wes is using usmt to migrate user profiles to newly purchased windows 10 computers in the organization. to begin the migration, he executes the scanstate.exe process on the source computers to collect user profile information. where is this information most likely to be stored?

Answers

Answer 1

Answer:

When using USMT (User State Migration Tool) to migrate user profiles, the scanstate.exe process is used to collect user profile information from the source computers. This information is most likely to be stored in a migration store, which is a location on the source computer where USMT stores the data that it collects.

The migration store can be specified by the user when the scanstate.exe process is run, or it can be set to a default location. The default location for the migration store is typically the local drive of the source computer.

Once the user profile information has been collected and stored in the migration store, it can be used to restore the user profiles to the target computers using the loadstate.exe process. The loadstate.exe process reads the data from the migration store and restores it to the target computers, allowing the user profiles to be transferred to the new Windows 10 computers.

Explanation:


Related Questions

p6. this elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. consider two hosts, a and b, connected by a single link of rate r bps. suppose that the two hosts are separated by m meters, and suppose the propagation speed along the link is s meters/sec. host a is to send a packet of size l bits to host b.

Answers

Propagation delay refers to the time it takes for a signal to travel from one end of a link to the other. It depends on the distance between the two hosts (m) and the propagation speed (s) of the medium. Propagation delay can be calculated using the formula: Propagation delay = distance / propagation speed.

Transmission delay, on the other hand, is the time it takes to push all the bits of a packet onto the link. It depends on the size of the packet (l) and the transmission rate (r) of the link. Transmission delay can be calculated using the formula: Transmission delay = packet size / transmission rate.

In this problem, host A is sending a packet of size l bits to host B. The two hosts are connected by a single link with a transmission rate of r bps. The distance between the hosts is m meters, and the propagation speed along the link is s meters/sec.

To calculate the total time it takes for the packet to be delivered from host A to host B, we need to consider both the propagation delay and the transmission delay. The total delay can be calculated by adding the propagation delay and the transmission delay together.

Total delay = Propagation delay + Transmission delay

Propagation delay = distance / propagation speed = m / s
Transmission delay = packet size / transmission rate = l / r

Therefore, the total delay can be calculated as:
Total delay = (m / s) + (l / r)

This formula gives an estimate of the time it takes for the packet to travel from host A to host B, considering both the time taken for the signal to propagate and the time taken to transmit the packet.

To know more about signal visit:-

https://brainly.com/question/30503090

#SPJ11

5 QUESTIONS, BRAINLIEST, PLEASE ANSWER

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher told her to write a program that prompts the user for information. Which function should she use?

input()
int()
main()
print()
Question 2(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value with a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number with a decimal?

float()
int()
print()
string()

Answers

Answer:

1. Input() is the correct answer

2.Most programming languages have a data type called a string, which is used for data values that are made up of ordered sequences of characters, such as "hello world". A string can contain any sequence of characters, visible or invisible, and characters may be repeated. ... A string can be a constant or variable .

3.The int() function converts the specified value into an integer number.

4.CandyCost = int(input("How much is the candy?"))

5.int()

ANSWERS

Answer:

Cheri's should use  input()

A way to store a sequence of letters, numbers, or symbols

Jabari hould  use float()

Which function converts the user's input to a number with a decimal it is float()

candyCost = input("How much is the candy?")

why computer caller versatile machine

Answers

Answer:

hii h r u

where u live....................

how to put two games together in java code

Answers

Answer:

Use the output and Put doc1 on five documents.

Explanation:

what ppe can provide in exposure to heat and radiation?​

Answers

Examples of commonly used PPE for radiation protection from X-rays and gamma rays include:
Lead aprons or vests. Wearing lead aprons can reduce a worker's radiation dose. ...
Lead thyroid collar. ...
Lead gloves. ...
Safety goggles.

Compound conditions require a computer to sense whether multiple conditions are true or false.

True
False

Answers

Answer:

False

Explanation:

You can have multiple conditions in your while and for loops as well as your if statements.

which is a program that does something undocumented that the programmer or designer intended, but that the end user would not approve of if he or she knew about it?

Answers

A software program that does something undocumented that the programmer or designer intended, but that the end user would not approve of if he or she knew about it is referred to as a Trojan horse.

What is a malware?

A malware simply refers to any type of software program (document or file) that is designed and developed to be intentionally harmful to a host computer, website, server, or network, especially for the purpose of wreaking havoc, disruption, and destruction such as a Trojan horse.

