T/F spatial data analysis is the application of operations to coordinate and relate attribute data.

Answers

Answer 1

True, spatial data analysis is the application of operations to coordinate and relate attribute data. This type of analysis helps to understand patterns, relationships, and trends within geospatial datasets.

Spatial analysis refers to studying entities by examining, assessing, evaluating, and modeling spatial data features such as locations, attributes, and relationships that reveal data’s geometric or geographic properties. It uses a variety of computational models, analytical techniques, and algorithmic approaches to assimilate geographic information and define its suitability for a target system.

Spatial analysis is relevant to astronomy, wherein the process is used to study, explore, and understand the position of the star system in our infinite cosmos. It is also a part of the chip fabrication process where ‘place and route algorithms’ are used to develop wiring structures and frameworks. Apart from these, spatial analysis is crucial in healthcare, agriculture, urban ecosystem management, disaster warning and recovery, supply chain and logistics modeling, and several other fields.

learn more about spatial data analysis here:

https://brainly.com/question/12603869

#SPJ11


Related Questions

what is DBMS?
create a table emp nd insert values

Answers

Answer:

A database is a collection of related data which represents some aspect of the real world. A database system is designed to be built and populated with data for a certain task.

Explanation:

Basic Syntax for CREATE

CREATE TABLE table_name

(

column1 datatype(size),

column2 datatype(size),

column3 datatype(size),

.....

columnN datatype(size),

PRIMARY KEY( one or more columns )

);

Example

create table emp(

empno number(4,0),

ename varchar2(10),

job varchar2(9),

mgr number(4,0),

hiredate date,

sal number(7,2),

deptno number(2,0)

PRIMARY KEY (ID)

);

Field Type Null Key Default Extra

EMPNO number(4,0) N0 PRI  

ENAME varchar2(10) YES – NULL

JOB  varchar2(9) NO – NULL

MGR number(4,0) NO – NULL

HIRE DATE date NO – NULL

SAL      number(7,2) NO – NULL

DEPTNO    number(2,0) NO – NULL

\( \huge \boxed{ \textbf{ {Answer : }}}\)

A database management system (DBMS) is system software for creating and managing databases. A DBMS makes it possible for end users to create, protect, read, update and delete data in a database.

━━━━━━━━━━━━━━━━━━━━━━━━

Example:-

Emp table :-

[ Create table ]

mysql-›create table emp ( id int ( 10 ) , name char ( 10 ) , sal int ( 10 ));

\( \: \)

Output:-

\(\begin{array}{ | c| c | c| } \hline\ \ \text{ \tt\purple{id} }& \text{ \tt \purple{name}} \text{ }& \text{ \tt \purple{sal} } \\ \hline \tt{}& \tt{}& \tt{} \\ \hline \tt{}& \tt{}& \tt{} \\ \hline \tt{}& \tt{}& \tt{} \\ \hline\end{array}\)

\( \: \)

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

[ Insert value ]

mysql-›insert into table emp ( id, name , sal ) values ( 101 , abc , 2500 ));mysql-›insert into table emp ( id, name , sal ) values ( 102 , xyz , 3500 ));mysql-›insert into table emp ( id, name , sal ) values ( 103 , pqr , 5000 ));

\( \: \)

Output:-

\(\begin{array}{ | c| c | c| } \hline\ \ \text{ \tt\purple{id} }& \text{ \tt \purple{name}} \text{ }& \text{ \tt \purple{sal} } \\ \hline \tt{101}& \tt{abc}& \tt{2500} \\ \hline \tt{102}& \tt{xyz}& \tt{3500} \\ \hline \tt{103}& \tt{pqr}& \tt{5000} \\ \hline\end{array}\)

━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━

hope it helps ⸙

How Can I add a image in an HTML program?​ please tell

Answers

Answer:

use the img tag

Explanation:

First of al, HTML is not a program, it is a markup language.

To add an image, use:

<img src="...url to the image...">

eMarketer, a website that publishes research on digital products and markets, predicts that in 2014, one-third of all Internet users will use a tablet computer at least once a month. Express the number of tablet computer users in 2014 in terms of the number of Internet users in 2014 . (Let the number of Internet users in 2014 be represented by t.)

Answers

This means that the number of tablet computer users will be one-third of the total number of Internet users in 2014. For example, if there are 100 million Internet users in 2014, the estimated number of tablet computer users would be approximately 33.3 million.

To express the number of tablet computer users in 2014 in terms of the number of Internet users (t), we can use the equation: Number of tablet computer users = (1/3) * t.

