HELP PLEASE

Today, not only do companies employ public relations managers but so do many
celebrities and politicians. Research and explain what the role of a public relations
manager is and see if you can think of the reasons why many public figures seem
to find them useful.

Answers

Answer 1

Answer: The role of a public relations manager is to keep the image of a celebrity, politician, ect. good so that they can keep their career going while constantly in the eye of the public. Public figures may find this useful because it can help them keep their record clean and have a personal life while also making it seem like they are perfect people to their audience, which in hand can help with business.

Explanation:


Related Questions

Which of the following accurately describes a user persona? Select one.

Question 6 options:

A user persona is a story which explains how the user accomplishes a task when using a product.


A user persona should be based only on real research, not on the designer’s assumptions.


A user persona should include a lot of personal information and humor.


A user persona is a representation of a particular audience segment for a product or a service that you are designing.

Answers

A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Thus, User personas are very helpful in helping a business expand and improve because they reveal the various ways customers look for, purchase, and utilize products.

This allows you to concentrate your efforts on making the user experience better for actual customers and use cases.

Smallpdf made very broad assumptions about its users, and there were no obvious connections between a person's occupation and the features they were utilizing.

The team began a study initiative to determine their primary user demographics and their aims, even though they did not consider this to be "creating personas," which ultimately helped them better understand their users and improve their solutions.

Thus, A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Learn more about User persona, refer to the link:

https://brainly.com/question/28236904

#SPJ1

How Educational Technology has evolved in Ghana over the last 7 years

Answers

Answer:

modern European-style education was greatly expanded by Ghana's government after achieving independence in 1957

Explanation:

The use of educational technology in Ghana and Ghanaian schools has evolved significantly over the past 7 years.  

Teacher Training: There has been an increased focus on training teachers in using technology in the classroom. This has helped to ensure that teachers are equipped with the skills they need to effectively integrate technology into their teaching practices.

New initiatives: The government and other organizations have launched new initiatives to promote the use of technology in education, such as the Ghana SchoolNet program, which provides free internet access to schools, and the Ghana Open Data Initiative, which makes educational data freely available to the public.                                        

Increased Access to Technology: There has been a notable increase in the availability of technology, such as computers, tablets, and smartboards, in Ghanaian schools.

Digital Content Development: In recent years, there has been a push to develop digital content for use in Ghanaian schools, such as e-textbooks, multimedia educational resources, and online learning platforms. This has helped to make learning more engaging and interactive for students.

Overall, the use of educational technology in Ghanaian schools has come a long way in the past 7 years, and it is expected to continue to grow.

To learn more about Ghana and its educational technology click here: https://brainly.in/question/28489233

distinguish between authentication and authorisation

Answers

Answer: Authentication is the process of verifying the identity of a user or entity, while authorisation is the process of determining if a user or entity has permission to access a particular resource or perform a certain action.

Explanation:

Learning python and am confused on how to code this problem in order for the function to return these statements... please help!

Learning python and am confused on how to code this problem in order for the function to return these

Answers

Answer:

def k_in_num(k, num):

 if (k == 0): return False

 return str(k) in str(num)

Explanation:

A bit weird that 0 doesn't contain 0, but anyway, above code does what you want.

Which financial aid program may require you to serve in the military after
earning a degree?
Scholarships and grants
Work-study
Reserve Officer Training Corps (ROTC)
Subsidized loans

Answers

Answer:

Reserve Officer Training Corps (ROTC)

