segments applied to reports can analyze data for which of the following groups? (select all answers that apply) users 25 to 34 years of age who have their browser set to spanish users who viewed a webpage, then watched a video users who engaged in social media or email campaigns users who have children under the age of 18 2. custom segments may be created using which criteria? (select all answers that apply)

Answers

Answer 1

Custom segments may be created using Dimensions, Metrics and Session dates and Sequences of user actions.

What is business metric?

A business metric is a quantitative indicator used to monitor and evaluate the progress or effectiveness of a particular company function. Metrics are used to monitor progress toward both short- and long-term goals and objectives.

KPIs use metrics as their primary unit of measurement. Key performance indicators, or KPIs, are metrics that include a target and a timeline. KPIs are the action; metrics are the measurement. In business management, operational control includes metrics.

Therefore, Custom segments may be created using Dimensions, Metrics and Session dates and Sequences of user actions.

To lean more about metrics from the given link:

brainly.com/question/6027175

#SPJ1


Related Questions

Section A: A(n) is a collection of information, generally stored as computer files. The information it contains can be stored, updated, organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as a(n) file. A(n) file use

Answers

Answer:

A database is a collection of information, generally stored as computer files. The information it contains can be stored, updated,  organized, output, distributed, searched, and analyzed. A filing cabinet full of folders and papers would be classified as an unstructured file. A structured file uses a uniform format to store data for each person or thin in the file

Explanation:

A database is a systematically structured collection of data or information that is usually digitally and electronically stored within an computer

Unstructured files are large number of files that are not stored based on structural properties, or kept in an organized format

Structured file are files that are keeps data in a uniform organized structural format

Given an array declared to hold 100 values, the largest index that can be used with the array is:____.

Answers

Given an array displayed to hold 100 values, the largest index that can be utilized with the array exists at 99.

What is an array?

An array style exists as a user-defined data style consisting of an ordered set of elements of a single data type. An ordinary array style contains a specified upper bound on the number of elements and utilizes the ordinal position as the array index.

An array exists as a data structure, which can store a fixed-size collection of elements of the exact data type. An array exists utilized to keep a collection of data, but it exists often additional helpful to think of an array as a group of variables of the exact style.

When an array of objects exists displayed but is not initialized, the array values exist set to null. A sorting algorithm exists as a method for scanning through an array and rearranging its contents in some exact order. If a[] and b[] exist in two integer arrays, the expression a == b resembles the array contents.

To learn more about array refer to:

https://brainly.com/question/24275089

#SPJ4

On a scale of 1-10 how would you rate your pain

Answers

Explanation:

There are many different kinds of pain scales, but a common one is a numerical scale from 0 to 10. Here, 0 means you have no pain; one to three means mild pain; four to seven is considered moderate pain; eight and above is severe pain.

What is the dark, sticky substance that forms when tobacco is burned?

Answers

Answer: Tar.

Explanation:

A chemical substance made when tobacco is burned. Tar contains most of the cancer-causing and other harmful chemicals found in tobacco smoke. When tobacco smoke is inhaled, the tar can form a sticky layer on the inside of the lungs.

A scientific theory can never be disproven. true or false

Answers

Answer:

false

Explanation:

I just think its false because a theory hasn't become a law and laws cannot be disproven.

Hope this helped!

:)

The area of the spreadsheet highlighted in red is the _____.

cell C1

formula bar

row C

column C

Answers

A spreadsheet is a software application which is used to display numerical data in a tabular form. It has further functions which includes organizing, displaying, calculating data, etc where the data can be viewed at a glance and retrieved from memory.

There are different types of spreadsheet which includes:

G00gle SheetMicrosoft ExcelLibreOfficeSmartsheet, etc.

Data can be arranged in rows and columns.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more here:

https://brainly.com/question/22101774

Answer:

column C

Explanation:

i got it right

Crack the secret message: Crrp, Crrp, Crrp Zh’uh jrlqj wr wkh prrq. Li brx zdqw wr wdnh d wuls, Folpe derdug pb urfnhw vkls. (hint: the original letters were shifted,for example if it is shifted by 1 that means Z becomes A , A becomes B, etc. You need to know the number of shifts)

Answers

Answer:

Zoom, Zoom, Zoom We’re going to the moon. If you want to take a trip, Climb aboard my rocket ship.