According to eMarketer's prediction, in 2014, one-third of all Internet users will use a tablet computer at least once a month. To express the number of tablet computer users in 2014 in terms of the number of Internet users (t), we can use the equation: Number of tablet computer users = (1/3) * t.

This means that the number of tablet computer users will be one-third of the total number of Internet users in 2014. For example, if there are 100 million Internet users in 2014, the estimated number of tablet computer users would be approximately 33.3 million.

It's important to note that this prediction is based on the assumption made by eMarketer and may not be an exact representation of the actual number of tablet computer users in 2014. Additionally, the accuracy of this prediction depends on various factors such as the adoption rate of tablet computers and the growth of the Internet user population.

learn more about computer  here

https://brainly.com/question/32297640

#SPJ11

Which of the following is a transition effect that seamlessly changes an object from slide to slide?

OSwitch transition
O Entrance and emphasis
O Motion path
O Morph transition

Answers

Answer:

Morph

Explanation:

edge 2022

_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care

Answers

Answer:

Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.

PLEASE HELP!!!! You have been hired by the Umbrella Corporation (main office in Texas) to help them set up a facility here in Northern Virginia. The Umbrella Corporation is a government contractor, and they have a variety of contracts that include non-secret information to the most secure.

The parent company has decided to create a subsidiary company called "Triton" which will be housed in this new Northern Virginia facility. This facility will house the following departments:

• Accounting - 2 People - Upper Right Desk Area

• Human Resources - 1 Person- Upper Right Desk Area

• Marketing - 1 Person - Center Desk Area

• Sales - 3 People - Left Right Desk Area

• IT -2 People - Center Desk Area

• Receptionist - 1 Person - Upper Center

• (Note: Not all Space is used - this will leave room for additional employees. The upper left is a conference room.)




Design of the office:

• The inner office has not yet been constructed but the plan is as follows:

o Outer offices have walls that go all the way up to the ceiling.

o Center offices are cubicles.

o The office itself has 4 floors – this facility is on the 3rd floor.

 1 & 2nd floor houses another company.

 4th floor is being rented by this company as well in plans for expansion.

 The floors are concrete and the ceilings are a drop-ceilings.

Strategic Goals:

Management has also asked that your plan is aligned with the strategic goals of the company which are focused on efficiency, security, and growth. Therefore, your network solution will need to be:

• Efficient and capable of supporting streamlined communications

• Secure and require minimum maintenance

• Scalable for future growth

What the company has so far:

• Computers for Each Employee

• Two printers to be shared by all employees

• A single server that handles all the e-mail, files, programs, etc.

This company is planning on serving the Federal Government with a variety of IT - using it's small business status to make end-roads into the various agencies. Its first contract is a contract with the Department of Defense.

Deliverable:

It is with this in mind, that they have asked you to make recommendations to the board about the following:

• Name and describe what type of network (LAN, WAN, BNs, etc.) do you think they should have?

o Why?

• Give the management – two different types of architectures they might be able to use.

o Then give them your recommendation on which one you think they should use.

 Outline the pros and cons of the two alternatives.

 Explain why that one would suit them better in the long-run than the other.

o What media would you suggest the company install in its office and why?

o What kind of Telecommunications would you recommend?

o After reviewing the facility plan:

 How would you recommend potentially reduce errors?

 Speed is a high-priority for this network, what would you recommend the company look at in order to ensure speed efficiency?

The company is in its first steps of creating a design plan and would like you to prepare a power point to explain to the upper management what you believe they will need for this facility.

Answers

Shsvevdhxhxhsbbsvxushsvshxbd dbjdkxiddbdbsj

1. Create a naive Bayes model for this data set.



2. What prediction will the naive Bayes model return for the query q=(1,0,0)?

Answers

Answer:

import the GaussianNB class from the scikit-learn naive bayes module using the import statement;

from sklearn.naivebayes import GaussianNB

create the classifier,

clf = GaussianNB()

Then train or fit a section of the dataset (the training set) with the classifier, then predict the label of the test section of the dataset with the provided query "q".

trained = clf.fit( train_features, train_label)

predict = clf.predict(q)

Explanation:

The scikit-learn is a machine learning package in python used to create machine models from datasets. It has several classifiers and regressions algorithms.

The naive baye algorithm is a machine learning class in python used in supervised machine learning to create models used to predict a label given a set of features using a classifier.