Explanation:

a. Write code to implement the above class structure. Note the following additional information:
Account class: Create a custom constructor which accepts parameters for all attributes. The withdraw method should check the balance and return true if the withdrawal is successful.
SavingsAccount class: Create a custom constructor which accepts parameters for all attributes.
CurrentAccount class: Create a custom constructor which accepts parameters for all attributes. The withdraw method overrides the same method in the super class. It returns true if the withdrawal amount is less than the balance plus the limit.
Customer class: Create a custom constructor which accepts parameters for name, address and id.
b. Driver class:
Write code to create a new Customer object, using any values for name, address and id. Create a new SavingsAccount object, using any values for number, balance and rate. Set the SavingsAccount object as the Customer’s Savings account. Create a new CurrentAccount object, using any values for number, balance and limit. Set the CurrentAccount object as the Customer’s Current account.
Prompt the user to enter an amount to deposit to the Savings account and deposit the amount to the customer’s Savings account.
Prompt the user to enter an amount to withdraw from the Current account and withdraw the amount from the customer’s Current account. If the withdraw method is successful print a success message, otherwise print an error.
Finally print a statement of the customer accounts using methods of the Customer object. Output from the program should be similar to the following:

Enter amount to withdraw from current account:
500
Withdrawal successful
Enter amount to deposit to savings account:
750
Customer name: Ahmed
Current account no.: 2000
Balance: 1000.0
Savings Account no.: 2001
Balance: 1500.0

Answers

According to the question, the code to implement the above class structure is given below:

What is code?

Code is the set of instructions a computer uses to execute a task or perform a function. It is written in a programming language such as Java, C++, HTML, or Python and is composed of lines of text that are written in a specific syntax.

public class Account{

   private int number;

   private double balance;

   //Custom Constructor

   public Account(int number, double balance){

       this.number = number;

       this.balance = balance;

   }

   public int getNumber(){

       return number;

   }

   public double getBalance(){

       return balance;

   }

   public void setBalance(double amount){

       balance = amount;

   }

   public boolean withdraw(double amount){

       if(amount <= balance){

           balance -= amount;

           return true;

       }

       return false;

   }

}

public class SavingsAccount extends Account{

   private double rate;

   //Custom Constructor

   public SavingsAccount(int number, double balance, double rate){

       super(number, balance);

       this.rate = rate;

   }

   public double getRate(){

       return rate;

   }

}

public class CurrentAccount extends Account{

   private double limit;

   //Custom Constructor

   public CurrentAccount(int number, double balance, double limit){

       super(number, balance);

       this.limit = limit;

   }

   public double getLimit(){

       return limit;

   }

   private String name;

   private String address;

   private int id;

   private SavingsAccount savingsAccount;

   private CurrentAccount currentAccount;

   //Custom Constructor

   public Customer(String name, String address, int id){

       this.name = name;

       this.address = address;

       this.id = id;

   }

   public SavingsAccount getSavingsAccount(){

       return savingsAccount;

   }

   public void setSavingsAccount(SavingsAccount savingsAccount){

       this.savingsAccount = savingsAccount;

   }

   public CurrentAccount getCurrentAccount(){

       return currentAccount;

   }

   public void setCurrentAccount(CurrentAccount currentAccount){

       this.currentAccount = currentAccount;

   }

   public String getName(){

       return name;

   }

   public void printStatement(){

       System.out.println("Customer name: " + name);

       System.out.println("Current account no.: " + currentAccount.getNumber());

       System.out.println("Balance: " + currentAccount.getBalance());

       System.out.println("Savings Account no.: " + savingsAccount.getNumber());

       System.out.println("Balance: " + savingsAccount.getBalance());

   }

}

public class Driver{

   public static void main(String[] args){

       Customer customer = new Customer("Ahmed", "123 Main Street", 123);

       SavingsAccount savingsAccount = new SavingsAccount(2001, 1000, 0.1);

       customer.setSavingsAccount(savingsAccount);

       CurrentAccount currentAccount = new CurrentAccount(2000, 1000, 500);

       customer.setCurrentAccount(currentAccount);

       Scanner scanner = new Scanner(System.in);

       System.out.println("Enter amount to withdraw from current account:");

       double amount = scanner.nextDouble();

       if(currentAccount.withdraw(amount)){

           System.out.println("Withdrawal successful");

       }

       else{

           System.out.println("Error");

       }

       System.out.println("Enter amount to deposit to savings account:");

       double amount2 = scanner.nextDouble();

       savingsAccount.setBalance(savingsAccount.getBalance() + amount2);

       customer.printStatement();

   }

}

To learn more about code

https://brainly.com/question/30505954

#SPJ1

A function:________

a. must always have a function prototype even if the function is above main.
b. must have three parameters in the function header.
c. does not need a function prototype if the function itself is above main.
d. always requires a function call, even if you are not using it

Answers

Answer:

a. must always have a function prototype even if the function is above main.

