__________________ is a data mining method that partitions a collection of things into segments whose member share similar characteristics.

Answers

Answer 1

K-means clustering is a data mining method that partitions a collection of things into segments whose members share similar characteristics.

What is the technique that groups similar items together based on features?

K-means clustering is a popular unsupervised machine learning algorithm used for clustering analysis. It aims to partition a dataset into distinct groups, called clusters, where the items within each cluster are more similar to each other compared to those in different clusters. The algorithm works iteratively, starting with a specified number of cluster centroids randomly placed in the dataset.

It then assigns each data point to the nearest centroid and recalculates the centroids' positions based on the mean values of the points in each cluster. This process continues until the centroids stabilize, minimizing the within-cluster sum of squared distances. K-means clustering finds application in various fields, such as market segmentation, image processing, and anomaly detection.

Learn more about K-means clustering

brainly.com/question/30455726

#SPJ11


Related Questions

2. Xamarin.Forms is a UI toolkit to develop the application. A. TRUE B. FALSE C. Can be true or false D. Can not say

Answers

The statement "Xamarin.Forms is a UI toolkit to develop the application" is true because Xamarin.Forms is indeed a UI toolkit used for developing applications. Option a is correct.

Xamarin.Forms is a cross-platform UI toolkit provided by Microsoft that allows developers to create user interfaces for mobile, desktop, and web applications using a single codebase. It provides a set of controls and layouts that can be used to create visually appealing and responsive user interfaces across different platforms, including iOS, Android, and Windows.

With Xamarin.Forms, developers can write their UI code once and deploy it to multiple platforms, reducing the effort and time required to develop and maintain applications for different operating systems.

Option a is correct.

Learn more about developers https://brainly.com/question/19837091

#SPJ11

Mass communication is no longer viewed as the preferred vehicle for:

Answers

Mass communication is no longer considered to be the best medium for Multiple-to-one messages.

Mass communication is the process of conveying and disseminating information via mass media to large population segments. It is thought to be related to many different types of media because its technologies are used for the dissemination of information, which includes journalism and advertising as parts of it. Mass communication is unique from other forms of communication, such as interpersonal communication and organizational communication, because it focuses on specific resources conveying information to a huge number of listeners. How the information being disseminated affects the audience's behavior, attitude, opinion, or emotion is the core emphasis of the study of mass communication. The phrase "mass communication" refers to the simultaneous transmission of messages to many recipients.

Learn more about Mass communication from

brainly.com/question/20696487

#SPJ4

The______ function of word processing program will be the most useful for comparison

Answers

Answer:

In order to compare two documents in word, you should click at the view tab and then at the view side by side option in the top ribbon. When you click at that, a window will appear asking you which document you would like to compare side by side with the one that is already open and it gives you a list of word documents that are also open. Before you choose to compare two documents just make sure that you have opened both of them in word, so that they appear in the options. Once you chose the one you want, it will open in a new word window right next to the first one and you will be able to compare the two documents.

Explanation:

PLEASE HURRY!!
Look at the image below

PLEASE HURRY!!Look at the image below

Answers

Answer:

The function usernameMaker.

Explanation:

strFirst is a local variable in the function usernameMaker since it is an argument that is passed into that function. This means that the scope of strFirst is the function usernameMaker, since it cannot be accessed anywhere else in the code.

Hope this helps :)

which system will be safer​

Answers

Answer: Which system will be safer​? Check Explanation

Explanation: HI! Can you please attach an image or a better description of the question so I can better help you? You can edit your question anytime, by the way.

Answer:

Explanation: A safe system of work is a formal procedure which results from systematic examination of a task in order to identify all the hazards. It defines safe methods to ensure that hazards are eliminated or risks minimised.

Suppose the class Sub extends the class Sandwich. Which of the following assignments are legal? Sandwich x- new Sandwich0: Sub y new Sub0: (2) y x (3) y new Sandwich0; (4) x new Sub0;

Answers

Assignments (1) and (4) are legal.