What humidity level should be maintained for computing equipment? a. 50 percent b. 40 percent c. 60 percent d. 30 percent

Answers

Answer:

A. 50 percent

Explanation:

The correct option is - A. 50 percent

Another preventive measure you can take is to maintain the relative humidity at around 50 percent. Be careful not to increase the humidity too far—to the point where moisture starts to condense on the equipment.

6. Each sales person earns Bonus points for the sales of each product type based on the following criteria. 1 point for every sh. 50 for Faiba, 2 points for every sh. 60 for Gateway, 3 point for every sh. 50 for Vodafone, 2 point for every sh. 60 for SAF. Insert a column Bonus Points in row 3 and compute the points of each sales person [5]​

Answers

The column Bonus Points in row 3 and compute the points of each sales person [5] are

What is bonus?

Bonus is a form of financial compensation given to an employee or contractor in addition to their regular wages or salary. Bonuses may be awarded to employees based on their performance or for meeting certain goals. Bonuses may be in the form of a cash payment, extra paid vacation, or other benefits such as a stock option or gift. Bonuses may also be awarded to employees for long-term service or loyalty. Bonuses are a way of rewarding employees for their hard work and dedication to the company. They can also be used as an incentive to encourage employees to stay with the company, or to motivate them to reach higher levels of performance.

In the third row of the table, the column ‘Bonus Points’ can be added.

For salesperson A, the bonus points earned can be calculated as follows:

For Faiba - A has sold Sh.600, so the bonus points earned are 600/50 = 12.

For Gateway - A has sold Sh.120, so the bonus points earned are 120/60 = 2.

For Vodafone - A has sold Sh.500, so the bonus points earned are 500/50 = 10.

For SAF - A has sold Sh.120, so the bonus points earned are 120/60 = 2.

Therefore, the total bonus points earned by salesperson A is 12 + 2 + 10 + 2 = 26.

Similarly, the bonus points earned by other salespersons can be calculated and the total bonus points earned by each salesperson can be inserted in the ‘Bonus Points’ column.


To learn more about bonus
https://brainly.com/question/29659552
#SPJ1

Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles

Answers

Answer:

The answer is "Option D".

Explanation:

The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.

In option A, it is used to process and analyze the data, that's why it is wrong. In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study. In option C, It is wrong because it is regulated by contracts.

Create an algorithm to accept the height of a person. If the height entered is greater than 6 feet it should display the message, "You are tall" if the height is less than this it should display, "You are short".

Answers

1. Accept the height of a person as input.

2. If the height is greater than 6 feet, display "You are tall".

3. If the height is less than or equal to 6 feet, display "You are short".

The algorithm is a simple conditional statement that checks the height entered by a person and displays a corresponding message based on the condition.

1. The first step is to accept the height of a person as input. This can be done using an input function or by reading from a user interface.

2. Next, we check if the height is greater than 6 feet. If the condition is true, the algorithm proceeds to display the message "You are tall".

3. If the height is not greater than 6 feet, the algorithm moves to the next step, which is to display the message "You are short". This message indicates that the person's height is less than or equal to 6 feet.

The algorithm provides a straightforward way to determine whether a person is tall or short based on their entered height.

learn more about user interface here:

https://brainly.com/question/10604135

#SPJ11

var w=20;
var h = 15;
rect (10, 10, w, h);
ellipse (10, 10, w, h);
How tall is each one of the shapes?

Answers

The rectangle is 20 units tall and the ellipse is 15 units tall.

How to calculate the height of each of the shapes?

The height of the rectangle is defined by the variable 'h' and is set to 15. The height of the ellipse is also defined by the variable 'h' and is set to 15. So the height of each shape is 15 units.

What is ellipse ?

An ellipse is a geometrical shape that is defined by the set of all points such that the sum of the distances from two fixed points (the foci) is constant. It can be thought of as an oval or a "squashed" circle. In the context of computer graphics and drawing, an ellipse is often used to represent the shape of an object or an area.

Learn more about ellipse in brainly.com/question/14281133

#SPJ1

ashrae standard 15-2013 requires the use of room sensors and alarms to detect

Answers

ASHRAE Standard 15-2013 is a safety standard that focuses on refrigeration system design, construction, testing, and operation. It requires the use of room sensors and alarms to detect refrigerant leaks, ensuring safety in occupied spaces.

Room sensors are devices that constantly monitor the refrigerant concentration levels in a given space. If the sensors detect a leak, they trigger alarms to alert building occupants and management of potential hazards.