Explanation:

A function must always have a function prototype even if the function is above main.

The function prototype is a declaration which will have to inform the compiler of the function's arguments and the return type. It also tells the computer the name and parameters of function.

This function prototype contains declaration of function and not implementation.

i need help asp

Samar’s team has just started to go through their checklist of game items to see if

it is ready to proceed. What stage of the production cycle is Samar’s team

currently in?


beta

gold

pre-alpha

post-production

Answers

Samar’s team has just started to go through their checklist of game items to see if it is ready to proceed. The stage of the production cycle that Samar’s team is currently in is: "Post Production" (Option D)

What is production Cycle?

The manufacturing cycle includes all actions involved in the transformation of raw materials into final commodities. The cycle is divided into various stages, including product design, insertion into a production plan, manufacturing operations, and a cost accounting feedback loop.

The production cycle of a corporation indicates its capacity to turn assets into earnings, inventory into goods, and supply networks into cash flow. The manufacturing cycle is one component of a larger cycle length that includes order processing time and the cash-to-cash cycle.

It should be mentioned that production is the process of integrating several materials and immaterial inputs (plans, information) to create something for consumption (output). It is the act of producing an output, such as an item or service, that has value and adds to people's utility.

Learn more about production cycle:
https://brainly.com/question/13994503
#SPJ1

Most games have characters that perform actions on the screen. What are these characters called?
Floats
Sprites
Fairies
Or Pixels

Answers

Answer:pixels

Explanation:

its the correct

: "I have a customer who is very taciturn."

: "I have a customer who is very taciturn."

Answers

The client typically communicates in a reserved or silent manner

B. He won't speak with you.

Why are some customers taciturn?

People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.

The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.

Learn more about taciturn people here:

https://brainly.com/question/30094511

#SPJ1

Write a Java program that creates a two-dimensional array of type integer of size x by y (x and y must be entered by the user). The program must fill the array with random numbers from 1 to 9. Then, the program must print the original array and the elements that are in even columns of the array.

Answers

Answer:

The java program is as follows:

import java.util.*;

public class Main{

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 Random r = new Random();

 int x, y;

 x = input.nextInt();  

 y = input.nextInt();

 int[][] Array2D = new int[x][y];

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          Array2D[i][j] = r.nextInt(9) + 1;      }

 }

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

 

 for(int i = 0; i < x ; i++){

     for(int j = 1; j < y; j+=2){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

}

}

Explanation:

This creates a random object

 Random r = new Random();

This declares x and y as integers

 int x, y;

This gets input for x

 x = input.nextInt();  

This gets input for y

 y = input.nextInt();

This declares the 2D array

 int[][] Array2D = new int[x][y];

The following iteration populates the array with integers 1 to 9

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          Array2D[i][j] = r.nextInt(9) + 1;      }

 }

The following iteration prints all elements of the array

 for(int i = 0; i < x ; i++){

     for(int j = 0; j < y; j++){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

The following iteration prints all elements on the even column

 for(int i = 0; i < x ; i++){

     for(int j = 1; j < y; j+=2){          System.out.print(Array2D[i][j]+" ");      }

     System.out.println();

 }

a place where people study space​

Answers

Answer:

a place where people study space is a Spacey agent

Which of the following queries can have a fully Meets result?

Answers

Answer: we need the awnser key

Explanation:

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective?

Answers

Answer:

B

Explanation:

She did all of the work so the other students wherent able to do anything

The thing that Nicole needs to do to improve the study group is to involve others and give them tasks.

