units with your answer.