true/false : in general, look disk head scheduling will involve less movement of the disk heads than scan disk head scheduling.

Answers

Answer 1

It is true, in general, look disk head scheduling will involve less movement of the disk heads than scan disk head scheduling.

Which scheduling algorithm for disks is the best?

When compared to FCFS, SCAN, C-SCAN, and C-LOOK disk scheduling algorithms with regard to these parameters, a few algorithms, such as SSTF and LOOK, will be the most effective algorithms.

Which disk scheduling algorithm Mcq is the best?

The elevator algorithm is a disk scheduling technique, commonly referred to as a scan algorithm, in which the head begins at one end of the disk and goes to the other end, completing each request along the way.

To know more about disk scheduling visit

brainly.com/question/24306265

#SPJ4


Related Questions

one way to segment a market is according to whether the purchaser is a consumer or a business-to-business user. t or f

Answers

True, one way to segment a market is according to whether the purchaser is a consumer or a business-to-business (B2B) user.

What is B2B?

This type of market segmentation is based on the end user of the product or service, and it allows companies to tailor their marketing and sales efforts to specific types of customers.

Consumer market segments typically consist of individual consumers who purchase goods or services for personal use, while B2B market segments consist of businesses or organizations that purchase goods or services for use in their operations.

By segmenting the market in this way, companies can create more targeted marketing campaigns and sales strategies, which can help increase their chances of success in the market.

To Know More About B2B, Check Out

https://brainly.com/question/20514029

#SPJ1

Can we do the GTA V missions in any order?

Answers

Answer:

yes

Explanation:

do you also play it i love to play gta v

g write the code that would support overload for the * operator that will allow scalar multiplication, i.e. a double times a point.

Answers

Answer:

Here is one possible way to implement overload for the * operator that will allow scalar multiplication:

struct Vec3 {

 float x, y, z;

 Vec3 operator*(float scalar) const {

   return Vec3{x * scalar, y * scalar, z * scalar};

 }

};

This code defines a Vec3 struct that represents a three-dimensional vector, and it overloads the * operator to perform scalar multiplication. The * operator takes a float value as its right-hand operand and returns a new Vec3 object that is the result of scaling the original vector by the given scalar value.

I need answer ASAP. Place the box’s in the correct places

I need answer ASAP. Place the boxs in the correct places

Answers

Answer:

This is the order:

customer

order

accept order

notify kitchen

inventory kitchen

order

customer

i think, i'm sorry

can someone tell me why it says that and how i can fix it pls

can someone tell me why it says that and how i can fix it pls
can someone tell me why it says that and how i can fix it pls

Answers

View the image below for the answer.

can someone tell me why it says that and how i can fix it pls

A soldier white line down the center of a two lane road indicates

Answers

Answer:

This indicates that you may carefully switch lanes.

Explanation:

If dotted line, then yes.

Question 26 (5 points) Make ONE malware example for each of the following malware categories. Then,
explain how each of these examples works: a. Imprison b. Launch c. Snoop d. Deceive e. Evade

Answers

a. Ransomware, a type of malware, falls under the imprison category. It encrypts files, demands ransom, and provides a decryption key upon payment.

b. Botnets, a type of malware, fall under the launch category. They create networks of infected computers used for coordinated attacks.

c. Keyloggers, a type of malware, fall under the snoop category. They record keystrokes to capture sensitive information.

d. Phishing malware falls under the deceive category, imitating legitimate websites to trick users into revealing personal information.

e. Rootkits, a type of malware, fall under the evade category. They modify operating systems to hide their presence from security software.


a. Imprison: An example of malware that falls under the imprison category is ransomware. Ransomware encrypts the victim's files, making them inaccessible, and demands a ransom in exchange for the decryption key. Once the victim pays the ransom, the attacker provides the decryption key to unlock the files. Ransomware can be distributed through malicious email attachments or infected websites.