Explanation:

- Assignment (1): Sandwich x = new Sandwich(); Sub y = new Sub();
This is legal because we can create a new object of the class Sandwich and assign it to a variable of type Sandwich. Similarly, we can create a new object of the class Sub and assign it to a variable of type Sub.

- Assignment (2): y = x;
This is not legal because we cannot assign a variable of a subclass type (Sub) to a variable of its superclass type (Sandwich) without type casting.

- Assignment (3): y = new Sandwich();
This is not legal because we cannot assign a variable of the superclass type (Sandwich) to a variable of the subclass type (Sub) without type casting.

- Assignment (4): x = new Sub();
This is legal because we can create a new object of the subclass Sub and assign it to a variable of its superclass type Sandwich.

To know more about legal visit -

brainly.com/question/1894269

#SPJ11

in computer networking, a computer system or application that acts as an intermediary between another computer and the internet is commonly referred to as:

Answers

In computer networking, a computer system or application that acts as an intermediary between another computer and the internet is commonly referred to as a proxy.

A proxy server, or simply a proxy, is a computer system or application that sits between a client computer and the internet. Its main function is to facilitate communication between the client and other servers on the internet. When a client sends a request to access a website or any online resource, the request is first directed to the proxy server.

The proxy then forwards the request to the appropriate server and relays the response back to the client. Proxies are often used for various purposes such as caching, filtering, security, and anonymity.

Learn more about security click here:

https://brainly.com/question/32133916

#SPJ11

You want to connect to 127 peripherals in a single connection. Which connection type should you use?

Answers

To connect 127 peripherals in a single connection, you should use USB Type-C. It supports multiple devices, is a very fast connection, and allows up to 127 devices to be connected through a single USB-C port.

Which connection type should you use to connect 127 peripherals in a single connection?To connect 127 peripherals in a single connection, you should use USB Type-C. It supports multiple devices, is a very fast connection, and allows up to 127 devices to be connected through a single USB-C port.USB-C is a more modern, versatile, and universal connection option than its predecessors, such as USB 2.0 or USB 3.0. Furthermore, the USB-C interface is rapidly gaining traction in the market, and it is expected to become the most widely used connection type in the near future.USB Type-C is the future of all cables and connectors, supporting power, data, and video transmission, and it's only going to get better and faster with time.                                                                                                                                                       USB Type-C, or USB-C, is a new connection interface designed to replace older USB 2.0 and USB 3.0 ports. The USB-C connector is smaller than the USB-A connector, making it more adaptable to current and future devices. It has the advantage of being able to support a range of devices, such as smartphones, tablets, and laptops, as well as USB hubs, and external hard drives. It's reversible, meaning you can plug it in either way and it will still work, unlike older USB connectors.USB Type-C is much faster than its predecessors, with a maximum data transfer rate of up to 10Gbps, compared to the maximum 5Gbps of USB 3.0. It can also support video and audio, up to 4K resolution at 60 frames per second, as well as power delivery, which means you can use it to charge your device.USB Type-C is the future of all cables and connectors, supporting power, data, and video transmission, and it's only going to get better and faster with time. It is expected to become the most widely used connection type in the near future because of its versatility, speed, and ability to support multiple devices.

USB Type-C is the most appropriate connection type to use to connect 127 peripherals in a single connection because of its high transfer speeds and ability to support multiple devices.

To know more about cables visit:

brainly.com/question/32453186

#SPJ11

The working of the computer on the input according to the program is called_______.​

Answers

Answer:

input program

Explanation:

Binary is best interpreted by a computer because
it is a simple system using patterns of three numbers.
the numbers in the system represent the on and off positions of the switches in a computer’s hardware.
it is broken down into bits.
it can be easily converted to the decimal system.

Answers

Answer:

Binary is best interpreted by a computer because the numbers in the system represent the on and off positions of the switches in a computer’s hardware.