These alarms help initiate appropriate response measures, such as evacuation or repair, to mitigate the risks associated with refrigerant leaks.

In summary, ASHRAE Standard 15-2013 mandates the use of room sensors and alarms to enhance the safety of individuals in areas with refrigeration systems. 

Learn more about Ashrae standard at

https://brainly.com/question/28235626

#SPJ11

A pointing device that has a laser guide on its underside and two or more buttons for clicking commands; you control the movement of the pointer by moving the entire thing around on your desk.

Answers

The Answer is: a mouse

Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions.
Online Content: Site 1

Describe the ways in which the speakers can cause difficulty in the listening process. (Site 1)

Answers

Ways in which speakers can cause difficulty in the listening process are speaking indistinctly, rapidly, or impolitely, leading to disinterest and intimidation.

Challenges in the listening process

We must explain here that we do not know which site we should access to obtain information for this question. Therefore, we will provide you with an answer that will likely help you, containing the most common difficulties and challenges concerning the listening process.

It can be challenging to listen to someone who speaks softly, indistinctly, curtly, rapidly, tediously, or in a discourteous tone. Moreover, if the speaker expresses something contentious or impolite or loses concentration while speaking, it can lead to the listener feeling uneasy or disinterested in what is being conveyed.

Learn more about the listening process here:

https://brainly.com/question/806755

#SPJ1

Q2. What does JSON stand for? Can you give an example of a JSON object. Q3. What is the purpose of a "projection" in a find query for MongoDB?

Answers

Answer:

Q2: JavaScript Object Notation

Q3: The $project function in MongoDB passes along the documents with only the specified fields to the next stage in the pipeline. ... The specification for $project command contain the inclusion of fields, the suppression of the _id field, the addition of new fields, and the resetting the values of existing fields.

Explanation:

state the input process and output that takes place at the ATM and the point of sale​

Answers

Explanation:

The input process is by entering the card and pressing the pin number after that output receive the money

The four main parts of a computer system are the Input, output, processor, and:
O A core.
OB. hardware.
OC. software.
OD. storage.

Answers

Answer:D) Storage

Explanation:

when people first encounter stressors, the process of _____ is triggered.

Answers

When people first encounter stressors, the process of "stress response" is triggered.

The stress response is a physiological and psychological reaction that occurs in response to a stressor, which is any event or situation that causes physical, emotional, or mental tension. This response is mediated by the hypothalamus-pituitary-adrenal (HPA) axis and the sympathetic nervous system (SNS), which release hormones such as cortisol and adrenaline, leading to the fight-or-flight response.The stress response is a natural and adaptive reaction that helps individuals cope with stressors by preparing the body to respond to perceived threats. However, chronic or excessive stress can lead to negative health outcomes, such as anxiety, depression, cardiovascular disease, and impaired immune function.

To learn more about stressors click the link below:

brainly.com/question/20011591

#SPJ11

Write a Scientific report modeling a written reasearch paper on big data applications.​

Write a Scientific report modeling a written reasearch paper on big data applications.

Answers

Big data applications is known to be the methods and ways that are often used to handle large amount of data.

What is  Scientific data modeling in big data?

Data modeling is known to be the ways of analyzing the “areas” of interest to one's organization and how these things is linked to each other.

Note that The data modeling helps us to know and also helps in documentation of the data resources needed for one's business.

Big data are often measured by terabytes and lots more and as such managing them is one that is  time-consuming,.

Learn more about Big data  from

https://brainly.com/question/19049345

#SPJ1

Question 2: Did every packet arrive in the correct order? Describe what went wrong and whether your partner was able to read the message. If neither you nor your partner had an issue try sending another message.

Answers

Answer:

No, the packets did not arrive in the right order but the TCP protocol reordered the packets. The transmission took a while, but the message was finally delivered.

Explanation:

Packets are chunks of data from a data source or message transmitted from one computer device to another. Protocols like TCP or transmission control protocol and UDP (user datagram protocol) are used for data transfer, with TCP as the more reliable protocol (it checks for errors, retransmit lost packets, and reorders received packets in the destination device) and slow protocol.

Post Test: Software Development Life Cycle and Initial Phases 6 Select the correct answer. Which activity is performed during high-level design in the V-model? A. gathering user requirements B. understanding system design C. understanding component interaction D. evaluate individual components E. design acceptance test cases

Answers

During the high-level design phase in the V-model of the software development life cycle, the activity that is performed is understanding component interaction. So, the correct option is C.