b. Launch: A type of malware that falls under the launch category is a botnet. A botnet is a network of infected computers controlled by a central command and control server. The malware infects computers, turning them into "zombies" that can be used to launch coordinated attacks, such as DDoS (Distributed Denial of Service) attacks. The command and control server sends instructions to the infected computers, directing them to launch attacks on targeted systems.

c. Snoop: Keyloggers are an example of malware that falls under the snoop category. Keyloggers record keystrokes made by a user on their computer or device. This allows the attacker to capture sensitive information such as passwords, credit card numbers, or personal messages. Keyloggers can be delivered through infected websites, phishing emails, or malicious downloads.

d. Deceive: Phishing malware is an example of malware that falls under the deceive category. Phishing malware imitates legitimate websites or services, tricking users into entering their sensitive information, such as usernames, passwords, or credit card details. The attacker then uses this information for identity theft or financial gain. Phishing malware can be delivered through emails, social media messages, or malicious links.

e. Evade: Rootkits are an example of malware that falls under the evade category. Rootkits modify the operating system to hide their presence and evade detection by security software. They can alter system files, processes, or drivers, making it difficult for antivirus software to detect or remove them. Rootkits are typically installed through vulnerabilities in software or by exploiting security weaknesses.

It is important to note that these are just examples, and there are many variations and subcategories within each malware category. The examples provided give you an idea of how each category works, but it's essential to stay vigilant and use security measures to protect against these threats.

Learn more about Phishing malware here :-

https://brainly.com/question/30586462

#SPJ11

What is a data cycle? Click here to watch the video Choose the correct answer below. O A. The process of using data to answer statistical questions OB. The process of statistically analyzing data through a procedure that requires one to analyze given data OC. The process of testing the reliability of the statistical results OD. The process of posing a question, collecting data, analyzing data, and finally interpreting the data

Answers

Option (a), utilizing data to provide statistical insights.

A data cycle is what?

The process that a particular piece of data goes through from the time it is first created or recorded until it is eventually archived and/or deleted when it reaches the end of its useful life is referred to as the data lifecycle.

A statistics data cycle is what?

A study issue is handled in a statistical investigation by statistical questions that are posed and answered using data. The Data Cycle is a framework for carrying out statistical research, and it is recommended that you go through each stage at least once.

What are the four parts of the data cycle?

Invite students to go back to their seats, grab their DS journals, and draw a diagram of the Data Cycle that includes the titles of the four steps (Pose statstical investigative question, consider data, analyze data, interpret data).

Learn more about data cycle: https://brainly.com/question/30094940

#SPJ4

What is fish processing?

Answers

Fish processing involves preparing fish and seafood for delivery to consumers. Once fish is harvested, it must undergo several steps before it’s ready to be sold in the market. The process includes gutting, filleting and packaging of the product. Fish is a highly perishable food, so it must be carefully handled from the moment it’s caught until it’s sealed in packaging material

explain the look of a document which contains several different font sizes and font colors​

Answers

Answer:

Colorful and dynamic?

Explanation:

The  look of a document that has several different font sizes and font colors​ is one that has undergone editing to give it a kind of uniqueness.

What is name of the document?

A document file name is said to be the name that  is given to an electronic file copy of a document.

The document file name  is one that can be written in different ways. The HTML style is known to be an element that is often used to add a lot of styles to an element, such as color, font of a document.

Learn more about document  from

https://brainly.com/question/16650739

Samir is using an external hard disk with File History to back up files from his laptop. He needs to detach the hard disk for another task, so he configures an external SSD to be used with File History.
Which of the following is most likely to occur in this scenario?
Group of answer choices
Both drives can be used simultaneously with File History.
The backed-up data on the hard disk will not be deleted.
The SSD will be formatted with NTFS for use with File History.
Samir will not be able to save other files on the SSD.

Answers

Both drives can be used simultaneously, with File History  is most likely to occur in this scenario. Option A is correct.

What is the use of File History?

File History backs up versions of the files in the Videos, Documents, Music, Pictures, and Desktop folders, as well as OneDrive items that are available offline on your PC, on a regular basis.