Explanation:

The rest can be ruled out because:

a) binary is not a system using patterns of three numbers, but rather two numbers

c) it's true, but it is not the direct and clear answer as to why binary is best interpreted by a computer

d) that gives extra steps for the computer and thus contradicts the fact

Answer: B. the numbers in the system represent the on and off positions of the switches in a computer’s hardware.

in general, what is the difference between the char and string data types?

Answers

In general, the difference between the char and string data types is that char represents a single character, while string represents a sequence of characters.

The char data type is used to store a single character. It occupies a fixed amount of memory, typically one byte, and can hold any character from the character set, such as letters, digits, or symbols.On the other hand, the string data type is used to store a sequence of characters. It is essentially an array of characters. Strings can have variable lengths, depending on the number of characters they contain. They are often represented as a series of characters enclosed in double quotation marks.

To learn more about represents  click on the link below:

brainly.com/question/31913438

#SPJ11

which is the correct declaration of the vertexvisitor abstract class used by the depthfirstsearch() c function?

Answers

Depth First Search is a traverse graphs and trees(a subset of graphs).

Depth first search() c function?

Depth First Search (DFS) traversal is a major traversal technique that is often used to traverse graphs and trees (a subset of graphs). According to DFS, the search should begin at the root or beginning node and proceed to its depth before exploring the other nearby nodes.

When a dead end occurs in any iteration, the Depth First Search (DFS) method explores a network in a deathward motion and utilizes a stack to remember where to retrieve the next vertex to start a search. As in the preceding example, the DFS algorithm goes from S to A to D to G to E to B first, then F, and finally C. Stacks can be used to implement DFS's recursive nature. The fundamental concept is as follows: Choose a beginning node and stack all of its neighbors. To pick the next node to visit, pop a node from the stack and place all of its nearby nodes into a stack.

To learn more about Depth-first search refer:

https://brainly.com/question/28106599

#SPJ4

Prompt3 - Characteristics of Stereotype—s Explicitly explain stereotype (Stereotypes lecture, 0:54-2:13), identify M of its characteristics (5:49-15:21) and then use one of the Week2-5 readings or videos - one you've not used in a Discussionl post or another Discussion2 post - to explain that characteristic. Notes 1. Use the characters and either the author's name or the video's title as your heading (e.g. Stereotypes ignore differences within a group/Lorber). 2. You may fl use the same characteristic OR reading/video pairing a colleague has used in their reply to this prompt in your reply-to-prompt post; repetition in a reply-to-colleague post is permitted. 3. Each bullet point on the slide you see during the 5:49-15:21 portion of the Stereotype lecture is a different characteristic (e.g. two different characteristics "overemphasize..."). 4. See the General Notes at the top of the Discussion-

Answers

Stereotypes are simplified and generalized beliefs or judgments about a group of people based on their perceived characteristics. They can be harmful because they oversimplify and often reinforce biases and prejudices.

One characteristic of stereotypes is that they overemphasize differences within a group.

For example, in the video "The Danger of a Single Story" by Chimamanda Ngozi Adichie, she discusses how stereotypes can lead to a single narrative that only presents one side of a group's story.

This can lead to a limited and skewed understanding of that group.

Adichie emphasizes the importance of recognizing and appreciating the diverse experiences and perspectives within a group rather than relying on a single stereotype.

By overemphasizing differences within a group, stereotypes fail to acknowledge the complexity and individuality of its members. This can lead to misunderstandings, prejudice, and discrimination. It is important to challenge stereotypes by seeking out diverse perspectives and recognizing the uniqueness of each individual.

To know more about Stereotypes visit:

https://brainly.com/question/32332524

#SPJ11

People who make money investing in the stock market.....
A) get certain tax breaks.
B) should sell quickly to avoid taxes.
C) have to pay a fee to keep a stock.
D) must pay taxes on profits.
The answer is D ^^^

Answers

I think its D hope that helped

Answer:

D must pay taxes on profits.