Explanation:

I got it. This is a caesar cipher with 3 shifts.

PLEASE HELP IM GIVING BRAINLIEST!!

Create properly formatted works cited page for a research paper about the dangers of cell phone use on the road. Follow the MLA citation format, and make sure to correctly italicize each citation. For the purpose of this activity, it is not necessary to observe the MLA rules for indentation. Use the six sources provided to support the research paper.

Answers

Answer:

Cell phone use causes traffic crashes because a driver's cognitive performance significantly decreases when they are using a cell phone. Texting is also dangerous because the driver is taking their eyes away from the road and their hands away from the wheel. Driving demands a high level of concentration and attention.

Explanation:

PLz brainlyest

1.What are the importance of installation procedures of Windows 7?

Answers

Answer:

Check System Requirements

Check Hardware and Software Compatibility

Determine Disk Partitioning Options

Complete a Pre-Installation Checklist

Explanation:

what are the key features of the point-to-point protocol (ppp)? (choose three) can authenticate devices on both ends of the link. can be used on both synchronous and asynchronous serial links. establishes, manages, and tears down a call. does not carry ip as a payload

Answers

C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.

Thus, It was used to re-implement the Unix operating system's kernel. C increasingly gained popularity in the 1980s.

With C compilers available for almost all current computer architectures and operating systems, it has grown to be one of the most popular programming languages.

The imperative procedural language C has a static type system and supports recursion, lexical variable scoping, and structured programming. It was intended to be compiled, with minimal runtime assistance, to offer low-level memory access and language constructs that easily map to machine instructions.

Thus, C, a replacement for the programming language B, was initially created by Ritchie at Bell Labs between 1972 and 1973 to create utilities for Unix.

Learn more about C, refer to the link:

https://brainly.com/question/30905580

#SPJ4

in static MOs design, the pull-up network (PUN) contiprises • PMOS and NMOS transistors • None of the above • PMOS transistors only • NMOS transistors only

Answers

In static MOs design, the pull-up network (PUN) typically comprises both PMOS and NMOS transistors. The purpose of the PUN is to provide a path for current flow and to pull the output voltage up to a high level when the input signal is low.

The PMOS transistors are used to connect the output to the power supply voltage when the input is low, while the NMOS transistors are used to connect the output to the ground when the input is high. This combination of PMOS and NMOS transistors allows for efficient operation and helps to ensure proper logic levels in the circuit. Therefore, the correct answer is "PMOS and NMOS transistors."

To know more about network visit:

https://brainly.com/question/15002514

#SPJ11

What kind of careers do you know about that are technology related?
son

Answers

Engineering ::::)))))
Software developer.
IT manager.
Web developer.
Database administrator.
Information security analyst.
Computer systems analyst.
Computer network architect.
Computer systems administrator.

a) Based on the information for your project, suggest three different conceptual models for your system. You should consider each of the aspects of a conceptual model discussed in this Chapter 11: interface metaphor, interaction type, interface type, activities it will support, functions, relationships between functions, and information requirements. Of these conceptual models, decide which one seems most appropriate and articulate the reasons why. steps. (b) Produce the following prototypes for your chosen conceptual model: (i) (ii) Using the scenarios generated for your topic, produce a storyboard for the chosen task for one of your conceptual models. Show it to two or three potential users and get some informal feedback. Now develop a card-based prototype from the use case for the chosen task, also incorporating feedback from part (i). Show this new prototype to a different set of potential users and get some more informal feedback. (c) Consider your product's concrete design. Sketch out the relevant designs. Consider the layout; use the colors, navigation, audio, animation, etc. While doing this use the three main questions introduced in Chapter 6 as guidance: Where am I? What is here? Where can I go? Write one or two sentences explaining your choices, and consider whether the choice is a usability consideration or a user experience consideration. (d) Sketch out an experience map for your product. Create the necessary scenarios and personas to explore the user's experience. In particular, identify any new interaction issues that you had not considered before, and suggest what you could do to address them. (e) How does your product differ from applications that typically might exists? Do software development kits have a role? If so, what is that role? If not, why do you think not?

Answers

The paragraph outlines various tasks involved in developing a system, including conceptual models, prototypes, interface design, experience mapping, uniqueness of the product, and the role of software development kits (SDKs), but specific details are required to provide a comprehensive explanation.