In this scenario, Samir is backing up files from his laptop using an external hard disk using File History. He wants to disconnect the hard drive for another work, so he configures an external SSD for File History use, then With File History, both drives may be utilized at the same time.

Therefore, option A is correct.

Learn more about the File History, refer to:

https://brainly.com/question/29387898

#SPJ1

Convert this into reported speech:
“Hello, Mother,” Farah greeted her mum as she entered the door.
"Where is your sister?" Mum asked anxiously.
“She stopped by to get ice-cream on the way. She’ll be around in a few minutes,” Sarah announced casually.
“How many times have I told you to not leave her alone, she’s young!” Mum shouted frustratedly
“Oh, I’m sorry, Mother. I’ll be careful next time,” apologized Farah immediately.​

Answers

Answer:

Hello mother Farah come to welcome her mum

Mum ask where is sister

She go to get ice cream in road

She go before few minutes Sarah

Every time I I tell you don't send him alone

She is young

I am sorry mum next time don't send him alone

I hope you like it

Question 4
The following code is intended to test if x is at least 5. Fill in the correct symbol:

if x ____ 5:

Answers

The correct symbol to use in the comparison in this case would be ">=", which stands for "greater than or equal to".

So the statement should be :

if x >= 5:

What is the code about?

The above code tests if the value stored in the variable x is greater than or equal to 5. If the test evaluates to true (meaning x is greater than or equal to 5), the code inside the if block will be executed. If the test evaluates to false (meaning x is less than 5), the code inside the if block will not be executed.

Therefore, It's important to note that other symbols or operations such as ">" (greater than) or "==" (equal to) could be used to test for different values of x . For example, to test if x is exactly equal to 5 you would use "==" instead of ">="

Learn more about coding from

https://brainly.com/question/23275071

#SPJ1

_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care

Answers

Answer:

Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.

There are some processes that need to be executed. Amount of a load that process causes on a server that runs it, is being represented by a single integer. Total load caused on a server is the sum of the loads of all the processes that run on that server. You have at your disposal two servers, on which mentioned processes can be run, Your goal is to distribute given processes between those two servers in the way that, absolute difference of their loads will be minimized. Write a function: class solution { public int solution(int[] A); } (JAVA) that, given an array of A of N integers, of which represents loads caused by successive processes, the function should return the minimum absolute difference of server loads. For example, given array A such that:


A[0] = 1

A[1] = 2

A[2] = 3

A[3] = 4

A[4] = 5


Your function should return 1. We can distribute the processes with loads 1,2,3,4 to the first server and 3,5 to the second one, so that their total loads will be 7 and 8, respectively, and the difference of their loads will be equal to 1

Answers

The Java code that solves this problem has been written in  the space below

How to write the Java code

public class Solution {

   public int solution(int[] A) {

       int totalLoad = 0;

       for (int load : A) {

           totalLoad += load;

       }

       int server1Load = 0;

       int server2Load = totalLoad;

       int minAbsoluteDifference = Integer.MAX_VALUE;

       for (int i = 0; i < A.length - 1; i++) {

           server1Load += A[i];

           server2Load -= A[i];

           int absoluteDifference = Math.abs(server1Load - server2Load);

           minAbsoluteDifference = Math.min(minAbsoluteDifference, absoluteDifference);

       }

       return minAbsoluteDifference;

   }

}

Read mroe on Java code here https://brainly.com/question/25458754

#SPJ1

NEED ANS ASAP THANK YOU

NEED ANS ASAP THANK YOU

Answers

Answer:

1)text area

2) document view

4) title bar

6) window controls

8) command group

9) formatting toolbar

10) command tabs

11) zoom

12) scroll bars

13) toolbar

14)status bar

What is the computer system cycle called?