Explanation:

Which statement is true regarding the Quick Access toolbar?
O It can be located at the top left-hand corner of the screen or below the ribbon.
O. It can contain functions that are also in the ribbon
O It can be modified to contain any function that you use frequently.
O All the above statements are true.​

Answers

Answer: All the above statements are true

Answer:

D) All of the above

Explanation:

Define a function OutputVals() that takes two integer parameters and outputs all integers starting with the first and ending with the second parameter in reverse order, each followed by a newline. The function does not return any value. Ex: If the input is 3 6, then the output is:


6

5

4

3

Note: Assume the first integer parameter is less than the second

Answers

e function OutputVals() takes two integer parameters and prints all integers starting with the first parameter and ending with the second parameter in reverse order, each followed by a newline. The function does not return any value.

To implement this function, we can use a loop that starts from the second parameter and iterates down to the first parameter. Within each iteration, we print the current number and a newline character. This ensures that the integers are printed in reverse order.

Here's an example implementation of the OutputVals() function in Python:

python

Copy code

def OutputVals(first, second):

   for num in range(second, first - 1, -1):

       print(num)

# Example usage

OutputVals(3, 6)

In the example usage, calling OutputVals(3, 6) would produce the output:

Copy code

6

5

4

3

This output matches the expected behavior of printing the integers from 6 to 3 in reverse order, each followed by a newline.

learn more about function OutputVals() here:

https://brainly.com/question/29975138

#SPJ11

When you need additional performance on your virtual machines, you should use _____ virtual disks on your virtual machines.

Answers

When you need additional performance on your virtual machines, you should use **SSD** (Solid State Drive) virtual disks on your virtual machines. SSD virtual disks provide faster and more efficient storage compared to traditional hard disk drives (HDDs). They use flash memory technology, which allows for quicker data access and improved performance.

Here are the steps to use SSD virtual disks on your virtual machines:
1. Assess your virtual machine's storage needs: Determine if your virtual machine requires additional performance and if using SSD virtual disks will meet those requirements. SSDs are particularly beneficial for applications that involve heavy data access or require faster response times.
2. Choose the appropriate virtual disk type: When creating or configuring your virtual machine, select the SSD virtual disk type. Different virtualization platforms may have different terminology for this, but the key is to choose the option that indicates the use of SSD technology.
3. Allocate storage space: Specify the amount of storage space needed for the virtual disk. Consider the storage requirements of your applications and data.
4. Configure the virtual disk settings: You may need to adjust additional settings related to the SSD virtual disk, such as I/O (input/output) priority, cache settings, or provisioning type. These settings can further optimize the performance of your virtual machine.
5. Attach the virtual disk to the virtual machine: Once the SSD virtual disk is created and configured, attach it to the virtual machine. This step may involve selecting the appropriate storage controller and assigning the virtual disk to the virtual machine's storage.
6. Start the virtual machine: After attaching the SSD virtual disk, start the virtual machine and verify that it is utilizing the SSD storage. You can monitor the performance of your virtual machine to confirm the improved performance.
Using SSD virtual disks can significantly enhance the performance of your virtual machines, ensuring faster data access and improved responsiveness. However, it's important to note that the availability and cost of SSD storage may vary depending on your virtualization platform and provider.

To learn more about virtual machines
https://brainly.com/question/28901685
#SPJ11

FILL IN THE BLANK.in ________ thinking, the opponent is primarily an intelligent attacker. networking security both networking and security neither networking nor security

Answers

In security thinking, the opponent is primarily an intelligent attacker. Networking security both networking and security neither networking nor security.

This approach recognizes that adversaries in the realm of security are not just passive entities, but rather intelligent individuals or groups who actively seek to exploit vulnerabilities and breach defenses.

It encompasses a holistic understanding of both networking and security aspects. By acknowledging the capabilities and motivations of potential attackers, security professionals can adopt a proactive mindset to anticipate and counteract threats effectively.

It involves strategic planning, threat modeling, risk assessment, and implementation of robust security measures across network infrastructure. Embracing this mindset helps organizations stay one step ahead in the ever-evolving landscape of cybersecurity threats.

