Marketing management must make important decisions when developing an advertising program. Which of the following is NOT one of those decisions?
A) evaluating advertising effectiveness
B) developing advertising strategy
C) setting advertising objectives
D) designing products and distribution
E) setting the advertising budget

Answers

Answer 1

When creating an advertising program, marketing management must consider the following issues carefully.

What does it mean to "build skills"?

Trainees and people of working age can learn dexterity, knowledge, and capability, as well as professional ethics and outstanding working attitudes, through skill development. the establishment of particularly managers, and other related activities.

What is a developing sentence?

What to do constructing a sentence. A scorching flame was emerging from the blush. Russia is also creating its own supplies. The national government of Mexico has a persistent policy of expanding its railroad network.

To know more about Developing visit :

https://brainly.com/question/24251696

#SPJ1


Related Questions

: process that monitors system traffic and adds resources as needed, within set limits


: process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource


: process to determine what volume a system can handle by comparing its performance to standards in the industry

Answers

Process that monitors system traffic and adds resources as needed, within set limits : Auto scaling

Process that allocates tasks to resources to increase efficiency and to avoid overloading any one resource:  Load balancing

Process to determine what volume a system can handle by comparing its performance to standards in the industry : Benchmarking

What is performance?

Performance is the measure of how effectively a particular task is done or in other words maximum output can be obtained from the input.

The process which monitors system traffic and adds resources as needed, within set limits is called as Auto scaling.

Process that allocates tasks to resources to increase efficiency and avoid overloading any one resource is known as Load balancing.

Process to determine what volume a system can handle by comparing its performance to standards in the industry termed as Benchmarking.

Thus, all the terms are defined.

Learn more about performance.

https://brainly.com/question/15466511

#SPJ2

How does the variable scope influence the structure of an algorithm

Answers

You can only put global variables anywhere in the program while with local variables it can only be used within the function. You're only allowed to use local variables in different functions and not the same variable in the same function.

           Simple sketches, mockups, or wireframes are frequently used in the user-centered design process for some or all of the designs. Instead of producing the final product and then having to make expensive revisions if it doesn't match user needs, this results in a far faster and more affordable design process.

What exactly does computer programming entail?

       Scope is a key concept in programming. Where variables can be accessed or referenced is determined by the scope. Some variables in a program can be accessed from anywhere, whereas other variables may not be accessible from everywhere. We must first discuss blocks before going into greater detail concerning scope.

        An individual can write the program's processing stages in their own language using an algorithm, i.e., they can construct the program's flowchart using so-called code.

     An algorithm is just a series of steps used to carry out a certain activity. They serve as the foundation for programming and enable the operation and decision-making of devices like computers, cellphones, and webpages.

        User experience deals with the unique interaction consumers have with the goods they use, whereas user-centered design refers to the method or strategy used to build experiences. It refers to a concept rather than a method of interaction between a user and a product or service.

To Learn more About  user-centered design, Refer:

https://brainly.com/question/28721191

#SPJ2

Create a C++ program to input a list of positive numbers
from the keyboard and find the average. The list is terminated with the value -99 (Sentinel
input value).​

Answers

Answer:

can you help me please? https://brainly.com/question/23169922

Explanation:

What is the output of the following code segment? t = 0; if(t > 7) System.out.print("AAA"); System.out.print("BBB"); BBB AAABBB AAA nothing

Answers

Answer:

BBB

Explanation:

Given

Java code segment

Required

What is the output?

Analyzing the code segment 1 line after other

This line initializes t to 0

t = 0;

This line checks if t is greater than 7

if(t > 7)

If the above condition is true, the next line is executed

System.out.print("AAA");

NB: Since t is not greater than 7, System.out.print("AAA");  will not be executed

Lastly, this line executed

System.out.print("BBB");

Hence, BBB will be displayed as output

Microsoft's HoloLens provides a(n) __________ experience, where the real world is supplemented with computer-generated information.