What is the overall explanation of the given paragraph about system development, interface design, and user experience considerations?

The given paragraph outlines a series of tasks related to developing a system, including suggesting conceptual models, creating prototypes, designing the interface, developing an experience map, and discussing the product's uniqueness and the role of software development kits (SDKs).

The tasks mentioned in the paragraph belong to the domain of system development, user interface design, and user experience considerations. Each task involves different steps and methodologies to ensure the development of an effective and user-friendly system.

These steps may include conceptualizing different models, creating prototypes, gathering user feedback, designing the interface layout, considering usability and user experience factors, and addressing potential interaction issues.

To provide a detailed explanation, it would be necessary to have specific information about the project, such as the nature of the system, the target users, their goals and tasks, and the project's requirements and constraints. Without such information, it is not possible to provide a meaningful and contextually relevant explanation.

Learn more about system

brainly.com/question/19843453

#SPJ11

in a , you need to create a new pc with a mirrored 2 hard drive configuration from the choices. your primary concern is redundancy with a secondary requirement of 1tb fast data access. write speed is not an issue. you may use a drive more than once or not at all. choose the 2 disks that meet your requirements

Answers

To create a new computer based on the requested requirements, the two hard drives they select:

Solid state drive (SSD)Hybrid hard drive (SSHD)

Solid state drive vs Hybrid hard drive

The access time is the time required for the computer to access the requested data from the hard drive, Solid state drives (SSD), having no moving parts inside, have much faster and more consistent access times, however, once the hard drive accesses the data, the transfer time may vary, but A hybrid hard drive (SSHD) is a storage unit that combines the high storage capacity of a hard drive with the faster read/write speed of an SSD.

For more about hard drives here https://brainly.com/question/28098091

#SPJ4

2. Say whether these sentences are True or False. a. Input is the set of instructions given to a computer to change data into information. the form of words numbers, pictures, sounds .it is true or false​

Answers

Answer:

I think it is false bcz the set of instruction given to computer is program.

A program that converts a program to binary all at once and runs the entire program when finished with the conversion.

Answers

Answer:

A program that converts a program to binary

all at once and runs the entire program when

finished with the conversion is known as a

compiler.

Explanation:

A Compiler is a computer program that

transfornms a whole program into machine

code at once. The compiler does this

by converting source codes written in

a programming language to another

programming language such as:

assembly language,

object code etc.

The compiler does this in order to build an

executable program.

1. Word Module 2 SAM Textbook Project

2. Word Module 2 SAM Training

3. Word Module 2 SAM End of Module Project 1

4. Word Module 2 SAM End of Module Project 2

5. Word Module 2 SAM Project A

6. Word Module 2 SAM Project B

Answers

The raise To Power Module of the program's calling error can be found in the real and integer values of the argument variables.

String should be spelled Sting. The set Double Module instead of returning an integer, does such. Access to local variables declared in the Main module is restricted to that module only. The raise To Power Module of the program's calling argument variables' real and integer values can be used to pinpoint the issue. Although the arguments for the raise To Power Module (Real value and Integer power) have been defined. The integer power is represented as "1.5," and the real value is supplied as "2." A real number, on the other hand, is a number with a fractional part. thus, a number without a fraction is considered an integer. 1.5 is a real number, whereas 2 is an integer. The parameters' contents when invoking raise To Power.

Learn more about The raise To Power Module here:

https://brainly.com/question/14866595

#SPJ4

A(n) ____________________ is a software tool that examines and reports about vulnerabilities on local and remote hosts.

Answers

A vulnerability scanner is a software tool that examines and reports vulnerabilities on local and remote hosts.

A vulnerability scanner is designed to identify weaknesses or flaws in computer systems, networks, or applications that could be exploited by attackers. It scans the system or network for known vulnerabilities and provides a detailed report on the findings.

Here's how a vulnerability scanner works:

1. Scanning: The vulnerability scanner scans the system or network, searching for vulnerabilities such as missing patches, misconfigurations, weak passwords, or outdated software.

2. Identification: When a vulnerability is found, the scanner identifies the specific issue and provides details about its severity, impact, and recommended actions to mitigate the risk.