The high-level design focuses on translating the system requirements into an architectural design that outlines the overall structure of the software system. It involves identifying the major components or modules of the system and understanding how they interact with each other to achieve the desired functionality.

Understanding component interaction is crucial during high-level design as it involves determining the interfaces and dependencies between the different components. This includes defining the communication protocols, data flows, and interactions between the components. The goal is to ensure that the components work together seamlessly and efficiently to meet the system requirements.

Option A, gathering user requirements, is typically performed during the requirements gathering phase, which is before the high-level design phase. It involves understanding and documenting the needs and expectations of the system's users.Option B, understanding system design, usually takes place in the detailed design phase, where the specific design of the system is defined, including the internal workings of the components.Option D, evaluating individual components, is more aligned with the testing phase, where the components are assessed individually to ensure their functionality and compliance with the design.Option E, designing acceptance test cases, typically occurs during the testing phase when the acceptance criteria are established and test cases are created to verify that the system meets the specified requirements.

In conclusion, during the high-level design phase in the V-model, the activity of understanding component interaction takes place to ensure that the major components of the system work together effectively to achieve the desired functionality.

For more questions on V-model

https://brainly.com/question/16298186

#SPJ11

An installation is:
please help asap

Answers

Answer:  an installation is the act of putting something in, a device that stays in one place, a military base, or an art piece that often involves building and different types of materials.

Explanation:

Getting your new air conditioner put in is an example of an installation.

the auxiliary device used to store large volume of data and program for future is called​

Answers

Answer:

Auxiliary memory units are among computer peripheral equipment. They trade slower access rates for greater storage capacity and data stability. Auxiliary memory holds programs and data for future use, and, because it is nonvolatile (like ROM), it is used to store inactive programs and to archive data.

Explanation:

hope the answer was helpful...

Whats the overall mood of the song Rags2Riches by rod wave

Answers

Answer:

9.5/10

Explanation: Because you can vibe with the muisc but i just dont like the name so with out the name 10/10

Answer:

it would be a sad/get turnt

C
Describe the scope of the variables in this code.
class cholesterol:
low Density = 0
highDensity = 0
class patient:
definit__(self, firstName.lastName,id Num):
self.firstName = f[rstName
self.lastName = lastName
self.id Num = idNum
def str (self):
return self.firstName +""+self.lastName + " + self.id Num
The scope of high Density is limited to the patient class
The scope of firstName is limited to the cholesterol class

CDescribe the scope of the variables in this code.class cholesterol:low Density = 0highDensity = 0class

Answers

Answer:

The scope of highDensity  is accessible by the entire program .

The scope of firstName  is limited to the patient class .

Explanation:

Correct answer edge 2020

The scope of highDensity is limited to the cholesterol class and the scope of the firstName is limited to the patient class.

Variable scope

The accessibility of a program is described by the scope of a variable.

To put it another way, it's the part of the program where the variable is identified.

The place you declared a variable determines the scope. There are two major scopes of variables in python.

Global variablesLocal variables

Therefore, the scope of highDensity is limited to the cholesterol class and the scope of the firstName is limited to the patient class.

learn more on variable scope here: https://brainly.com/question/21065208

#SPJ2

Which can be used to view a web page?
File viewer
Text editor
Web browser
WYSIWYG

Answers

The answer is C: web browser

so we use web browsers to look at web pages

hope this helped

-scav

A microstrip line is used as a feed line to a microstrip patch antenna. The substrate of the line is alumina (epsilon_r= 10), while the dimensions of the line are w/h = 1.2 and t/h = 0. Determine the effective dielectric constant and characteristic impedance of the line. Compare the computed characteristics impedance to that of a 50-ohm line.

Answers

To determine the effective dielectric constant (εᵉᶠᶠ) and characteristic impedance (Z₀) of a microstrip line, we can use empirical formulas.

The effective dielectric constant can be calculated using the following equation:

εᵉᶠᶠ = (εᵣ + 1) / 2 + ((εᵣ - 1) / 2) * (1 + 12 * (h / w))^(-0.5)

where εᵣ is the relative permittivity of the substrate, h is the height of the substrate, and w is the width of the line.