Answers

Microsoft's HoloLens provides an AUGMENTED REALITY experience, where the real world is supplemented with computer-generated information. They were developed as Project Baraboo.

Augmented reality

Augmented reality refers to the interactive experience in which the real objects are enhanced by computer-generated information.

The Microsoft HoloLens contains multiple sensors and holographic processing to create a virtual world of augmented reality.

Microsoft HoloLens was developed by Project Baraboo.

Learn more about augmented reality here:

https://brainly.com/question/9054673

an escalator carries you from one level to the next in an airport terminal. the upper level is 4.3 m above the lower level, and the length of the escalator is 7.5 m . assume that your mass is 68 kg . mastering physics

Answers

The escalator is 7.5 m long, it requires 2595.4 Joules of energy to lift you 4.3 m, or about 343.4 Joules of energy per meter.

What is escalator?

An escalator is a type of vertical transportation that moves people between different levels of a building or structure. It consists of a motor-driven chain of individual, linked steps that move up or down on tracks, allowing the rider to easily travel between floors. The escalator is powered by an electric motor and is designed to provide a safe and convenient form of transportation with minimal effort. Escalators are commonly installed in shopping malls, airports, train stations, stadiums, and other large public buildings. Escalators are an efficient way to move large numbers of people quickly and safely.

Calculating the work done by the escalator:
Work = Force x Displacement
Work = 68 kg x 9.8 m/s2 x 4.3 m
Work = 2595.4 Joules
This is the amount of energy required to lift you from the lower level to the upper level of the escalator. Since the escalator is 7.5 m long, it requires 2595.4 Joules of energy to lift you 4.3 m, or about 343.4 Joules of energy per meter.

To learn more about escalator
https://brainly.com/question/28745011
#SPJ4

improved pet app user

Answers

By using Internet new sources of input. Determine the information that the app gets from each source of input.

One of the most critical components found currently in IT existence is the user interface. Approximately 90 % of people are mobile and electronic equipment dependent.

Thus, software production was the idea that's happening. Thus, a better customer interface is required to boost output in application development. They have to think of it and create an app with consumers or the performance.

Learn more about internet on:

https://brainly.com/question/13308791

#SPJ1

The complete question will be

Help meeeee - Improved Pet App

Try out the improved version of the pet app that gives the user information about pet stores close by, which uses new sources of input. Determine the information that the app gets from each source of input.

User

Phone Sensors

Internet

Two of the computers at work suddenly can’t go online or print over the network. The computers may be trying to share the same IP address.

Which strategy is most likely to solve the problem?
rebooting the network server
reconfiguring the network hubs
installing network gateway hardware
logging off one of the computers, and then logging back o

Answers

Answer:

logging off one of the computers, and then logging back on

Answer:

the last one:

logging off one of the computers, and then logging back on

Explanation:

if something goes wrong on an electronic device you can reboot it and it should eventually work.

have a nice day

Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!

Answers

The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:

A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))

Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.

eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.

eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.

The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.

You can also create the matrix A by using following code:

A = [-4 2 1; 2 -4 1; 1 2 -4]

It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.

Can someone give me answers for 1-4

Can someone give me answers for 1-4

Answers

Answer:

you want me help u with this one?

2. The different amount of shades of color

3. The artist had given every marvel or DC or villian the color that fit them and the texture is also very nice in the picture.

4. The artist maybe could make the pic a little bit more high quality cause in the image is sort of blurry and you cant really see the further people that well.

Write an expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values.

Answers

The expression that computes the sum of two double variables total1 and total2, which have been already declared and assigned values is total1+total2.

What is double variable?

The double data type is built into the compiler and is used to define numeric variables that hold numbers with decimal points.

Many programming languages, including C, C++, C#, and others, recognize the double as a type.

A variable can be declared as double by prefixing it with the double keyword. You mostly used this data type, which has 14 or 15 decimal digits.

However, it must be used with caution because it requires 8 bytes of memory storage and is an expensive method.

total1+total2 is the expression that computes the sum of two double variables total1 and total2, which have already been declared and assigned values.