3. Reporting: After the scanning process is complete, the vulnerability scanner generates a report that includes a list of vulnerabilities discovered, their severity levels, and suggested remediation steps. This report helps system administrators or IT teams prioritize and address the identified vulnerabilities.

4. Remediation: Once the vulnerabilities are identified, the necessary actions can be taken to fix or mitigate them. This may involve applying patches, updating software, reconfiguring settings, or strengthening security measures.

By using a vulnerability scanner, organizations can proactively identify and address security weaknesses before they can be exploited by malicious actors. Regular scanning and remediation can help ensure the security and integrity of computer systems, networks, and applications.

Overall, a vulnerability scanner is a valuable software tool for assessing the security posture of systems and networks by identifying and reporting vulnerabilities.

To know more about the word vulnerability, visit:

https://brainly.com/question/30296040

#SPJ11

explain four types of educational software​

Answers


Graphic Software
Reference Software
Desktop Publishing
Tutorial Software

Answer: Below

Explanation:

1. Authoring Software.

This aids teachers in the creation of their own instructional software. They could create electronic flash cards out of index cards to teach specific concepts to children. They could also create multimedia content such as lessons, reviews, and tutorials. One could even consider web alternatives, because web authoring systems assist teachers in creating multimedia content for use on a website.

2. Tutorial Software.

Teachers could use tutorial software to teach students new lessons and provide them with a platform to learn at their own pace. Giving students new information to learn, giving them time to practice it, and evaluating their performance is what tutorial software is all about.

3. Computer simulations

Teachers can use simulation software to teach students virtually. Students, for example, could use this software to gain flight experience.

4 Pieces of Utility Software

A utility software program assists teachers in the creation of quizzes, tests, and even serves as a grading book. Non-tech teachers would find this software simple to learn and use.

addressing information overload means more than just deleting emails; it can also include dealing with threats to your privacy and to the overall security of your computer. group of answer choices true false

Answers

The statement "Addressing information overload means more than just deleting emails; it can also include dealing with threats to your privacy and to the overall security of your computer" is true.

What is information overload?

Information overload refers to a situation in which a person receives too much information and is unable to process or handle it effectively. It occurs when the amount of data received exceeds a person's processing capacity or ability to handle it efficiently. Because of the vast amounts of information available online, people frequently experience information overload.

The answer to the question is true because dealing with threats to your privacy and to the overall security of your computer is one of the essential ways to address information overload. Addressing information overload goes beyond simply deleting emails; it also entails managing data privacy, ensuring data security, and employing various techniques to handle data efficiently.

Learn more about information overload :https://brainly.com/question/14975235

#SPJ11

when copying and pasting records from one table to another, the records must first be copied to the

Answers

When copying and pasting records from one table to another, the records must first be copied to the clipboard.

In order to  copy and paste records from one table to another, follow the given steps :
1. Select the records you want to copy from the source table.
2. Copy the selected records to the clipboard (you can use Ctrl+C or right-click and choose "Copy").
3. Navigate to the destination table where you want to paste the records.
4. Click on the cell where you want to start pasting the records.
5. Paste the records from the clipboard (you can use Ctrl+V or right-click and choose "Paste").

This process ensures that you are accurately transferring data between the two tables.

To learn more about copying and pasting visit : https://brainly.com/question/1092681

#SPJ11

Correct all the mistakes in the following sentence:

When you proofread look for punctuation spelling and Capitalization Mistakes.

Answers

Answer:

When you proofread, look for punctuation, spelling, and capitalization mistakes.

Explanation:

Answer:

When you proofread, look for punctuation, spelling, and capitalization mistakes.

:]

On larger computers such as servers, a volume can span multiple physical secondary storage devices.

a. true
b. false

Answers

On larger computers such as servers, a volume can span multiple physical secondary storage devices is True.

What is a volume?

A volume is a logical unit of storage that can be made up of multiple physical disks. This is often done on larger computers such as servers to increase the available storage space and improve performance. When a volume spans multiple disks, the data is striped across the disks, which can improve performance by spreading the read and write operations across multiple disks.

There are a number of different ways to create a volume that spans multiple disks. One common method is to use a RAID controller. A RAID controller is a hardware device that manages the disks in a RAID array.