What is a Study Group?

This refers to the collection of persons that forms a group with the aim of learning and revising together.

Hence, we can see that because Nicole does most of the tasks in the study group for the test on plant biology, she would have to involve the other students so they would handle some of the work.

Read more about study groups here:

https://brainly.com/question/23779014

#SPj2

What is Microsoft PowerPoint?
Oa presentation program included with Microsoft Office
oa project management program available only in certain versions of Microsoft Office
Oa desktop publishing program included with Microsoft Office
oa collaboration program available only in certain versions of Microsoft Office

Answers

Answer:

ITS THE FIRST ONE :)

Explanation:

ALSO IF ITS NOT THE FIRST ONE GO ON YT!

How do I find enchants faster on deepwoken?

Answers

Answer:

Rogue Constructs, Primadon, Fishing

Explanation:

Multiple methods may aid you in finding enchants faster. Notable ways include farming the Rogue Construct at Minityrsa which nets solid total loot (each item is rolled individually for enchants which is why larger chests usually means more enchants and why enchants can be in groups of more than 1 in chests) and farming Primadon. Fishing has also become a prominent method of enchant farming but is less reliable than the other two stated methods if you already have a strong PVE build. Happy enchant farming.

Answer:

Duke

Explanation:

Duke loves to drop enchants!! I use him to get my enchants, primadon sometimes. Rogue construct is ehhh but it works. But go gran sudaruska! Find it at crypt of unbroken!

How university has utilised Information Technology in society for efficient business process?

Answers

Employees can easily understand and identify their goals, targets, or even if the exertion used was undertaking or not with the help of strong information technology.

What is information technology?

The use of technology to communicate, transfer data, and process information is referred to as information technology.

Among the various trends in information technology are, but are not limited to, analytics, automation, and artificial intelligence.

The use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data is referred to as information technology (IT).

With the assistance of powerful information technology, employees can easily understand and identify their goals, targets, or even whether the exertion used was undertaken or not.

Thus, universities utilized Information Technology in society for efficient business process.

For more details regarding information technology, visit:

https://brainly.com/question/14426682

#SPJ1

Abstract: Design, implement, explain, test, and debug a simple, but complete command- line interpreter named cli.
Detail: Design, implement, document, test and run a simple shell, known here as a command-line interpreter (cli). This tool is invoked via the cli command plus possible arguments. Commands are OS commands to be executed. Multiple commands are separated from one another by commas, and each may in turn require further arguments. Cli 'knows' a list of commands a-priori; they are predefined. When invoked, cli checks, whether the first argument is an included command. If so, cli confirms this via a brief message. If not, a contrary message is emitted, stating this is not one the predefined commands. After the message, cli executes all commands in the order listed. After executing the last command, cli prints the current working directory, i.e. it acts as if the pwd command had been issued. Sample runs are shown further below.
Multiple commands of cli must be separated from one another by commas. Possible parameters of any one command are separated from the command itself (and from possible further parameters) by white space. White space consists of blanks, tabs, or a combination, but at least 1 blank space. Here some sample runs with single and multiple commands; outputs are not shown here: .
/cli pwd looks like Unix command pwd; is your sw .
/cli rm -f temp, mv temp ../temp1 ditto: input to your running homework 5
./cli ls -la another "single unix command"
./cli rm a.out, gcc sys.c, cp a.out cli
Cli starts out identifying itself, also naming you the author, and the release date. Then cli prints the list of all predefine commands. Finally, cli executes all commands input after the cli invocation. For your own debug effort, test your solution with numerous correct and also wrong inputs, including commas omitted, multiple commas, leading commas, illegals commands, other symbols instead of commas etc. No need to show or hand-in your test and debug work.
The output of the cli command "cli pwd" or "./cli pwd" should be as shown below, assuming your current working directory is ./classes Sac State/csc139. Here is the output of a sample run with a single command line argument:
herbertmayer$ ./cli pwd
hgm cli 4/12/2020
Legal commands: cd exec exit gcc Is man more mv rm pwd sh touch which $path
2 strings passed to argv[]
next string is 'pwd'
new string is 'pwd
1st cind 'pwd' is one of predefined
/Users/herbertmayer/herb/academia/classes Sac State/csc139
Here the output of another sample run, also with a single cli command:
herbertmayer$ ./cli ls
hgm cli 4/12/2020
Legal commands: cd exec exit gcc ls man more mv rm pwd sh touch which Spath
2 strings passed to argv[]
next string is 'ls'
new string is 'ls!
1st cmd 'is' is one of predefined. admin cli.c sac state yyy
backup 1 24 2020 docs sac state hw
backup 3 9 2020 grades sac state xxx
cli 1 notes
/Users/herbertmayer/herb/academia/classes Sac State/csc139
Interpretation of commands that cli handles can proceed through system(), executed from inside your C/C++ program cli.
List of all commands supported by your cli:
char * cmds [ ] = {
"cd",
"exec",
"exit",
"gcc",
"ls",
"man",
"more",
"mv",
"Im
"pwd"
"sh",
"touch",
"which",
"Spath"
What you turn in:
1. The source program of your homework solution; well commented, preferably one single source file.
2. Four progressively more complex executions of your correctly working cli program, showing all user inputs and corresponding output responses.