Thus, this can be the expression that computes the sum of two double variables total1 and total2.

For more details regarding double variable, visit:

https://brainly.com/question/1979738

#SPJ1

Describe the first generation of computer based on hardware, software, computer characteristics, physical appearance and their applications?​

Answers

Answer:

The first generation of computers was developed in the 1940s and 1950s, and was characterized by the use of vacuum tubes as the primary component of their electronic circuits. These computers were large, expensive, and required a lot of power to operate. Here are some key characteristics of first-generation computers:

Hardware: First-generation computers used vacuum tubes for logic circuitry, which were large, fragile, and generated a lot of heat. They also used magnetic drums or tape for data storage.

Software: Early computer programming languages were developed during this time, including machine language and assembly language. Programs were written on punched cards or paper tape and fed into the computer by operators.

Computer characteristics: First-generation computers were slow and had limited memory capacity. They were also very expensive and often required specialized operators to use them.

Physical appearance: First-generation computers were large and took up entire rooms. They consisted of racks of electronic equipment, with wires and tubes connecting everything together. The user interface was typically a console with switches and lights.

Applications: First-generation computers were primarily used for scientific and military applications, such as calculating missile trajectories or decrypting codes. They were also used in business for accounting and payroll purposes.

Some examples of first-generation computers include the ENIAC (Electronic Numerical Integrator and Computer), UNIVAC (Universal Automatic Computer), and IBM 701. Despite their limitations, these early computers represented a major milestone in the development of computing technology and laid the foundation for future generations of computers.

Need help with this python question I’m stuck

Need help with this python question Im stuck
Need help with this python question Im stuck
Need help with this python question Im stuck

Answers

It should be noted that the program based on the information is given below

How to depict the program

def classify_interstate_highway(highway_number):

 """Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.

 Args:

   highway_number: The number of the interstate highway.

 Returns:

   A tuple of three elements:

   * The type of the highway ('primary' or 'auxiliary').

   * If the highway is auxiliary, the number of the primary highway it serves.

   * The direction of travel of the primary highway ('north/south' or 'east/west').

 Raises:

   ValueError: If the highway number is not a valid interstate highway number.

 """

 if not isinstance(highway_number, int):

   raise ValueError('highway_number must be an integer')

 if highway_number < 1 or highway_number > 999:

   raise ValueError('highway_number must be between 1 and 999')

 if highway_number < 100:

   type_ = 'primary'

   direction = 'north/south' if highway_number % 2 == 1 else 'east/west'

 else:

   type_ = 'auxiliary'

   primary_number = highway_number % 100

   direction = 'north/south' if primary_number % 2 == 1 else 'east/west'

 return type_, primary_number, direction

def main():

 highway_number = input('Enter an interstate highway number: ')

 type_, primary_number, direction = classify_interstate_highway(highway_number)

 print('I-{} is {}'.format(highway_number, type_))

 if type_ == 'auxiliary':

   print('It serves I-{}'.format(primary_number))

 print('It runs {}'.format(direction))

if __name__ == '__main__':

 main()

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

. Suppose you have a computer and you're wanting to know if the IP address is being blocked or if SSH traffic is being blocked. What would you do to be able to determine which one actually is happening? Make sure to explain both cases.
Explain how you could prevent a host from being allowed to access a system for SSH.

Answers

To determine if an IP address is being blocked or if SSH traffic is being blocked, I would do the following:

Check the firewall settings on the computer or network. This can be done by accessing the router or firewall settings and looking for any rules that block specific IP addresses or traffic on specific ports (such as port 22 for SSH traffic).

Try to access the computer using the IP address from a different device or location. If the connection is refused or times out, it could be an indication that the IP address is being blocked.

Try to connect to the computer using SSH from a different device or location. If the connection is refused or times out, it could be an indication that SSH traffic is being blocked.

Check the system or application logs for any error messages or alerts related to blocked IP addresses or traffic.