Answers

Answer:

he fetch–decode–execute cycle, or simply the fetch-execute cycle

mark me brainliestt :))

html & css design and build websites by jon duckett

Answers

HTML and CSS are the fundamental building blocks of websites. Jon Duckett’s “HTML & CSS Design and Build Websites” is an excellent resource for both beginners and experienced developers.

The book is divided into three main sections. The first section introduces the basics of HTML and CSS. It covers topics such as text formatting, links, images, tables, forms, and CSS layout techniques. The second section goes into more detail about web design principles, including color, typography, and layout. The third section covers advanced topics such as responsive design and accessibility.

One of the great things about this book is that it uses real-world examples to demonstrate how to apply the concepts you learn. This makes it easy to see how you can use HTML and CSS to create beautiful and functional websites.

In conclusion, “HTML & CSS Design and Build Websites” is an excellent resource for anyone who wants to learn HTML and CSS. It is easy to read, visually appealing and provides practical examples that you can use to build your own websites. The book is also available in an online format, which makes it easy to access from anywhere.

To learn more about the website.

brainly.com/question/26959627

#SPJ11

Which pair of devices have the same input motion and different outputs?

scissors and adjustable wrench

nutcracker and can opener

musical instrument and adjustable wrench

salad tongs and nutcracker

Answers

Answer:

nutcracker and can opener

Explanation:


Solution of higher Differential Equations.
1. (D4+6D3+17D2+22D+13) y = 0
when :
y(0) = 1,
y'(0) = - 2,
y''(0) = 0, and
y'''(o) = 3
2. D2(D-1)y =
3ex+sinx
3. y'' - 3y'- 4y = 30e4x

Answers

The general solution of the differential equation is: y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x).

1. To solve the differential equation (D^4 + 6D^3 + 17D^2 + 22D + 13)y = 0, we can use the characteristic equation method. Let's denote D as the differentiation operator d/dx.

The characteristic equation is obtained by substituting y = e^(rx) into the differential equation:

r^4 + 6r^3 + 17r^2 + 22r + 13 = 0

Factoring the equation, we find that r = -1, -1, -2 ± i

Therefore, the general solution of the differential equation is given by:

y(x) = c1e^(-x) + c2xe^(-x) + c3e^(-2x) cos(x) + c4e^(-2x) sin(x)

To find the specific solution satisfying the initial conditions, we substitute the given values of y(0), y'(0), y''(0), and y'''(0) into the general solution and solve for the constants c1, c2, c3, and c4.

2. To solve the differential equation D^2(D-1)y = 3e^x + sin(x), we can use the method of undetermined coefficients.

First, we solve the homogeneous equation D^2(D-1)y = 0. The characteristic equation is r^3 - r^2 = 0, which has roots r = 0 and r = 1 with multiplicity 2.

The homogeneous solution is given by,  y_h(x) = c1 + c2x + c3e^x

Next, we find a particular solution for the non-homogeneous equation D^2(D-1)y = 3e^x + sin(x). Since the right-hand side contains both an exponential and trigonometric function, we assume a particular solution of the form y_p(x) = Ae^x + Bx + Csin(x) + Dcos(x), where A, B, C, and D are constants.

Differentiating y_p(x), we obtain y_p'(x) = Ae^x + B + Ccos(x) - Dsin(x) and y_p''(x) = Ae^x - Csin(x) - Dcos(x).

Substituting these derivatives into the differential equation, we equate the coefficients of the terms:

A - C = 0 (from e^x terms)

B - D = 0 (from x terms)

A + C = 0 (from sin(x) terms)

B + D = 3 (from cos(x) terms)

Solving these equations, we find A = -3/2, B = 3/2, C = 3/2, and D = 3/2.

Therefore, the general solution of the differential equation is:

y(x) = y_h(x) + y_p(x) = c1 + c2x + c3e^x - (3/2)e^x + (3/2)x + (3/2)sin(x) + (3/2)cos(x)

3. To solve the differential equation y'' - 3y' - 4y = 30e^(4x), we can use the method of undetermined coefficients.

First, we solve the associated homogeneous equation y'' - 3y' - 4y = 0. The characteristic equation is r^2 - 3r - 4 = 0, which factors as (r - 4)(r + 1) = 0. The roots are r = 4 and r = -1.