Find out more on secondary storage devices here: https://brainly.com/question/20600657

#SPJ4

FIRST PERSON GETS BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!
Why did Jean get an error when he tried to use the variable my Grade? Variables should be one word. Variables should start with a number. Variables should always be camelcase. Variables should not have spaces.

Answers

Answer:

Variables should not have spaces

Explanation:

When you have a multi-word variable, it is convention to leave the first word lowecase  and make the first letter of the next words capital. However, mostly every programming language does not allow primitive variables with spaces.

ex: myWordVariable = 5

Answer:

variables should not have spaces.

Explanation:

It is basic knowledge that variables should not have spaces also its listed in the lesson page if you are using flvs of stuff to not use in variables. also you  never use any of python keywords

Never name a variable with any of python’s keywords  

Python Keywords    

False  

None  

True  

and  

as  

assert  

break  

class  

continue  

def  

del  

elif  

else  

except  

finally  

for  

from  

global  

if  

import  

in  

is  

while  

try  

or  

pass  

print    

return    

with    

Global  

What is UNIX?

A program for writing documents
A graphical interface
An internet browser
An operating system

Answers

Answer:

UNIX is an operating system.

Unix is a multiuser multitasking operating system (OS).

what is the use of <input> tag ?​

Answers

Answer: The input tag is used within form element to declare input controls that allow users to input data. An input field can be of various types depending upon the attribute type. The Input tag is an empty element which only contains attributes.

Explanation:

The HTML <input> tag is used within a form to declare an input element − a control that allows the user to input data. Three ATTRIBUTES are :

form

list

readonly

Explanation:

An input field can vary in many ways, depending on the type attribute.

<input> elements are used within a <form> element to declare input controls that allow users to input data

The <input> tag specifies an input field where the user can enter data. <input> elements are used within a <form> element to declare input controls that allow users to input data.

The 3 attributes are :

<input form=""> :  The value of this attribute must be the id attribute of a <form> element in the same document.

<input list="datalist_id"> : Specifies the id of the datalist to bind the <input> element to a specific list.

<input readonly> : The readonly attribute is a boolean attribute.  When present, it specifies that an input field is read-only.  The readonly attribute can be set to keep a user from changing the value until some other conditions have been met

you have just acquired a new program for use in the production environment. you have installed the program onto the necessary workstations, however, the program cannot yet be accessed by the employees. which practice is this demonstrating?

Answers

The scenario you described is demonstrating the practice of deploying a software program in a production environment.

After acquiring a new software program, the next step is to install it on the necessary workstations. However, simply installing the program is not enough to make it accessible to the employees. Further steps are needed to configure the program, set up user accounts and permissions, and integrate it with the existing production environment.

The process of making a new program accessible to employees is known as deployment. Deployment includes the tasks involved in preparing a new program for use in a production environment, including installation, configuration, testing, and rollout to end-users. A successful deployment ensures that the program is functional, secure, and user-friendly for the employees who will be using it.

Learn more about software program:

https://brainly.com/question/28224061

#SPJ4

NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.

Answers

Answer: B

Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.

If a grouped object has a shape that needs to be changed, you can

Answers

Answer:

You can change shapes in many of the standard Microsoft 365 or Microsoft 365 programs. When you do so, all the existing attributes of the original shape (such as the color, border, or any text in the shape) remain the same after the change.

365, 2021:

1. Select the shape.

2. Go to Shape Format and near the left end, select  Edit shape button Edit Shape.

3. Select Change shape button Change Shape, then choose another shape from the gallery.

Office 2010-2019:

1. Click the shape that you want to change.

2. Under Drawing Tools, on the Format tab, in the Insert Shapes group, click Edit Text Button  If you do not see the Drawing Tools or Format tabs, make sure that you selected a shape. To change multiple shapes, press and hold Shift while you click the shapes that you want to change.

3. Under Text Box Tools, on the Format tab, in the Text Box Styles group, click Change Shape, and then click the shape that you want.

Mac 365, 2021:

1. Select the shape.

2.Go to the Shape Format tab, and near the left end, select  Edit shape button Edit Shape.

3.Select Change shape button Change Shape, then choose another shape from the gallery.

Explanation:

I hope this helped :) If it does could you please mark me brianliest?