In Computer technology, some examples of malware include the following:

WormsTrojan horseSpywareZombiesRootkitRATAdwareViruses

In conclusion, a Trojan horse is a type of malware that has the ability to perform undocumented actions (activities) which are completely unapproved by an end user of the device.

Read more on malware here: https://brainly.com/question/28260161

#SPJ1

Day 1 of seeing if anyone will buy me a psn gift card (if u do u get brainliest and thanks + alot of points

Answers

today is not the day keep trying

a small message that appears when the cursor is placed over a command button to identify its function is called:

Answers

When the cursor has been placed more than a command button to determine its purpose, a brief message called Tooltip.

What is cursor?
A cursor is a visual indicator used in computer systems to show the location where data is entered or retrieved. The cursor can be moved to different locations on the screen, allowing the user to enter or retrieve data from various locations. Cursors are usually used in combination with a pointing device, such as a mouse, trackball, or touchpad. The cursor is also used to indicate where characters on the screen are to be inserted, or to highlight a selection of text. It also serves as a visual indicator of the current state of the system, such as when typing or when an application is busy. Cursors can be moved around the screen using the mouse, trackball, or touchpad, or using the arrow keys on the keyboard. Cursors are also used to indicate selection in menu or list boxes, or to show where the user is currently working. Cursors are an important part of the user interface and can help improve the overall user experience.

To learn more about cursor
https://brainly.com/question/13174417
#SPJ1

An algorithm is defined as a well-ordered collection of unambiguous and effectively computable operations that when executed produce a result and halt in a finite amount of time. In one sentence or less, what does it mean to be effectively computable

Answers

Answer:

to be effectively computable, the person is definite, explicit and 'mechanical'.

what does XML do with a data wrapped in the tags?

XML is a hardware- and software-independent tool used to carry information and developed to describe (BLANK)
______________
This isn't a multiple choice question, so I have no clue what the answer would even be. Please help if you can and if you don't know please don't give false information.​

Answers

XML is a hardware- and software-independent tool used to carry information and developed to describe how XML Simplifies Things.

What does XML Simplifies Things about?

XML  is known to be a thing that helps one to stores data in plain text format. This is said to give  a kind of software- and hardware-independent way of storing, transporting, and sharing data in a network.

XML is known to also makes it easy for a person to widen or upgrade to a kind of new operating systems, new applications, etc., without the person losing their data.

Learn more about XML  from

https://brainly.com/question/11605816

Answer: data

Explanation:trust me, I do proper tutorials.

consider the following method, which is intended to return the average (arithmetic mean) of the values in an integer array. assume the array contains at least one element.

Answers

For the method to function as intended, if any, the following must be true about the array values: The method will always function as intended; no prerequisites are required.

What is integer array?A series of integers stored in succeeding words of memory is referred to as an array of integers. Additionally, a value is stored in memory for the array's number of integers. The directive. word, followed by a list of integers separated by commas, is used to declare an array of integers in assembly language.Meaning-wise, they are the same. Only to aid in the transition of C programmers to Java, the int array[] syntax was created. The more straightforward int[] array is considerably better. Not the NAME, but the TYPE is what the [] refers to. An assortment of integers, sometimes known as "whole numbers," is a collection used for a variety of computations. A number without a fraction is referred to as an integer.

Therefore, the correct option is E) No precondition is necessary; the method will always work as intended.

The complete question is:

Consider the following method, which is intended to return the average (arithmetic mean) of the values in an integer array. Assume the array contains at least one element.

public static double findAvg(double[] values)

{

double sum = 0.0;

for (double val : values)

{

sum += val;

}

return sum / values.length;

}

Which of the following preconditions, if any, must be true about the array values so that the method works as intended?

A) The array values must be sorted in ascending order.

B) The array values must be sorted in descending order.

C) The array values must have only one mode.

D) The array values must not contain values whose sum is not 0.

E) No precondition is necessary; the method will always work as intended.

To learn more about integer array, refer to:

https://brainly.com/question/29415628

#SPJ4

What is the 3 tier architecture made of?

Answers

Answer: The 3 tier architecture is made up of three layers: the presentation layer (or user interface layer), the business logic layer (or application layer), and the data access layer (or data layer). The presentation layer is responsible for displaying data and communicating with the user. The business logic layer contains the business rules and logic that drive the application. Finally, the data access layer is responsible for connecting to the database and executing database queries.