The homogeneous solution is

given by: y_h(x) = c1e^(4x) + c2e^(-x)

Next, we find a particular solution for the non-homogeneous equation y'' - 3y' - 4y = 30e^(4x). Since the right-hand side contains an exponential function, we assume a particular solution of the form y_p(x) = Ae^(4x), where A is a constant.

Differentiating y_p(x), we obtain y_p'(x) = 4Ae^(4x) and y_p''(x) = 16Ae^(4x).

Substituting these derivatives into the differential equation, we have:

16Ae^(4x) - 3(4Ae^(4x)) - 4(Ae^(4x)) = 30e^(4x)

Simplifying, we get 9Ae^(4x) = 30e^(4x), which implies 9A = 30. Solving for A, we find A = 10/3.

Therefore, the general solution of the differential equation is:

y(x) = y_h(x) + y_p(x) = c1e^(4x) + c2e^(-x) + (10/3)e^(4x)

In conclusion, we have obtained the solutions to the given higher-order differential equations and determined the specific solutions satisfying the given initial conditions or non-homogeneous terms.

To know more about Differential Equation, visit

https://brainly.com/question/25731911

#SPJ11

which spanish speaking country has the highest number of bird species in the world

Answers

Answer:

Colombia

Explanation:

It has 1826 species of birds. The also speak Spanish in a form.

The world's biggest number of bird species are found in Colombia.

What is biodiversity?

The variety and variability of life on Earth is referred to as biodiversity or biological diversity. A measure of variation at the genetic, species, and ecosystem levels is called biodiversity.

Biodiversity refers to the variety of all the diverse species of organisms that dwell on our planet, including the plants, animals, insects, and microorganisms.

Each of these things exists in a delicate balance and coexists with the others in ecosystems that nourish and sustain life on earth.

One of the nations on earth with the most biodiversity is Colombia. More than 1,900 native and migratory bird species make Colombia the country with the greatest diversity of bird species in the world, according to scientists.

Thus, the country is Colombia.

For more details regarding biodiversity, visit:

https://brainly.com/question/13073382

#SPJ2

I need help, I can't send documents by mail, does anyone know why this happens?​

I need help, I can't send documents by mail, does anyone know why this happens?

Answers

Answer:

no, not really, but maybe its because your mail is full, or youre sending a too big attachment?

Explanation:

Why is compression important for video
streaming?
Oto increase the number of frames per second
so that motion appears smooth
Oto watch video without waiting for it to
download
O to improve image quality
O to increase file size
DONE✔
Question

Answers

Compression, important for video streaming to watch video without waiting for it to download.

The technique of compressing a video file such that it takes up less space than the original file and is simpler to send across a network or the Internet is known as video compression.

Since compression makes it possible for video data to be transferred over the internet more effectively, it is crucial for video streaming. The video files are often huge, they would take an extended period to download or buffer before playback if they weren't compressed.

Learn more about video, here:

https://brainly.com/question/9940781

#SPJ1

Consider the following code segment.
What are the values of first and second as a result of executing the code segment?
a. first = 200, second = 100
b. first = 100, second = 100
c. first = 200, second = 200
d. first = 100, second = 200

Answers

You might apply this to a text, a list, or an object. Therefore, after swapping the amount, "200, 100," or "Option A," is the computed value.

What is code segment?

A code segment in computing is a chunk of an object file or the corresponding area of the virtual address space of the programme that includes executable instructions. It is sometimes referred to as a text segment or simply as text.

Another memory allocation strategy that can be used instead of or along with paging is segmentation. defining a first and second variable, each of which has the integer values "100 and 200."

The swapping into the supplied values is done in the following step, and its values are printed using a temporary variable.

Thus, the correct option is A.