James is writing a program in C++ and forgets to put curly braces where they are supposed to be. James will see a message about which of the following when the program is run? database error variable error binary error syntax error

Answers

Answer:

syntax error

Explanation:

curly braces demarkate code blocks. omitting them and code may violate the syntax, hence produce a syntax error.

Other Questions
the elements of a crime are those aspects or parts of the crime that the defense must prove in order for the defendant to be found not guilty. group of answer choices true false underlined the compound noun in each sentence. my great grandfather is living with us. What is the area of deadweight loss?a.the rectangle (A-C)*X plus the triangle 1/2[(A-C)*(Y-X)]b.the rectangle (A-C)*Xc.the triangle 1/2[(A-B)*(Y-X)]d.the triangle 1/2[(A-C)*(Y-X)] there are now fewer cross-cultural missionaries from the west than cross-cultural missionaries from non-western or majority world countriestruefalse How are leaders of a theocracy selected What range of returns would you expect to see 68 percent of the time for this asset? What is the nth term rule of the quadratic sequence below?6,12,20,30,42,56,72,... By the early 1900's, many European countries as well as Japan extended their control over other lands and created empires. These countries were motivated to take over other lands On a fruit farm 1/3 of the trees are apple trees and 1/5 are lemon trees. The rest are fig trees. There are 90 trees in all. Q12 please please help group of people were probably the first to deliberately plant seeds? an asset impairment for assets to be held for sale is measured as the excess of the multiple choice question. accumulated depreciation less fair value. book value over the fair value less costs to sell. historical cost less fair value. A bond that occurs between metals and nonmetals is called a/an: Consider the following hypothesis test:H0: 27Ha: 27A sample of 50 provided a sample mean of 28.4. The population standard deviation is 6.a. Compute the value of the test statistic (to 2 decimals).b. What is the p-value (to 4 decimals)? Use the value of the test statistic rounded to 2 decimal places in your calculations.c. At = .01, what is your conclusion? (pick one)p-value is Selectgreater than or equal to 0.01, rejectgreater than 0.01, do not rejectless than or equal to 0.01, do not rejectless than 0.01, rejectequal to 0.01, do not rejectnot equal to 0.01, do not rejectItem 3 H0d. What is the rejection rule using the critical value? (pick one)Reject H0 if z is Selectgreater than or equal to 2.33greater than 2.33less than or equal to 2.33less than 2.33equal to 2.33not equal to 2.33Item 4What is your conclusion? (pick one)Select1.65 is greater than or equal to 2.33, do not reject1.65 is greater than 2.33, do not reject1.65 is less than or equal to 2.33, reject1.65 is less than 2.33, do not reject1.65 is equal to 2.33, reject1.65 is not equal to 2.33, do not rejectItem 5 H0 Commutative property Show two data points from your simulation that demonstrate this behavior. I1 V1 I2= 2I1 V2=2V1 V1/ I1 =V2/I2For the light bulb, why is it better to take more measurements in the range 20mA < I < 40mA, instead of just taking equally spaced measurements in the entire range of 0 mA < I< 55mA Can someone help me with this question please. HELP PLEASE WILL MARK BRAINLIEST!!!!!!! Mary Rhodes, operations manager at Northeast Furniture, received the following demand forecast: Jan: 1,000 Feb. 1,200 March 1,400 April 1,800May 1,800 June 1,600 Assume stockout costs for lost sales of $100 per unit, inventory carrying costs of $25 per unit per month and zero beginning and ending inventory. Evaluate the following two plans on an incremental cost basis: Alternative 1: Produce at a steady rate, equal to minimum requirements, of 1,000 units per month. Subcontract enough additional units, at $60 per unit premium cost, to avoid lost sales.a. What is the cost of alternative 1?b. What is the total holding (inventory) cost?Alternative 2: Vary the workforce to match monthly demand. The current workforce most recently produced 1,300 units last month. The cost of hiring workers is $3,00 per 100 units of capacity increase, while firing is $6,000 per 100 units of capacity decrease.a. What is the total cost of alternative 2?b. How many units are produced via regular time production?c. Which alternative has lower incremental cost? The light reactions of photosynthesis occur when light energy is absorbed by the chloroplasts of cells of photosynthetic organismsWhich of the following is produced during the light reactions?A.chemical energy in the form of ATP and NADPH.B.Carbn dioxideC.chemical energy in the form of glucoseD.light