Explanation:

Does Apple have an ethical duty to society to cooperate in law enforcement investigations and decrypt devices it makes when requested by law enforcement?
Does Apple have an ethical duty to its customers to refuse to cooperate in law enforcement investigations and decrypt devices it makes when requested by law enforcement?
In the Time article, the author offers his opinions as to why Apple challenged the court order. Are the author’s concerns valid?
One of the issues in this situation was that law enforcement wanted Apple to create a special operating system to make it easier to access the encrypted data and bypass encryption technology. Should Congress enact a law requiring technology companies like Apple to include a "backdoor"—a way to circumvent the encryption technology—in their products that would allow law enforcement to access encrypted data pursuant to a search warrant?
Please keep in mind that you must convince me that you have read the material and carefully considered the questions posed to receive full credit. You must answer each question separately (i.e., separate numbered paragraphs), and in answering each of the questions, you should be writing at least 4 to 5 sentences per answer to each question. You must cite to your sources to support your initial post—including the materials discussed above and any concepts discussed in this course. You may also consider and cite to outside sources.
SOURCES
Read the "This Is the Real Reason Apple Is Fighting the FBI" article from Time.
Read the "A Year After San Bernardino And Apple-FBI, Where Are We On Encryption?" story from National Public Radio (NPR).
Read the "FBI asked anew about pushing Apple to unlock San Bernardino shooter’s iPhone" article from the Mercury News.

Answers

Yes, Apple, just like any other tech company, follows the law and is supposed to help with legal investigations. But, the problem of decoding devices is difficult.

Yes, Apple should make sure it respects its customers' privacy and keeps their personal data safe because it is the right thing to do. Apple keeps its customers' privacy intact by not helping law enforcement with their investigations and unlocking devices.

.

The worries brought up by the author in the Time article are indeed important. One important worry is the possibility of people misusing their authority.

If technology companies like Apple are required to make secret entrances for law enforcement, it could set a precedent that weakens the basic right to privacy.

What is the  ethical duty to society

Apple and other companies say that if we create backdoors or make encryption weaker on purpose, it can harm user privacy and security. This can have serious effects. Finding a balance between law enforcement and user privacy is a difficult ethical problem.

Apple has a duty to safeguard its customers' privacy and security because these are important for user confidence. Choosing not to help the police in their investigations can be seen as doing the right thing to protect customers.

In all, it is complicated for Apple to decide if they should help law enforcement investigations and unlock devices for their customers. The worries mentioned by the writer in the Time article are important and show the possible risks of weakening encryption technology and individual privacy.

Read more about ethical duty here:

https://brainly.com/question/29871792

#SPJ1

Find the roots of the following function: f(x)=x^2-3x^3-6x^2+6x+8 according to the fundamental theorem of algebra, how many solutions are there? according to descartes' rule of signs, what's the 'breakdown' of potential positive real, negative real, and/or complex roots? use the rational root theorem to create a list of possible rational roots (p/q) use synthetic division to test the possible rational roots and see which ones, if any, work (remember, we're looking for a remainder of zero) (any help would be a massive lifesaver!!)

Answers

To find the roots of the given function f(x) = x²   - 3x³ - 6x²   + 6x + 8, we can start by determining the number of solutions according to the fundamental theorem of algebra. Since the degree of the polynomial is 3, there are potentially three solutions.

How can the roots of the given function be found using the fundamental theorem of algebra?

To find the roots of the given function f(x) = x²   - 3x³ - 6x²   + 6x + 8, we can start by determining the number of solutions according to the fundamental theorem of algebra. Since the degree of the polynomial is 3, there are potentially three solutions.

Next, we can use Descartes' rule of signs to analyze the sign changes in the coefficients. The polynomial has one sign change, indicating the possibility of one positive real root. There are no sign changes among the reversed coefficients, suggesting no negative real roots.

To find possible rational roots, we can apply the rational root theorem. The constant term, 8, can have factors ±1, ±2, ±4, ±8, and the leading coefficient, -3, can have factors ±1 and ±3. These combinations give us a list of possible rational roots: ±1/1, ±2/1, ±4/1, ±8/1, ±1/3, ±2/3.

Using synthetic division, we can test each possible rational root and check for a remainder of zero to identify the actual roots.