To prevent a host from being allowed to access a system for SSH, I would do the following:

Configure the firewall to block incoming traffic on port 22 from the specific IP address or range of IP addresses.

Configure the SSH server to only accept connections from specific IP addresses or ranges of IP addresses.

Use an intrusion detection system (IDS) or intrusion prevention system (IPS) to monitor and block attempts to connect to the SSH server from unauthorized IP addresses or ranges of IP addresses.

Use access control lists (ACLs) to limit access to the SSH server to specific users or groups of users.

Use a combination of these methods for maximum security, such as using a firewall to block traffic from unauthorized IP addresses, and then using access controls to limit the users that can connect to the server once the traffic is allowed.

HACK ATTACK (MyPltw) MIT app inventor (1.2.2) - I need help on doing the actual hacking algorithm. If someone has done it before please show me how. These blocks are the ones that need to be edited.

HACK ATTACK (MyPltw) MIT app inventor (1.2.2) - I need help on doing the actual hacking algorithm. If

Answers

Answer: 1.4.3.6.2  Is the order they should be in from there!!!

Explanation:

What is the largest software application on a computer?

Answers

Answer:

Mac OS X I believe

Answer: Mac OS X is considered to be the largest operating system ever written. It contains over 85 million lines of codes.

Explanation:

What is the purpose of the property, transition-timing-function?
It sets how many times a transition will play.
It delays the start of a transition by a set number of seconds.
It changes the speed at different stages of the transition.
It adds a pause between steps in an animation.

Answers

Answer:

It changes the speed at different stages of the transition.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations that a web page displays.

Basically, the purpose of the property, transition-timing-function is that It changes the speed at different stages of the transition. Thus, it states the values between the beginning and ending of a transition are calculated over its duration.

why are peer-to-peer networks more at risk for security breaches that can cause network connectivity issues?

Answers

They are like open doors through which you have given the users of the P2P network access to your machine. Sure, there are some limitations to the access other users of the network can have, but, these open ports can become an easy point of entry for attackers trying to gain access to your machine or your network

-------------------------------------------------------------------------------------------------------------

                                                                                                   hope this helps!

Display all tables within the PivotTable Fields List and select the Total Book Sales from the BOOKS table.

Answers

Note that the process to executing the above such as displaying PivotTable is given below.

How can one execute the above?

Open Microsoft Excel and click on the "Insert" tab.Click on "PivotTable" and select "PivotTable" from the drop-down menu.In the "Create PivotTable" dialog box, select the "Use an external data source" option and click "Choose Connection".Select the data source containing the BOOKS table and click "Open".In the "Create PivotTable" dialog box, select the "New Worksheet" option and click "OK".The PivotTable Fields List will appear on the right-hand side of the screen. Under the "Tables" section, all the available tables will be displayed.Find the BOOKS table and expand it to see all the available fields.Check the box next to "Total Book Sales" to add it to the Values section of the PivotTable Fields List.Drag and drop the "Total Book Sales" field to the "Values" box to create a new PivotTable with the total book sales.

Learn more about PivotTable at:

https://brainly.com/question/29817099

#SPJ1

JavaCalculate the ChangeProgramming challenge description:The goal of this question is to design a cash register program. Your register currently has the following notes/coins within it:One Pence: .01Two Pence: .02Five Pence: .05Ten Pence: .10Twenty Pence: .20Fifty Pence: .50One Pound: 1Two Pounds: 2Five Pounds: 5Ten Pounds: 10Twenty Pounds: 20Fifty Pounds: 50The aim of the program is to calculate the change that has to be returned to the customer with the least number of coins/notes. Note that the expectation is to have an object-oriented solution - think about creating classes for better reusability.Input:Your program should read lines of text from standard input (this is already part of the initial template). Each line contains two numbers which are separated by a semicolon. The first is the Purchase price (PP) and the second is the cash(CH) given by the customer.Output:For each line of input print a single line to standard output which is the change to be returned to the customer. If CH == PP, print out Zero. If CH > PP, print the amount that needs to be returned (in terms of the currency values). Any other case where the result is an error, the output should be ERROR.The output should change from highest to lowest denomination.Test 1Test 1 Input11.2520Expected OutputFive Pounds, Two Pounds, One Pound, Fifty Pence, Twenty Pence, Five PenceTest 2Test 2 Input8.7550Expected OutputTwenty Pounds, Twenty Pounds, One Pound, Twenty Pence, Five PenceTest 3Test InputDownload Test 3 Input2010Expected OutputDownload Test 3 InputERRORCode below:please fill the functions and or classes here. thank you for help.import java.io.BufferedReader;import java.io.IOException;import java.io.InputStreamReader;import java.nio.charset.StandardCharsets;public class Main {/*** Iterate through each line of input.*/public static void main(String[] args) throws IOException {InputStreamReader reader = new InputStreamReader(System.in);BufferedReader in = new BufferedReader(reader);try {double purchasePrice = Double.parseDouble(in.readLine());double cash = Double.parseDouble(in.readLine());Main.calculateChange(purchasePrice, cash);} catch (Exception e) {System.out.println(e);}}public static void calculateChange(double purchasePrice, double cash) {// Access your code here. Feel free to create other classes as required}}

Answers

Answer:

i dont know

Explanation:

Can you make the wording more clear?

Tuesday
write the
correct
answer
Text can be celected using
2 A mouse
device of
is
ch
3 Scrolls bars are
buttons which assist
upwards downwards
sideways to
skole

Answers

Answer:

?

Explanation:

these are instructions to a question?

10. As a simple pendulum swings back and forth, the forces acting on the suspended object are the gravitational force, the tension in the supporting cord, and air resistance. (a) Which of these forces, if any, does no work on the pendulum? (b) Which of these forces does negative work at all times during its motion? (c) Describe the work done by the gravitational force while the pendulum is swinging.​

Answers

Solution

(i) Answer (b). Tension is perpendicular to the motion. (ii) Answer (c). Air resistance is opposite to the motion.

Answer:

Hey there! It looks like you’re asking about the forces acting on a simple pendulum. Here’s what I know:

(a) The tension in the supporting cord does no work on the pendulum because the force is always perpendicular to the direction of motion.

(b) Air resistance does negative work at all times during the pendulum’s motion because it always opposes the motion.

© The work done by the gravitational force while the pendulum is swinging depends on the position of the pendulum. When the pendulum is at its highest point, the gravitational force does no work because it is perpendicular to the direction of motion. As the pendulum swings downward, the gravitational force does positive work because it is in the same direction as the motion. When the pendulum reaches its lowest point and starts to swing upward, the gravitational force does negative work because it opposes the motion.

Give an example on how does information system works. Explain your answer

Answers

Answer:

Information systems are used to run interorganizational supply chains and electronic markets. For instance, corporations use information systems to process financial accounts, to manage their human resources, and to reach their potential customers with online promotions.

Explanation:

i need help asp

Samar’s team has just started to go through their checklist of game items to see if

it is ready to proceed. What stage of the production cycle is Samar’s team

currently in?


beta

gold

pre-alpha

post-production

Answers

Samar’s team has just started to go through their checklist of game items to see if it is ready to proceed. The stage of the production cycle that Samar’s team is currently in is: "Post Production" (Option D)

What is production Cycle?

The manufacturing cycle includes all actions involved in the transformation of raw materials into final commodities. The cycle is divided into various stages, including product design, insertion into a production plan, manufacturing operations, and a cost accounting feedback loop.

The production cycle of a corporation indicates its capacity to turn assets into earnings, inventory into goods, and supply networks into cash flow. The manufacturing cycle is one component of a larger cycle length that includes order processing time and the cash-to-cash cycle.

It should be mentioned that production is the process of integrating several materials and immaterial inputs (plans, information) to create something for consumption (output). It is the act of producing an output, such as an item or service, that has value and adds to people's utility.