Answers

Answer:

that is very long question ask a profesional

Explanation:

Intelligent computer uses _________ to learn.

Answers

Answer: a test

Explanation:

Henry is working on a group project and saves it so that he can access it anywhere he has internet. What type of software is Henry using to save his work?
a. hard software
b. internet software and services
c. IT services
d. technology software

Answers

Internet software and services type of software is Henry using to save his work.

Thus, The information technology sector's Internet Software and Services Industry consists of businesses that create and sell internet software and/or offer internet services such as online databases and interactive services, web address registration services, database creation services, and internet design services.

It excludes businesses categorized in the Internet Retail sector. A balanced scorecard, Porter's Five, SWOT, and financial study of  and Monster from the perspective of the Internet software and Services Industry.

Thus, Internet software and services type of software is Henry using to save his work.

Learn more about Internet, refer to the link:

https://brainly.com/question/13308791

#SPJ1

Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the given program:
Gus
Bob
Zoe
1 short_names - "Gus[0]
2 short_names - 'Bob [1]
3 shortt_names - "Zoe[2]
4
5 print (short names[0])
6 print (short names[1])
7 print (short names[2])

Answers

Answer:

Following are the correct code to this question:

short_names=['Gus','Bob','Zoe']#defining a list short_names that holds string value

print (short_names[0])#print list first element value

print (short_names[1])#print list second element value

print (short_names[2])#print list third element value

Output:

Gus

Bob

Zoe

Explanation:

In the above python program code, a list "short_names" list is declared, that holds three variable that is "Gus, Bob, and Zoe".In the next step, the print method is used that prints list element value.In this program, we use the list, which is similar to an array, and both elements index value starting from the 0, that's why in this code we print "0,1, and 2" element value.

why do you think a lot of information about an individual is available online that people are not aware of?

Answers

Answer:

There are several reasons why a lot of information about an individual is available online that people may not be aware of:

Data Aggregation: Many websites and companies collect and aggregate personal data from various sources, such as social media platforms, online forums, and public records. These companies then sell this information to third parties, such as marketers, advertisers, and even government agencies, who use it for various purposes, such as targeted advertising or law enforcement.

Lack of Privacy Controls: Many people are not aware of the privacy controls on their social media accounts or other online profiles, which may allow their personal information to be shared publicly or with third-party apps. Even when privacy controls are available, they may be difficult to understand or navigate, and people may not take the time to adjust them to their desired level of privacy.