Learn more about roots

brainly.com/question/16932611

#SPJ11

Write a program that merges the numbers in two files and writes all the numbers into a third file. your program takes input from two different files and writes its output to a third file. each input file contains a list of numbers of type int in sorted order from the smallest to the largest. after the program is run, the output file will contain all the numbers in the two input files in one longer list in sorted order from the smallest to the largest. your program should define a function that is called with the two input-file streams and the output-file stream as three arguments. create two input files containing at least 5 numbers (in sorted order) each for testing.

Answers

Answer:

Write a program that merges the numbers in two files and writes all the

numbers into a third file. Your program takes input from two different files and writes

its output to a third file. Each input file contains a list of numbers of type int in sorted

order from the smallest to the largest. After the program is run, the output file will

contain all the numbers in the two input files in one longer list in sorted order from

smallest to largest. Your program should define a function that is called with the two

input-file streams and the output-file stream as three arguments.*/

When designing a security-in-depth strategy, security measures such as firewalls, vpns and sll would be examples of what type of control?.

Answers

In the designing of a security-in-depth strategy, security measures such as VPNs, SSL, and firewalls are examples of security controls.

Security controls are primarily developed to protect information systems from potenial security risks. Security controls are countermeasures and parameters that safeguard information systems against malicious security threats. Given the vast growing rate of cyberattacks, data security controls are considered vital secuirty meusre today more than ever. VPNs, SSL, and firewalls are some examples of security control.

VPNs: Virtual Private Networks (VPNs) establish a private and secure online connection to the Internet. With VPNs data traffic, IP address, and location of users remain hidden.

SSL: Secure Socket Layer (SSL) establishes an encrypted connection between a server and a client - such as a website and a browser. SSL authenticates the identity of a website and enables an encrypted connection.

Firewalls: A firewall refers to a network security device that monitors and filters outgoing and incoming network traffic based on preset security rules.

You can learn more about Security Controls at

https://brainly.com/question/27960062

#SPJ4

Use the drop-down menus to select the answer that best completes each statement.
A person who finds a way to watch a recent movie online without paying for it is violating
A student who posts an inappropriate comment about a person via social media is violating
A student who visits a school-banned website that contains offensive content is violating school rules on

Answers

A person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

What is Movie Piracy?

This refers to the illegal copying and selling of DVDs and CDs without the permission of the owner.

Hence, we can see that a person who finds a way to watch a recent movie online without paying for it is violating movie copyright.

A student who posts an inappropriate comment about a person via social media is violating their rights to privacy.

A student who visits a school-banned website that contains offensive content is violating school rules on censorship.

Read more about movie piracy here:

https://brainly.com/question/8042416

#SPJ1

Answer: all the answers are here

Explanation:

Use the drop-down menus to select the answer that best completes each statement.A person who finds a

For this exercise, you are going to write your code in the FormFill class instead of the main method. The code is the same as if you were writing in the main method, but now you will be helping to write the class. It has a few instance variables that stores personal information that you often need to fill in various forms, such as online shopping forms.

Read the method comments for more information.

As you implement these methods, notice that you have to store the result of concatenating multiple Strings or Strings and other primitive types. Concatenation produces a new String object and does not change any of the Strings being concatenated.

Pay close attention to where spaces should go in theString, too.


FormFillTester has already been filled out with some test code. Feel free to change the parameters to print your own information. If you don’t live in an apartment, just pass an empty String for the apartment number in setAddress.
Don’t put your real credit card information in your program!

When you run the program as written, it should output

Dog, Karel
123 Cherry Lane
Apt 4B
Card Number: 123456789
Expires: 10/2025

Answers

The computer code in the FormFill class will be:

class FormFill

{

private String fName;

private String lName;

private int streetNumber;

private String streetName;

private String aptNumber;

// Constructor that sets the first and last name

// streetNumber defaults to 0

// the others default to an empty String

public FormFill(String firstName, String lastName)

{

fName = firstName;

lName = lastName;

streetNumber = 0;

streetName = "";

aptNumber = "";

}

// Sets streetNumber, streetName, and aptNumber to the given

// values

public void setAddress(int number, String street, String apt)

{

streetNumber = number;

streetName = street;

aptNumber = apt;

}

// Returns a string with the name formatted like

// a doctor would write the name on a file

//

// Return string should be formatted

// with the last name, then a comma and space, then the first name.