Learn more about production cycle:
https://brainly.com/question/13994503
#SPJ1

Recognizing a problem exists and taking action to resolve it is an example of _____.

initiative
compromise
diplomacy
communication

Answers

The answer is compromise

Answer:

Initiative

Explanation:

just completed on edg 2021

asdcvnmn bvcdxszasdfghjk.

Answers

Answer:

fewrugbrubpwerivrib

Explanation:

vbhresibvhresiupvkbjriururbvurfiuibvuefsbiuiuvuib

xamine the following output:

Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115

Which of the following utilities produced this output?

Answers

The output provided appears to be from the "ping" utility.

How is this so?

Ping is a network diagnostic   tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).

In this case, the output shows   the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.

Ping is commonly used to troubleshoot   network connectivity issues and measureround-trip times to a specific destination.

Learn more about utilities  at:

https://brainly.com/question/30049978

#SPJ1

write a function buckets(equiv, lst) that partitions a list into equivalence classes. that is, buckets (equiv, lst) should return a list of lists where each sublist in the result contains equivalent elements, where two elements a and b are considered equivalent if equiv (a, b) returns true. for example: buckets (lambda a, b : a == b, [1,2,3,4]) [[1], [2], [3], [4]] buckets (lambda a, b : a == b, [1,2,3,4,2,3,4,3, 4]) [[1], [2, 2], [3, 3, 3], [4, 4, 4]] buckets (lambda a, b: a % 3 b% 3, [1,2,3,4,5, 6]) [[1, 4], [2, 5], [3, 6]] == In the examples above, we have used the key word lambda to lead to an anounymous function passed to equiv . The order of the buckets must reflect the order in which the elements appear in the original list. For example, the output of buckets (lambda a, b : b, [1,2,3,4]) should be [[1], [2],[3],[4]] and not [[2], [1], [3],[4]] or any other permutation. a == The order of the elements in each bucket must reflect the order in which the elements appear in the original list. For example, the output of buckets (lambda a, b : a % 3 == b % 3, [1,2,3,4,5,6]) should be [[1;4],[2;5),(3;6]] and not [[4;1],[5;2], [3;6]] or any other permutations. Assume that the comparison function equiv: l'a -> 'a -> bool) is commutative, associative and idempotent. (We had this problem before in Assignment 2.) def buckets (equiv, lst): # YOUR CODE HERE == assert (buckets (lambda a, b : a b, [1,2,3,4]) [[1], [2], [3], [4]]) assert (buckets (lambda a, b : a == b, [1,2,3,4,2,3,4,3, 4]) [[1], [2, 2], [3, 3, 3], [4, 4, 4]]).

Answers

An SML function that, when given a list of general elements, rearranges the elements into comparable classes and outputs a list of those classes (type "a list list).

Keep the classes' elements in the same order as they were in the initial list. A provided function determines whether two elements are equivalent and returns true if they are or false if they are not. I'm having trouble grasping the answer.

enjoyable example x y = x Equals y

Fn: ("a -> "a -> bool) -> "a list -> "a list list; required type

fun srt listoflists func new =

       case listoflists of [] => [[]]

        |  a::b => if func (new, hd a) = true then (new::a)::b

                   else if func (new, hd a) = false then a::(srt b func new) else [new]::a::b

Learn more about elements here-

https://brainly.com/question/29659345

#SPJ4

Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. What inputs and outputs are needed to support the storage environment

Answers

Answer:

Pros of cloud storage

Files can be accessed remotely without having to be connected to a company's intranetSecurity and file backups are managed by the cloud storage company, frees up employees time applying updates and other maintenance tasks.Usually billed monthly which allows for a lower initial startup cost

Cons of cloud storage

File security relies upon trust in the cloud storage providerLong term cost could be higher than storing files yourselfRequires an internet connection to access files

Which wireless standard runs on both the 2.4 and 5 GHz frequencies?