For more details regarding code segment, visit:

https://brainly.com/question/20063766

#SPJ1

Give two examples of situations or applications where resistors are used​

Answers

Answer:

Different Types of Resistors – Fixed, Variable, Linear and Non-Linear Resistors & Applications

Carbon Composition Resistors.Wire wound Resistors.Thin Film Resistors.Carbon Film Resistors.Metal Film Resistors.Thick Film Resistors.Metal Oxide Resistors.Cermet Oxide Resistors (Network Resistors)

Question 6 (2 points)
The recipe for good communication includes these "ingredients":

a.clause, brevity, comments, impact, value

B.clarity, brevity, comments, impact, value

C.clarity, brevity, context, impact, value

D.clause, brevity, context, impact, value

Answers

Answer:

C

Explanation:

i think lng hehehehehe

In mobile security, the attacks that exploit the vulnerabilities of the UMTS security architecture can be generally categorized as attacks. worm-based botnet infrastructure-based user-based Question 34 (1.5 points) In Bluetooth key hierarchy. is used to encrypt or decrypt Bluetooth packets. constraint key payload key initiation key pass-key Question 35 (1.5. points) In 2.5G traditional wireless networks, who is in charge of encryptions and decryptions on the network side? \begin{tabular}{c} HLR \\ VLR \\ SGSN \\ \hline MSC \end{tabular}

Answers

The categories of attacks that exploit vulnerabilities in the UMTS security architecture are user-based attacks, infrastructure-based attacks, and worm-based attacks.

What are the categories of attacks that exploit vulnerabilities in the UMTS security architecture?

In mobile security, attacks that exploit vulnerabilities in the UMTS (Universal Mobile Telecommunications System) security architecture can be generally categorized as user-based attacks, infrastructure-based attacks, and worm-based attacks.

User-based attacks involve malicious actions initiated by users, such as eavesdropping on communications, impersonating legitimate users, or stealing sensitive information.

Infrastructure-based attacks target the network infrastructure, aiming to disrupt or compromise the network's security mechanisms.

These attacks may exploit vulnerabilities in the core network elements, such as the Home Location Register (HLR), Visitor Location Register (VLR), Serving GPRS Support Node (SGSN), or Mobile Switching Center (MSC).

Worm-based attacks leverage self-replicating malicious software that can spread across mobile devices or the network, causing disruptions, unauthorized access, or data breaches.

Regarding the Bluetooth key hierarchy, the initiation key is used to encrypt or decrypt Bluetooth packets. It is a cryptographic key that is generated during the pairing process and serves as a shared secret between Bluetooth devices.

The initiation key is used for secure communication between devices by encrypting and decrypting the transmitted data.

In traditional 2.5G wireless networks, the Mobile Switching Center (MSC) is in charge of encryption and decryption on the network side.

The MSC is a core component of the network that handles call routing, switching, and other functions.

It ensures secure communication by performing encryption and decryption operations to protect data transmitted over the network.

Learn more about categories

brainly.com/question/31766837

#SPJ11

You are the IT administrator for a small corporate network. The computer in Office 2 recently failed, and you replaced the hard drive. You would like to download and re-image the workstation from the network. In this lab, your task is to complete the following: Turn on the computer in Office 2.
Configure the Integrated NIC in the BIOS for PXE.
Boot the computer and install the Window 10 image.
Verify that the new image is working on Office2.

Answers

To activate the Office 2 computer, confirm its secure connection to a power supply and press the power switch.

What next should be done?

After turning on the computer, you can enter the BIOS configuration by pushing the assigned button (typically Del, F2, or F10) while the system boots up.

Find the Integrated NIC setup in the BIOS and select the option to boot from PXE. Record the modifications and depart from the BIOS settings.

The network will now be used for booting the computer and commencing the process of installing the Windows 10 image. Once the installation process is completed, it is essential to confirm that the new image is functioning accurately on Office 2

Read more about IT admin here:

https://brainly.com/question/30456614

#SPJ1

Question # 6 Fill in the Blank You designed a program to create a username using the first three letters from the first name and the first four letters of the last name. You are testing your username program again for a user whose name is Paula Mano. The output should be

Answers

Its PuaMano

Explanation:

got it wrong and it shows this answer for edge

If an employer asks you to email your job application, why would
you create the email and send it to yourself first?