To learn more about security: https://brainly.com/question/30098174

#SPJ11

What gets printed after the following code is run?
var name;
console.log(name);
Select the one choice that best answers the prompt above:
Answer 1
undefined
Answer 2
nothing
Answer 3
error
Answer 4
name
Next......

Answers

Answer:

Mia Khalifa jenny since

PLEASE HELP!!!
How can programmers use functions to create their own abstractions?

Answers

Answer:

by invoking the function.

please mark as brainliest if this helped

Peace

what is 2021 ap score distributions?

Answers

During the 2021 AP score distributions, the mean or average score was 2.80. More than 60% of all applicants obtained three or more scores on the AP examinations in 2021. Calculus BC, Mandarin, Drawing, Japanese, and Physics C are the subjects with the highest passing rates on the AP exam in 2021.

What is distribution by AP?

AP score distributions make it easier to see the proportion of students who perform well on each range of points on a given AP exam. When you take the test, you'll be able to recognise your percentile score and compare it to other test-takers' percentile scores to see how you did.

What is an appropriate AP score?

In most circumstances, an AP score of 3 or higher is regarded as being excellent. Comparing your AP score to the mean for that test that year will give you an even better picture of how well you did. For instance, in 2021, the typical AP Biology score was 2.83. Any score higher than that would be regarded as above average for that test.

To know more about AP score distributions visit:

https://brainly.com/question/14778686

#SPJ4

PLEASEEE HELP HURRY

PLEASEEE HELP HURRY

Answers

To start searching for a scholarly article on G. o. ogle Scholar, you should:

"Type the title of the article or keywords associated with it." (Option A)

What is the rationale for the above response?

Here are the steps you can follow:

Go to Go. o. gle Scholar website In the search box, type the title of the article or relevant keywords associated with it.Click the "Search" button.Browse through the search results to find the article you are looking for.Click on the title of the article to view the abstract and other details.If the article is available for free, you can download or access it directly from the search results page. If not, you may need to purchase or access it through a library or other academic institution.

Note that you can also use advanced search options and filters available on Go. ogle Scholar to narrow down your search results based on various criteria, such as publication date, author, and journal.

Learn more about G. o. ogle at:

https://brainly.com/question/28727776

#SPJ1

Which attack exploits a programming error, and can give the attacker control of the target server?



Buffer overflow





DDoS





DoS

Answers

The answer to the question is "Buffer overflow." A buffer overflow attack is a type of attack that exploits a programming error, specifically a buffer overflow vulnerability.

In this type of attack, the attacker inputs more data into a buffer than it can handle, causing the excess data to overflow into adjacent memory locations. By carefully crafting this input, the attacker can manipulate the program's execution and potentially gain control of the target server.

To understand this, let's consider an example. Imagine a program that accepts user input and stores it in a buffer. If the program does not check the size of the input, a malicious user could input more data than the buffer can hold. This extra data can overwrite adjacent memory, including crucial program data or even the return address of a function. By modifying the return address, the attacker can redirect the program's flow to their own malicious code.

Buffer overflow attacks are a serious security concern, as they can lead to unauthorized access, data theft, or even complete server compromise. To prevent such attacks, developers should implement proper input validation, enforce size limits on input, and use secure coding practices.

Learn more about secure coding practices: https://brainly.com/question/24303880

#SPJ11

name the main of a computer

Answers

The main of a computer is the Console

In a ________ system configuration, separate information systems are designed and managed by each foreign unit.

Answers

Answer:

In a decentralized system configuration, separate information systems are designed and managed by each foreign unit.

Explanation:

hopes this help (:

The algorithm below is used to find the largest element in a list of numbers.
By modifying one of the lines in the program it is possible to make the algorithm find the SMALLEST element. Which line would need to be modified and how?