// For example: LastName, FirstName

public String fullName()

{

return(lName+", "+fName);

}

// Returns the formatted address

// Formatted like this

//

// StreetNumber StreetName

// Apt AptNumber

//

// You will need to use the escape character \n

// To create a new line in the String

public String streetAddress()

{

return(streetNumber+" "+streetName+"\n"+aptNumber);

}

// Returns a string with the credit card information

// Formatted like this:

//

// Card Number: Card#

// Expires: expMonth/expYear

//

// Take information as parameters so we don't store sensitive information!

// You will need to use the escape character \n

public String creditCardInfo(int creditCardNumber, int expMonth, int expYear)

{

return("Card number: "+creditCardNumber+"\nExpires: "+expMonth+"/"+expYear);

}

What is a code?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming ie., the source code.

It is also the name given to the source code after a compiler has prepared it for computer execution i.e., the object code.

Writing codes that a machine can understand is the focus of the programming activity known as coding.

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1

For this exercise, you are going to write your code in the FormFill class instead of the main method.

Franklin has a photographic assignment, and he needs to print some photographs using Adobe Photoshop. Which feature will help him see the
printed version of the document on the screen before he actually prints it?
The
feature in Photoshop will help Franklin see the printed version of the document on the screen before he actually
prints it.

Answers

Answer:

print preview

Explanation: i got it correct in plato

Answer:

print preview

Explanation:

on plato/edmentum

Once you upload information in online,Where it is stored in?​

Answers

Answer:

It depends. It could be in database, in your files, or it could just be thrown away.

Explanation:

When you upload information online, it is stored in data centers spread throughout the world. These data centers have become increasingly important especially in recent years with the world’s population relying on them more and more.

Source :
(1) Your Online Data is Stored in These Amazing Places - Guiding Tech. https://www.guidingtech.com/61832/online-data-stored-amazing-places/.
(2) Where are uploaded files stored? - SharePoint Stack Exchange. https://sharepoint.stackexchange.com/questions/14226/where-are-uploaded-files-stored.
(3) Where is the data saved after a form is submitted?. https://techcommunity.microsoft.com/t5/microsoft-forms/where-is-the-data-saved-after-a-form-is-submitted/td-p/1169617.

how computer viruses spread from one computer to another​

Answers

Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software.

you can change the font and font size of any cell or range using the mini toolbar.
T
F

Answers

The statement "you can change the font and font size of any cell or range using the mini toolbar" is actually true. The mini toolbar is a quick access toolbar that appears whenever you select a cell or a range of cells in Microsoft Excel.

Microsoft Excel provides a convenient way to access some commonly used formatting options, such as changing the font, font size, and font style.

To change the font or font size of a cell or range using the mini toolbar, you simply need to select the cell(s) that you want to format and then hover over the mini toolbar that appears. You should see options for changing the font and font size. Simply click on the desired option and the selected cell(s) will be formatted accordingly.While the mini toolbar is a quick and easy way to make basic formatting changes, it is not the only way to do so in Excel. You can also use the Home tab on the Ribbon to access more advanced formatting options, or you can create custom styles to apply consistent formatting across your workbook.In summary, the statement is true - you can change the font and font size of any cell or range using the mini toolbar, but there are other options available for more advanced formatting needs.

Know more about the Microsoft Excel

https://brainly.com/question/24749457

#SPJ11

HURRY GIVING BRAINLIEST AND ALL MY POINTS and I only have 40


Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:


1. Decide on the message you would like to display to the screen. Some ideas include:

1. Your favorite book title or TV show and why you like it

2. A few sentences sharing information about you

3. Your favorite sport and team or athlete

4. Use two variables to store your message.

Answers

Answer:

Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:

1. Decide on the message you would like to display to the screen. Some ideas include:

1. Your favorite book title or TV show and why you like it

2. A few sentences sharing information about you

3. Your favorite sport and team or athlete

4. Use two variables to store your message

Explanation:

Answer:

A few sentences about you .

Explanation:

list and explain three computing devices from the 20th century​

Answers

Answer:

Calculating Machine

Graphic tablet.

Touchscreen

Explanation:

Hope this helps.

Brain-List?

Answer:

1. The First Calculating Machine (Pascaline)

2. Jacquard's Loom

3. The First Pocket Calculator

Explanation:

1. Pascaline was the first calculator or adding machine to be produced in any quantity and actually used. It was deigned at about 1642-1644.