Answers

If an employer asks you to email your job application, creating the email and sending it to yourself first allows you to double-check for errors and ensure that your application looks professional when the employer receives it.

What should be included in the job application email?

If an employer has asked you to email your job application, there are a few things that should be included in the email:

Subject line: Make sure your email has a clear subject line that includes your name and the job title you're applying for.

Attachment: Attach your resume and cover letter in PDF or Word format (unless otherwise specified in the job posting).

Introduction: In the body of your email, introduce yourself and briefly explain why you're interested in the position. Mention any relevant experience or skills you have that make you a good fit for the job. Make sure your tone is professional and enthusiastic, but avoid being overly casual or informal

Learn more about email at

https://brainly.com/question/29870022

#SPJ11

Other Questions
Leah goes to Buffalo Wild Wings for lunch. Her total bill was $35.50. She wantsto leave a tip that is 18% of the total bill. How much should she leave for theserver? How much did she spend in all? the muffin store sells apple, banana, chocolate, lemon, and oatmeal muffins. a) in how many ways can you select 23 muffins if the store has 23 of each of the (five) types? People falling down a cliff is potential energy or kinetic energy? When nitric oxide is used in the dilation of smooth muscle cells, which of the following would interfere with the relaxation of the smooth muscle cells? Inhibitors ofA) Ca release by ER.B) nitric oxide.C) guanylyl cyclase.D) all of the above Which fraction and decimal forms match the long division problem? The inability to see a problem from a new perspective isA. functional fixednessB. fixationC. mental setD. undirected thinking Silvia, a manager, came into your office last week to talk about increasing her budget. She regularly gives bonuses and small prizes when her employees meet their production goals. (Referent, legitimate, reward, coercive, expert) Write two or three sentences about what shakespeare is saying about mortality and love in sonnet 73 . how do death and love relate? support your answer with textual evidence. In terms of value, the type of crime that has the greatest negative impact on the jewelry industry is? For f(x) = 2x + 1 and g(x) = x - 7, find (f+ g)(x). Which of the following is NOT a long-term effect of the Black Death?Urban (city) populations increased in Europe as peasants left the countryside manors for better opportunities in citiesThe Mongols completely conquered Europe and replaced every European MonarchMany peasants died creating a labor shortage, making the peasants that survived more valuable which helped them to make moremoney/wealthit ended the feudal system in Europe as kings and nobles had less power and peasants had more if a client has a time horizon of one to five years, in general the most appropriate asset is How might this photo affect people differently from the photo of Elizabeth Eckford on page 882? Find the quantities indicated.(a) A_____(b) c_____ Which of these diagrams shows a line segment? Please help Ive provided picture below Algebra 2 Simplify by using radical. Rationalize denominators.[tex]2a^{\frac{-1}{-2} }[/tex] If an object is between a concave mirror and its focal point, the image will be(A) real and smaller than the object.(B) real and larger than the object.(C) virtual and smaller than the object.(D) virtual and larger than the object. Pretrito simpleAyer Martha y Luis_____________(perder) el autobs.Hace cinco aos yo __________(ganar/yo) una competicin de gimnasia.Vosotros no (asistir) a la ceremonia.Teresa de Calcuta (dedicar) su vida a los ms necesitados. Rafael Azcona (vivir) del ao 1926 al 2008.Mis abuelos (viajar) la semana pasada. Vosotros (comer) paella el domingo. Usted (preguntar) una cosa muy importante.Anoche yo (leer) un libro muy interesante.Mi perro (ladrar) toda la noche. 2. Consider the functionsf(x) = 8x 10 and g(x) = 2x 7.What is the zero of function g?A 3.5B -7C 2D -3.5