Online Activities: People's online activities, such as searches, comments, and posts, can leave a digital trail that can reveal personal information about them. Even seemingly innocuous online activities, such as playing online games or taking quizzes, may collect personal information and share it with third parties.

Data Breaches: Data breaches can occur when hackers gain unauthorized access to databases containing personal information, such as email addresses, passwords, and social security numbers. These breaches can result in large amounts of personal information being exposed online without the individual's knowledge or consent.

Overall, the internet has made it easier than ever to collect and share personal information, and many people may not be aware of the extent to which their information is being collected and shared. To protect their privacy, individuals should be vigilant about their online activities, understand the privacy controls on their accounts, and take steps to secure their personal information, such as using strong passwords and two-factor authentication.

In this lab, you declare and initialize constants in a Java program. The program file named NewAge2.java, calculates your age in the year 2050.

// This program calculates your age in the year 2050.
// Input: None.
// Output: Your current age followed by your age in 2050.

public class NewAge2
{
public static void main(String args[])
{
int currentAge = 25;
int newAge;
int currentYear = 2023;
// Declare a constant named YEAR and initialize it to 2050

// Edit this statement so that it uses the constant named YEAR.
newAge = currentAge + (2050 - currentYear);

System.out.println("My Current Age is " + currentAge);
// Edit this output statement so that is uses the constant named YEAR.
System.out.println("I will be " + newAge + " in 2050.");

System.exit(0);
}
}

Answers

A Java programme uses a constant YEAR to calculate age in 2050. declares the variables currentAge, currentYear, and newAge. present age and age in 2050 are output.

What do Java variables and constants mean?

A constant is a piece of data whose value is fixed during the course of a programme. As a result, the value is constant, just as its name suggests. A variable is a piece of data whose value may vary while the programme is running.

How is a constant initialised?

At the time of its declaration, a constant variable must be initialised. In C++, the keyword const is put before the variable's data type to declare a constant variable. Any data type, whether int, double, char, or string, can have constant variables declared for it.

To know more about Java visit:

https://brainly.com/question/12978370

#SPJ1

What is Dynamic Host Configuration Protocol

Answers

Answer:

The Dynamic Host Configuration Protocol (DHCP) is a network management protocol used on Internet Protocol (IP) networks, whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on the network, so they can communicate with other IP networks.

Answer: Dynamic Host Configuration Protocol (DHCP) is a network management protocol used to automate the process of configuring devices on IP networks, thus allowing them to use network services such as DNS, NTP, and any communication protocol based on UDP or TCP.

Explanation:

DHCP stands for dynamic host configuration protocol and is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.

Which of the following is NOT one of the four benefits of using email?

Answers

Answer:

Can you give choices.

Explanation:

Can someone plz answer these questions plz

Can someone plz answer these questions plz

Answers

Answer:

ñbyte I'm pretty sure, sorry if u get it wrong you should do more research about the question if i get it wrong!!

Pleaseeeeee helppppp meeeeeeee
Tomorrow is my examination.​
Please don't ignore.

Pleaseeeeee helppppp meeeeeeeeTomorrow is my examination.Please don't ignore.

Answers

Answer:

Floppy disk

Pendrive

sd card

CD

Router

Explanation:

Hope it is helpful

What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:


Width


Height


Length


They need to be written in this format: ___________X___________X___________


Fill in the blanks.
for my sibling.

Answers

Answer:

Length x Width x Hight

Explanation:

Write a method that reverses the sequence of elements in an array. For example, if you call the method with the array g

Answers

Hope it will help you

In cell B17, enter a formula that uses the IF function and tests whether the total sales for January is greater than or equal to 200000?

Answers

An if statement in excel is written in the form:

=if(statement/test, value if true, value if false)

When calculating if a value is greater or equal to, the sign that can be used is:

>=

So putting this into a formula:

=(if B17 >= 200000, "Yes", "No")

Hope this helps!