Answers

Answer:

Approved in 2009, Wi-Fi 4 enables operation in both the 2.4 and 5 GHz frequencies, a game changer at the time. It was the first standard to use MIMO (Multiple In, Multiple Out) and offered better speed, 300 Mbps, better range, more resistance to interference and backward compatibility with Wi-Fi 2 and

Hope this is helpful to you.......

Other Questions
Geometry Question Need help asap :( A recent conference had 900 people in attendance. In one exhibit room of 80 people, there were 65 teachers and 15 principals. What prediction can you make about the number of principals in attendance at the conference? There were about 820 principals in attendance. There were about 731 principals in attendance. There were about 208 principals in attendance. There were about 169 principals in attendance. For the value of the sum, enter an expression that gives the exact value, rather than entering an approximation.A.-12 + 4 4/3 +4/9 4/27 +4/81 - = -12/(1+1/3)B. (1/3)^n = 6*1/3^6(1/3^11-1)/(1/3-1) CAN SOMEONE HELP WITH THIS QUESTION? Find the perimeter of a triangle with sides of 1/12 meter 5/12 meter and 11/12 meter write your answer as a mixed number what does a thesis statement do?- it shows readers that the writer knows the topic well. - it tells readers what the report will show or prove. - it gives readers a general idea of what a reports topic is. - it tells the writer what topic should be researched. I need help with this please Blue Spruce Inc. acquired 20% of the outstanding common shares of Gregson Inc. on December 31, 2019. The purchase price was $1.031.700 for 54,300 shares, and is equal to 20% of Gregson's carrying amount. Gregson declared and paid a $0.75 per share cash dividend on June 15 and again on December 15, 2020. Gregson reported net income of $546,000 for 2020. The fair value of Gregson'sshares was $23 per share at December 31, 2020. Blue Spruce is a public company and applies IFS. . Prepare the journal entries for Blue Spruce for 2019 and 2020, assuming that Blue Spruce cannot exercise significant influence over Gregson. The investment is accounted for using the FV-OCI model. effective managers remember that nobody knows the inner detailed workings of a job better than do human resources. Using fluorescent imaging techniques, researchers observed that the position of binding sites on HIV peptides is approximately Normally distributed with a mean of 2.45 microns and a standard deviation of 0.35 micron. What is the probability that a binding site position is between 2.0 and 3.0 microns, approximately samantha rodriguez had gross earnings for the pay period ending 10/15/19 of $5,785. her total gross earnings as of 9/30/19 were $116,700. social security taxes are 6.2% on a maximum earnings of $122,700 per year. the social security tax due by her employer from her 10/15/19 paychecks is: rev: 11 24 2017 qc cs-110442 Which president was pardoned ""for all offenses against the united states which he. . . has committed or may have committed""? Please help me and Ill give you brainiest make sure to explain :) A brilliant young golfer loses 15% of the tournaments she enters. We will assume the results of each tournament are independent of other tournaments.If she enters 20 tournaments this year, what is the probability she will win all of them? (round to the third decimal place) What exclusions to homeowners insurance are typically an issue for Houston residents? How can those risks be mitigated? What loss control measures can individuals take to protect their home and auto in an increasingly dangerous city?Provide an example of a situation that a business owner might need to use their BPP policy. i also need and answer for this one Help&EXPLAIN!Dont use for points or will take it back Which of the following is not part of the Occupational Safety and Health Act?a.Gives broad powers to the Secretary of Labor to encourage states in their efforts to assure safe and healthful working conditions.b.Gives broad powers to the Secretary of Labor for research, information, education, and training in the field of occupational safety and health. c.Establishes basic duties for all citizens.d.Contains a method for any interested party to submit a proposal for additions or modifications to the current occupational safety and health standards.e.Establishes the Occupational Safety and Health Review Commission. Which of the following is NOT a proper action to do when the hockey puck/ball comes to you? Tutankhamen was an old man when he became Pharaoh of Egypt.TrueFalse