The characteristic impedance can be calculated using the following equation:

Z₀ = (60 / √εᵉᶠᶠ) * ln(8 * h / w + w / h)

Let's substitute the given values into the equations and calculate the effective dielectric constant and characteristic impedance:

Given:

εᵣ = 10 (relative permittivity of alumina)

w/h = 1.2

t/h = 0 (assuming the thickness of the line is negligible)

Calculations:

εᵉᶠᶠ = (10 + 1) / 2 + ((10 - 1) / 2) * (1 + 12 * (0 / 1.2))^(-0.5)

= 11 / 2 + (9 / 2) * 1

= 11

Z₀ = (60 / √11) * ln(8 * 1 + 1 / 1)

≈ 50.05 Ω (rounded to two decimal places)

The calculated characteristic impedance is approximately 50.05 Ω. Comparing this to a 50-ohm line, we can see that they are quite close in value. This indicates that the microstrip line's characteristic impedance is similar to a 50-ohm line, which is a commonly used value in RF and microwave systems.

learn more about  microstrip line, here:

https://brainly.com/question/32201363

#SPJ11

______ creates a unique and fixed-length signature for a set of data. It involves converting a numerical input into another compressed numerical output.

Answers

Answer: Hashing

Explanation:

Hashing creates a unique and fixed length signature. Once hashing is performed, it is not possible to reverse the message. Hashing is used with authentication. This ensures that the given message cannot be modified.

How do you describe packet switching in your own words

Answers

Answer:

this is your answer bhaiya

How do you describe packet switching in your own words
Other Questions
Convert 5 3/5 to a mixed number Suppose the population mean is equal to 71 and the population variance is equal to 100. Assuming the population is bell-shaped, approximately what percentage of the population values are between 51 and 91? Pinnacle Manufacturing has $1,300,000 in assets and $1,000,000 of equity. What is their total amount of liabilities? $2,000,000 $300,000 $2,300,000 $-300,000 Randy owns a landscaping businessAt the beginning of the season, Randy must decide how many commercial lawn mowers he should purchase. Assume that each additional lawn mower costs $10,000 and that Randy's investment will be financed by a bank loan Randy has estimated his rate of return, as shown in the table below You take out a loan from the bank for $4350. The bank charges an annual simpleinterest rate of 15% and you are going to pay the loan back in 4 years. What is thetotal amount of INTEREST you will pay back to the bank? which of these regions functions to direct nearly all sensory input, except olfactory impulses, to the cerebral cortex?hypothalamuscerebrumcerebellumthalamus William earns $3,000.00 each month. His current monthly expenses are $2,660.00. This month, he plans to pay a little extra to his car note. What is the most that William can pay extra on his car note?$350.00$340.00$330.00$440.00 If c>0 , |u| > c is equivalent to u < or u> You just hung a picture twelve inches above the wall trim. 1 A tensile test is carried out on a mild steel bar of 40 mm diameter. The bar yields under a load of 120kN. It reaches a maximum load of 240kN and finally breaks at a load of 90kN. The diameter at the fracture was measured as 17.4 mm. Calculate: i. The tensile stress at yield point ii. The ultimate tensile stress iii. The nominal fracture stress iv. The true fracture stress 2. A bar of steel, having a rectangular cross-section 20 cm by 8 cm, carries an axial tensile load of 300kN. Estimate the decrease in the length of the sides of the cross section if Young's modulus, E, is 200GN/m ^2 and Poisson's ratio, v is True or FalseConsider the equilibrium c(s) h2o(g) co(g) h2(g), h = 2296 j. The concentration of carbon will not change if gaseous water is added to the system With the recent explosion of information technologies, Select one: O a. companies have ceased to feel the need for marketing information systems O b.it has become more difficult and expensive to obtain primary data O c companies have ceased to maintain internal databases O d most marketing managers are overloaded with data and often overwhelmed by it O e most marketing managers are concerned solely about the duplication of content acer what can the extracellular matrix of cells be made of? i. polysaccharide ii. glycoprotein iii. phospholipid i only i and ii only ii and iii only i, ii and iii In 2-3 paragraphs, discuss the reasons why someone should make a will. Line m is parallel to the y-axis, and its slope is _____. negative undefined positive 0 THIS IS PART OF YOUR PRAC APP:Given 5.9V and 3.02amps for a rectifier.If the present rectifier voltage output remains constant, calculate current output if the circuit resistance of the cathodic protection system doublesA) 5.0AB) 6.04AC)1.5AD) 3.2AE) 2.2A Complete the attched chart by filling in the equivalent percent/decimal/fraction. In photosynthesis what form of energy is sunlight converted to and how is this energy stored ? Can anyone can tell me this is right? or wrong?Thank you. There are two basic options for researchers when asking questions: open-ended or closed-ended. (true or false)