2. Jacquard Loom is an attachment for powered fabric looms

3. The first truly pocket-sized electronic calculator was the Busicom LE-120A "HANDY" It was marketed in 1971.

Machine learning systems analyze patterns in data to improve their performance automatically.
True
False

Answers

Note It is TRUE to state that Machine learning systems analyze patterns in data to improve their performance automatically.

What is a Machine learning System?

Machine learning is a branch of artificial intelligence that is widely described as a machine's capacity to mimic intelligent human behavior. Artificial intelligence systems are used to do complicated tasks in a manner comparable to how people solve issues.

There are three forms of machine learning: supervised, unsupervised, and reinforcement learning.

Machine learning is used in search engines, email filters to filter out spam, websites to create personalized recommendations, banking software to detect anomalous transactions, and many apps on mobile phones, such as voice recognition.

Learn more about Machine Learning Systems:
https://brainly.com/question/28470561
#SPJ1

tell me at list 5 farm animals dieases​

Answers

Answer :

Farm Common Diseases :

. General Farm Animal Diseases.

. Avian Influenza.

. Bovine Spongiform Encephalopathy (BSE)

. Foot-and-Mouth Disease.

. West Nile Virus.

Explanation:

Hope it helps out :))

Answer:

Avian influenza

Foot-and-mouth

West Nile virus

Bovine Spongiform Encephalopathy(BSE)

Brucellosis

Which of these standards has the fastest connection?
802.11a
802.11g
802.11ac
802.11b

Answers

Answer:

802.11ac is fastest cinnection

is techonalygy harmful or useful

Answers

Tech can be both harmful and useful. Some techs you can use for school or educational purposes. Some apps can harm your brain.

Answer:

both

Explanation:

both because tech. can be useful to anyone depending on what they need but harmful because you are hurting your eyes by looking at the scree for way to long, along with physical heath by sitting there for way to long and not being active.

In this Cluster you help businesses sell products. What Career Cluster is this

Answers

Answer:

Marketing, Sales, and Service.

Explanation:

Other Questions
crisis that is not part of everyday life, such as natural disaster, national disaster, or crime of violence that causes trauma and disruption is called ______ Do the ratios 10/9 and 20/18 form a proportion? The graph shows the marginal social cost,demand and supply curves in the market. What is the socially optimal quantity and price respectively? A model for a certain population P() is given by the initial value problem = P(10-1 - 10-5P), PO) = 500, where t is measured in months. (a) What is the limiting value of the population? (b) At what time (i.e., after how many months) will the populaton be equal to one tenth of the limiting value in (a)? (Do not round any numbers for this part. You work should be all symbolic.) Classer par ordre les vnements de lle au trsor How did governmental changes in England and America influence the French Revolution? When two pumps are used, they can fill a tank in 60 minutes. When the first pump is used alone, the tank will be filled in 150 minutes. When x represents the time it takes the second pump to fill the tank when used alone, the situation is represented by this equation: 15 += How long would it take the second pump, working alone, to fill the tank? . OA 75 minutes B. 90 minutes . 100 minutes OD 120 minutes under the articles of confederation how were the states represented in conress The navy bean soup recipe requires 180 g of leeks. If on the next day, your produce vendor tells you that the price of leeks has been changed to 3.65, what will the total cost of leeks in the navy bean soup recipe be? Round your answer to the nearest cent. Science and technology are What is the slope of the line that passes through the points (-4, 2) & (1,5) 25. a state legislator wishes to survey residents of her district to see what proportion of the electorate is aware of her position on using state funds to pay for abortions. a. what sample size is necessary if the 95% ci for p is to have width of at most .10 irrespective of p? b. if the legislator has strong reason to believe that at least 23 of the electorate know of her position, how large a sample size would you recommend? that are NOT discussed in the video. [Q8] What are the 3 different measures of central tendency ? How do these measures differ? Whats the correct answer answer asap for brainlist Work out the area of a circle with radius of 7.5cm Which of the following laws/equations give aWRONG description of Thermalradiation? A.Planck's blackbody radiation lawB.The Rayleigh-Jeans formulaC.The Stefan-Boltzmann lawD.Wien' select the two pieces of evidence from the text rhat most specifically support the idea that the economy or the management of resources depends on public works Find the solution to the system of equations given below:x=-4-5x-4y=16PLS HELP Tyler has a rectangular garden that measures 10 m wide by 13 m long. He wants to increase the area to 208 m by increasing the width and length by the same amount.What will be the length (longer dimension) of the new garden? PA? OH? NY? NJ? ANYONEE