The algorithm below is used to find the largest element in a list of numbers.By modifying one of the

Answers

The line that can be modified in the algorithm to return the smallest of the list is line 04

From the question, we understand that:

The algorithm returns the largest of all elements in a list

The above action is executed on line 04

To change the function of the algorithm to return the smallest, line 04 must be modified as follows:

IF (num < target)

Hence, the line that can be modified in the algorithm to return the smallest of the list is line 04

Read more about algorithms at:

https://brainly.com/question/24793921

Which of the following are specific recommendations to achieve enterprise system success? a Take a multidisciplinary approach to implementations b Thoroughly train users c Evolve the implementation d Allow employees to BYOD

Answers

Specific recommendations to achieve enterprise system success include option a,b and c i.e. Take a multidisciplinary approach to implementations ,  Thoroughly train users, Evolve the implementation respectively.

To achieve enterprise system success, specific recommendations include: a) taking a multidisciplinary approach to implementations, b) thoroughly training users, and c) evolving the implementation. These recommendations help ensure the effective use and adoption of the enterprise system, leading to overall success. Allowing employees to BYOD (Bring Your Own Device) may be relevant in some cases, but it is not a specific recommendation for enterprise system success.

In summary, to achieve enterprise system success, organizations should take a multidisciplinary approach, provide thorough user training, continuously evolve the implementation, and consider allowing employees to use their own devices, taking into account security considerations. These recommendations help ensure a successful implementation, user adoption, and ongoing optimization of the enterprise system to support the organization's objectives.

Learn more about enterprise system  at https://brainly.com/question/31806439

#SPJ11

1. Why would a medical office switch from a paper-based system to a computer-based scheduling system

Answers

The medical office may switch from a paper-based system to a computer-based scheduling system for several reasons:

1. Efficiency: A computer-based scheduling system can streamline the scheduling process, making it faster and more efficient. With just a few clicks, appointments can be scheduled, rescheduled, or canceled, saving time for both the staff and the patients. Additionally, automated reminders can be sent to patients, reducing the number of no-shows and improving overall productivity.

2. Accessibility: A computer-based scheduling system allows for easy access to patient schedules from anywhere within the medical office, as long as there is an internet connection. This means that staff members can quickly check availability, view upcoming appointments, and make necessary changes without having to physically search through stacks of paper. It also enables multiple staff members to access the scheduling system simultaneously, reducing the likelihood of double bookings or scheduling conflicts.

3. Organization: Unlike paper-based systems, computer-based scheduling systems provide a centralized platform where all patient information and appointments are stored. This allows for easy retrieval of patient records, reducing the risk of misplaced or lost paperwork. The system can also generate reports and analytics, providing valuable insights into patient flow, appointment patterns, and other metrics that can aid in decision-making and resource allocation.

4. Integration: A computer-based scheduling system can be integrated with other software used in the medical office, such as electronic health records (EHR) systems or billing systems. This integration ensures seamless flow of information between different systems, reducing the need for manual data entry and minimizing errors. It also facilitates a more holistic approach to patient care, as healthcare providers can easily access relevant patient information and medical history while scheduling appointments.

5. Security: Computer-based scheduling systems can offer enhanced security measures to protect patient data, such as encrypted data transmission and secure logins. This helps to ensure the confidentiality and privacy of patient information, which is crucial in healthcare settings.

In summary, switching from a paper-based system to a computer-based scheduling system in a medical office can improve efficiency, accessibility, organization, integration, and security. It simplifies the scheduling process, provides easy access to patient schedules, centralizes patient information, facilitates integration with other systems, and enhances data security.

To know more about medical office, visit:

https://brainly.com/question/32434694

#SPJ11

write fade in shorthand​

Answers

Answer:

"Fade In is a Class Act" Macworld says: "Fade In makes it easy to just write...It has all the features you'd find in the more expensive apps, such as Final Draft and Movie Magic Screenwriter, and there's even free and paid iPhone, iPad, and Android apps available

Explanation:

Which program is commonly used to verify that a new piece of hardware is recognized by the operating system, functions, and the system resources assigned

Answers

The program that is commonly used to verify that a new piece of hardware is recognized by the operating system, functions, and the system resources assigned is the Device Manager.