Other Questions
What is the pH of a solution that is 0.21 M sodium fluoride and 0.57 M hydrofluoric acid? youre looking at a bar graph and see numbers going from the bottom to the top from 0 to 100 which of the folllowing are you looking at Two sides of a triangle have the same length. The third side measures 4 m less than twice that length. The perimeter of the triangle is 20m. Find the lengths of the sides. syntheses incorporate protecting groups when a starting material contains multiple reactive sites. this neutralizes one of the reactive sites and makes it inert to the reaction conditions. selective removal of the protecting group then re-forms the reactive site. analyze the molecule and answer the three questions. In Passage 2, review pages 2 and 3. Katie jogged a total distance of 8 and 1 over 2 miles during the months of January and February. If Katie only jogged 1 over 4 mile every day, which expression shows the number of days she went jogging? (1 point)Group of answer choices8 and 1 over 2 1 over 48 and 1 over 2 1 over 48 and 1 over 2 + 1 over 48 and 1 over 2 1 over 4Flag question: Question 4 4 students is ..........% of 20 students From the functionalist perspective, the media can be dysfunctional in what way? Science-The Hydrosphere"Is pollution a result of overpopulation or bad practices?" Module 3 Discussion!After reading Ch.12 and 13 of the text (The essentials of Finance and Accounting for nonfinancial managers/ Third Edition) on Strategy and Financial Forecasting, watching the SWOT video based on Paleys Products from the Ratio Analysis in Module 2 and the additional narrative information in Appendix C, PhaseCreate a SWOT analysis that will reflect the TOWS analysis as described in Ch. 12 of the text. The purpose of the SWOT analysis is to lay out several issues and possibilities to be considered in Paleys strategic planning. The strengths and weaknesses are internal issues, whereas the opportunities and threats are external.The second part of the analysis is to create actions based on the SWOTs. This is sometimes called a TOWS analysis and is done by comparing the boxes, two at a time:Offensive actions come from strengths that link to opportunities, so a specific strength can be applied to exploit an opportunity.Adjusting actions come from addressing weaknesses, which then can be used to exploit opportunities that previously had not been possible.Turnaround actions come from weaknesses that link to threats. These are high-risk issues where a priority needs to be given to addressing the weakness to minimize the vulnerability.Defensive actions come from threats that link to strengths. These are latent issues because if the threat materializes, an already-existing strength is available to counter it.Additional actions can be included to address other issues not directly identified in the SWOTs.3. From the actions identified in part 2, pick 3-5 strategic actions that you feel Paley must achieve or at least start in the upcoming year and state your reasons for including them.Attach your completed SWOT form and list of strategic actions with supporting logic and facts from the case as your answer for this discussion question. These actions are the foundation for the strategic plan what is the similarities of hazard ang risks ? not differences. What jobs are service jobs?Group of answer choicesLawyerFirefighterAll of the abovePolice officerfast answer pls and get 12 brainly points In a game of dodge ball played by a large group of second-graders, the same children regularly get hit with the ball. this probably is due to? me need help math';;''';';';' 1. what is the x of "5x - 4 = 3x + 8"2. what is the x of "-4x + 7 = -7x - 8"3. what is the x of "6x + 7 = -4x - 4 what is 70000000000000000 divided by 100000 plus 797970605 plus 023475748392 A wholesaler buys a fan for Rs. 69,000. Two of them are used in their own homes and the balance is Rs. Sold for 1,400. He made a profit of Rs. 2,500 from this sale. How many fans did you buy at what price? Tammi generally is pessimistic and usually sees things in a negative light. tammi has a relatively high degree of? Why might a project manager avoid using technical language when giving a presentation to clients?A. Using technical language is appropriate for team members but not for project managers.B. The clients might not understand the technical language that people on the managers team use all the time.C. The clients might believe that the project manager is talking down to them and thinks they are not intelligent.D. The clients might want the project manager to use technical language that the manager does not really understand Leroy, Brian, and Elena were hungry one afternoon, and they wanted a healthy snack. They decided to split one cup of carrots and one cup of celery.