The Microsoft Windows operating system includes Device Manager. It enables users to inspect and control the computer's hardware. When a piece of hardware fails to function properly, the offending hardware is highlighted for the user to address. The hardware list may be sorted using several criteria.

Users can supply device drivers in compliance with the Windows Driver Model for each device. Devices can be enabled or disabled. Tell Windows to ignore faulty devices, View further technical properties

Learn more about Device Manager here:https://brainly.com/question/869693

#SPJ4

Other Questions
Why did southern states begin to secede after the election of 1860?. three equal point charges, each with charge 1.95 c , are placed at the vertices of an equilateral triangle whose sides are of length 0.450 m . what is the electric potential energy u of the system? (take as zero the potential energy of the three charges when they are infinitely far apart.) If 11x+4=7+9xwhat does x=???/ The authors explanation of how deep events occur would be most weakened if which of the following were discovered to be true?(A) Deep events are far less common than shallow events.(B) Deep events occur in places other than where crustal plates meet.(C) Mantle rock is more ductile at a depth of several hundred kilometers than it is at 50 kilometers.(D) The speeds of both P and S waves are slightly greater than previously thought.(E) Below 650 kilometers earthquakes cease to occur. - A spherical spacecraft is placed in a polar coordinate in Low Earth Orbit (LEO). The orbit altitude is around 240 km. The spacecraft is coated with a black paint finish. Using the given information, determine the spacecraft's equilibrium temperature: - Given - Sun's solar radiation intensity, J S =1371 W/m 2 (average value at 1AU distance) - Earth's planetary radiation intensity, J p =237 W/m 2 (ignoring orbital altitude effects) - Earth's albedo, a = 0.33 - Visibility factor, F=0.15 - Stefan-Boltzmann's constant, =5.67.10 8W/m 2K 2- Black paint properties: =0.9,=0.9 according to scientific consensus, how is climate change expected to affect hurricanes? The figure below is a net for a triangular pyramid.12 in length of 1 of 4 triangles.10.39 in height of 1 of 4 triangles.If all the triangles are equilateral, what is the surface area of the pyramid, in square inches? importance of rule of laws in points in the context of the characteristics of digital marketing, interactivity is defined as the ability of Artists:a document historyb. write historyC. create historyd. a and cAnswer soon QUESTION #1 - IN YOUR OPINION, what are the three (3) most important HR laws? List your 3 most importantlaws, explain what the law is, why you believe it is important, and how businesses can ensure they never violate it. QUESTION #2 - IN YOUR OWN WORDS, explain the importance of entrepreneurship in the US economy. Clearlycommunicate the benefits and the drawbacks of entrepreneurship in the United States QUESTION #3 - Explain the key differences (not just the definitions) between the four functional areas of theorganization. Also, explain why we need all four areas for a business to prosper. Rocks is biotic or abiotic?Soul is biotic or abiotic ?Sea shells is biotic or abiotic? when you walk barefoot in a room, the floor feels cooler walking on a tile floor as compared to a wooden floor because Evaluate 1 / x dx. O 0O 1/3 O 2/3 O The integral diverges.What is the volume of the solid of revolution generated by rotating the area bounded by y = sinx, the x-axis, x = /4, around the x-axis?O 0 unitsO unitsO unitsO 2 units calculate de beerss total revenue and its marginal revenue. from your calculation, draw the demand curve and the marginal revenue curve. A multidimensional database (MDDB) is a type of database in which data can be viewed from multiple dimensions; commonly used with ____. 3A few friends went bowling. The scoresare given below. Use the scores tocalculate the range of the data. *(1 Point)104, 117, 104, 136, 189, 109, 113, 104 A ballroom has square dance floor. The area of the floof is 400 square feet. If the length of each side of the square increased by one foot, would its area be a rational number? Find the surface area of the rectangular prism. 2 m 5 m 2 m What are the 5 main context clues?